Analysis

  • max time kernel
    9s
  • max time network
    17s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-10-2024 02:03

Errors

Reason
Machine shutdown

General

  • Target

    54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe

  • Size

    90KB

  • MD5

    54e0b0172b252617b3fb96f6e899eff3

  • SHA1

    b46e5c4f484fb43d47de75a5b2fd26558335d3c7

  • SHA256

    b48326823cad0a141724e6c6d8a8d0a1f3fd5195a1aed03354a2ccadaf873c38

  • SHA512

    b5d3c85b702b50ecf61947c76cd3665654a7cd81ee203b9bc3c0aaaa52c738562c0d74542f54fb7497155fb5245cdc14063ebc9e46d6146edc33b4ce67e5044f

  • SSDEEP

    1536:hgYPhQXwIiPrrjThO+lUBrzCxry1ec7rUyj239auh53RdXFwW:KYP2XerzhOUxu/XUtauzDFwW

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4812
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:632
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del C:\Windows\system32\hal.dll /f /q
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1372
      • C:\Windows\SysWOW64\shutdown.exe
        shutdown -r -t 05 -c "Good bye, my love, good bye"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2960
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa38ca855 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:3008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1.bat

    Filesize

    99B

    MD5

    06c5ae8cc629f30b31b0384f5d2d979a

    SHA1

    d3742c22ef6687907d9ef91cb69ebe337130bef7

    SHA256

    0ea0719b9de4b8876d7f7128a3133f4eaed3dddeaa8a2b702d0285fa5d1a6e4a

    SHA512

    f55ab1c047aee51a38b0da0d844f07b5cb633d1ad3ecfb035fa956c94b0c2732a59e8236e53ddacef9286795b37074f20e6283bba40bcf29dbf98baf8b799975