Analysis

  • max time kernel
    150s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 17:02

General

  • Target

    be5c59b37d57dad8e50e45f8f3b0ce38_JaffaCakes118.exe

  • Size

    17KB

  • MD5

    be5c59b37d57dad8e50e45f8f3b0ce38

  • SHA1

    c6e88fc3822a0926090ad1dd02557207c5f04a23

  • SHA256

    86f14602208ac8af527879129dd5921709acc8708f4df9a01b9d49819f6d767b

  • SHA512

    f511df097d05413984a72746ae8b8b749f0f458ccbe887287e16348485a90f365b0f7a62ef643964dd94793e2fa139834730a74e691ad128552dc759c50140bf

  • SSDEEP

    384:HHk2+IjDjClbX/xzEobx8PD5NJEUUNHsMY/G7BQGjkPP7RohY:nkYEb5tePD/JEU0sMY/GqGjIPVohY

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be5c59b37d57dad8e50e45f8f3b0ce38_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\be5c59b37d57dad8e50e45f8f3b0ce38_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1064
    • C:\Windows\SysWOW64\ishost.exe
      C:\Windows\system32\ishost.exe
      2⤵
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:5056
      • C:\Windows\SysWOW64\ismon.exe
        C:\Windows\system32\ismon.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2900
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\BE5C59~1.EXE > nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ishost.exe

    Filesize

    79KB

    MD5

    ac66185b0155324ec026c17fa3a73f50

    SHA1

    92fe223edf0acb2c6cd1788a663ff72884de0a8b

    SHA256

    e78057f115b67efbd1593485d96cd78af83303429e32443987a760b5a4e7cafa

    SHA512

    1cd25d81ddb2747241840826a52abea14fb383bbd1897239a1e74475403971a37e6b9c713cf8d9ef79511f2775e4fcaeb4b94fc224e461efa1fa416058780923

  • C:\Windows\SysWOW64\ismon.exe

    Filesize

    10KB

    MD5

    ee8e18fefdcdf8224351d1c53df11bea

    SHA1

    91fa815f029aa572370db2453be03e7e90434091

    SHA256

    6524beadc1fc66144a9ef851e6198038aafb2d13b1530fe77360bc92d6547a1d

    SHA512

    e03079bfde49d668b6d05de274a1df2e0d9c12a10cf968167d50e635c607c1894ea1691425c2d7b624dde971d8467fded55eff736f54cbdeb0667c5edb307f1f