Analysis

  • max time kernel
    139s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2024, 12:27

General

  • Target

    576db719580aac463e715b533a2086b0_JaffaCakes118.exe

  • Size

    98KB

  • MD5

    576db719580aac463e715b533a2086b0

  • SHA1

    001ee6785b3cabf64c5726e859412e8a3a542abe

  • SHA256

    bea34029e35474e348093d38e96d5b9f7284c7406812c5d550890f77a0eeea83

  • SHA512

    9be36d01b9938345f4d2c1aa9350dee852a83180cbdf9b8179a43e5f94104545683aa3f9218678cced5075f01d4ea8064cdd446ba047b13f8b96fa7ed9a33008

  • SSDEEP

    1536:lsKZbKJC4AC9hKwx2PV5HE7itqVmF8mWjJ3kv1RCj7CMLFCALkvOrmw4m2OE:ecB4AC3QV5HE7A8lsRCdhC9GrOzF

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\576db719580aac463e715b533a2086b0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\576db719580aac463e715b533a2086b0_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Gxp..bat" > nul 2> nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Gxp..bat

    Filesize

    238B

    MD5

    2fe0cb74f20298b2f26c526f9508e4be

    SHA1

    e60ecdd8416dea85e371aefee94a95524431674b

    SHA256

    7fe8154c5421b511ca1625279843b8b7ed5202813b5bd337015d2c9ea9a3dfcd

    SHA512

    7ffa3788af9cdefde15ff6df32069ce2e3d7abeaaf7bdb745a755744f7fdf394c0ef2a4746a6200fb84fab8767faa5f88058c5ccc0f607529e8280c08fcd7e1c

  • memory/2064-0-0x00000000005D0000-0x00000000005DD000-memory.dmp

    Filesize

    52KB

  • memory/2064-1-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2064-3-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB