Analysis

  • max time kernel
    139s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-10-2024 03:16

General

  • Target

    4590494f9328fe44f8753ac8595f490f_JaffaCakes118.exe

  • Size

    4.7MB

  • MD5

    4590494f9328fe44f8753ac8595f490f

  • SHA1

    a3afdf333908d33c8482095852110ec9a8d11cf2

  • SHA256

    b71f451bb63ebee58ff1c8e2434654cfc004c143bcddc3eb044b29049a5f551b

  • SHA512

    be41d223554da49c369fdfeab27d0eec3311c0a8ba2fcf42b1b54e4442bd08e75a75360aaae4af885635c4b9adc6834bcdffb897d6ce3c2bc4ef444b64a88ce0

  • SSDEEP

    98304:L3QoOkhuiUj2vokyZczYhKtgp0LqSrQwnvru/k:L3QoO7ZcP+Sd

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 13 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4590494f9328fe44f8753ac8595f490f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4590494f9328fe44f8753ac8595f490f_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe
      "C:\Windows\system32\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe" /Service
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:2640
  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe
    "C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3424
    • C:\Windows\TEMP\5543
      "C:\Windows\TEMP\5543" -u "C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3964
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c "C:\Windows\TEMP\5546.bat"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\known2_64.met

    Filesize

    1B

    MD5

    9e688c58a5487b8eaf69c9e1005ad0bf

    SHA1

    c4ea21bb365bbeeaf5f2c654883e56d11e43c44e

    SHA256

    dbc1b4c900ffe48d575b5da5c638040125f65db0fe3e24494b76ea986457d986

    SHA512

    fab848c9b657a853ee37c09cbfdd149d0b3807b191dde9b623ccd95281dd18705b48c89b1503903845bba5753945351fe6b454852760f73529cf01ca8f69dcca

  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe

    Filesize

    4.7MB

    MD5

    4590494f9328fe44f8753ac8595f490f

    SHA1

    a3afdf333908d33c8482095852110ec9a8d11cf2

    SHA256

    b71f451bb63ebee58ff1c8e2434654cfc004c143bcddc3eb044b29049a5f551b

    SHA512

    be41d223554da49c369fdfeab27d0eec3311c0a8ba2fcf42b1b54e4442bd08e75a75360aaae4af885635c4b9adc6834bcdffb897d6ce3c2bc4ef444b64a88ce0

  • C:\Windows\TEMP\5546.bat

    Filesize

    112B

    MD5

    c6fd74aa48b8e4c621251eb01a570bee

    SHA1

    dd57c54d346978fe2be845639a94e23c01f6a9fd

    SHA256

    f90fe889018566f0565184f8d0dc205c0c1062f59d5757e6acfbace8e001df53

    SHA512

    03d38c61d08946c48ce2ba7b162d455d2cb15bed0eaa95e7ae250f3f02b504494663a617e1fe1e9b143f0f3465a7072e40d3050e9bc69a2eae3cfdfd4d203190