Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2024, 00:09

General

  • Target

    5465268c18cfbc376667b64fbae84c9c_JaffaCakes118.exe

  • Size

    14KB

  • MD5

    5465268c18cfbc376667b64fbae84c9c

  • SHA1

    bfe3ec58baf77f5376630d5fc1468f3593ef589a

  • SHA256

    a60c35ee4b80b3373bce0da4b51306b11db37faf37ed8ed6b76616d722c88d90

  • SHA512

    6e96fc12024bf92ad0bdc83e8586829a72a8adf4c593d939056df2719e0521ddf65af51cb3445ea8821f8edeab6505ed77d7be6ffbb608b69c691881adb17906

  • SSDEEP

    384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYlB:hDXWipuE+K3/SSHgxmlB

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5465268c18cfbc376667b64fbae84c9c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5465268c18cfbc376667b64fbae84c9c_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Users\Admin\AppData\Local\Temp\DEM8230.exe
      "C:\Users\Admin\AppData\Local\Temp\DEM8230.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3568
      • C:\Users\Admin\AppData\Local\Temp\DEMD8BC.exe
        "C:\Users\Admin\AppData\Local\Temp\DEMD8BC.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4040
        • C:\Users\Admin\AppData\Local\Temp\DEM2EFA.exe
          "C:\Users\Admin\AppData\Local\Temp\DEM2EFA.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1380
          • C:\Users\Admin\AppData\Local\Temp\DEM848D.exe
            "C:\Users\Admin\AppData\Local\Temp\DEM848D.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2256
            • C:\Users\Admin\AppData\Local\Temp\DEMDACB.exe
              "C:\Users\Admin\AppData\Local\Temp\DEMDACB.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1512
              • C:\Users\Admin\AppData\Local\Temp\DEM30DA.exe
                "C:\Users\Admin\AppData\Local\Temp\DEM30DA.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:1284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DEM2EFA.exe

    Filesize

    14KB

    MD5

    5f5d6d4af3cad01456e2924e5a09a8c2

    SHA1

    a63539fd2c0cd5b6289041f1447b112d1a54bfe2

    SHA256

    5bab5738b7b95dd797030de1907de8dd8dd3872b3205e0f18b5cc4be58b59b83

    SHA512

    89b5c1d53a213ffb3c0f837d2273f5127e993babc2bf69f5361ceff01d4bda0d09630fd6878e331455fbe91383c664513c35d86caadeb0c44b261ff1da8766bb

  • C:\Users\Admin\AppData\Local\Temp\DEM30DA.exe

    Filesize

    14KB

    MD5

    e2bb9b8fb3e75107a8278980dc02280d

    SHA1

    ad6ffdbec97b710706b11f87441cec6c3babef82

    SHA256

    4bfc1d1f3d9a1da64a28081476b53cc10396747687abc6b87aac0abd6cbb632d

    SHA512

    76d167f40d7c394e4f414cae8d6d24f1a679080d95c2a9d2fd58832bdde3f46fe06c007ad7045bea31e4c74edb992b2527e37436be44309f57ad1dfa4e87d044

  • C:\Users\Admin\AppData\Local\Temp\DEM8230.exe

    Filesize

    14KB

    MD5

    d5011c6c69528429647a696ad846de01

    SHA1

    39b34bcefcd202ff76df4355a45034398701b12c

    SHA256

    a57d746f836f68768ca7aeec3ccb9b6fb090ca40e49948a93e1a3647420523c1

    SHA512

    1890a36f855b47f79123f3aee04651da03a1520cbcc2c63c66771c85b0b8be525f8b84b75f194d214c67fa1bd32bdebefc4359c6baaa7fac64adf6bd868607c8

  • C:\Users\Admin\AppData\Local\Temp\DEM848D.exe

    Filesize

    14KB

    MD5

    760cb63b91d4e26b2a84450303eb1c2a

    SHA1

    f596ad39d263f6fed47c191765a43faec1aa3dd8

    SHA256

    f5e793a8546e9bcb56f0a14a46494cf7d00c87b7ea227010e9196061f115cd2f

    SHA512

    d6b6899b2601b24ea00627f0330f8cdfb1f306410dc6cab643925ac8ed09e9af638879f775e369d48f8dd285f3ea3ef7381e1f3245cea74f564f04a880136b54

  • C:\Users\Admin\AppData\Local\Temp\DEMD8BC.exe

    Filesize

    14KB

    MD5

    39d48a526ad84c6470e5e9117edeb533

    SHA1

    26722cbd9b9013c96b3552614280c5b38f9d01ee

    SHA256

    08f56c305bf33a184cb87b5c90c5ebb2d78aa25751fe09aebefe5839721c1c49

    SHA512

    8e749c00c1c3ec081ef86089e9d2d9360636270e596872bdb83cae6278b9a397589b71c2d72718c251f5ca06192c96bc32804872cfb83129be44f6530cc04c5a

  • C:\Users\Admin\AppData\Local\Temp\DEMDACB.exe

    Filesize

    14KB

    MD5

    aebd644106c1a3f822f1f0b4958828b6

    SHA1

    df22df8e27143f1795fee7e8e27c1d01c4399dd2

    SHA256

    2f28201ce29afef0ddf1cfd630adae7e1f367831227bfc72a155a8e76f6a9dd6

    SHA512

    cf53f127447fe93c0ee0f51a56538e5efb512635f5cc2fb4225583caeff7e072c4de5e5feef0b2082305289a944b5f607ec5abf79014bb6aaf80aed9ee8580cb