Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2024 22:58

General

  • Target

    e8ac9f66515fe0b801b2b1e19916fb1e_JaffaCakes118.exe

  • Size

    100KB

  • MD5

    e8ac9f66515fe0b801b2b1e19916fb1e

  • SHA1

    616ccaa9d8e10e0e1aa48c37f66f5d24d86ebe74

  • SHA256

    0ebac735b1ec8ae1026525063212a09f570d83c012577bedd5977c1d8ba8b78a

  • SHA512

    e5bcf510df380876d81827f68b8d3cb432763db1a3df8d19f892ed8a584a9396bdebd46bedcc56496d53597c0887fe232f85448a464acb6a93fee102a761f588

  • SSDEEP

    1536:hqp2oQrAPHVAMJkdwMX1Am6/Gu2XdoSs2SbPd/9ZK8o2rNf4cXcx84kiTMz:hqpyMJkdn6/GjXdGd/02Z4cMqiTMz

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 5 IoCs
  • Modifies registry class 7 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8ac9f66515fe0b801b2b1e19916fb1e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e8ac9f66515fe0b801b2b1e19916fb1e_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:216
    • C:\Users\Admin\AppData\Local\Temp\~240617671.tmp.exe
      C:\Users\Admin\AppData\Local\Temp\~240617671.tmp.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:628
    • C:\Users\Admin\AppData\Local\Temp\~240617671.tmp\e8ac9f66515fe0b801b2b1e19916fb1e_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\~240617671.tmp\e8ac9f66515fe0b801b2b1e19916fb1e_JaffaCakes118.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Installs/modifies Browser Helper Object
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2452
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\~BD06.txt
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~240617671.tmp.exe

    Filesize

    11KB

    MD5

    4e868495efa86e0f86cfb320be3450ab

    SHA1

    8e830b1c1f25beed46bb23abf9888ebab13a189f

    SHA256

    021d0831e2d7c9ec05c70e84a7e8d9bfdbf064ba0db0136062547cafa8a11fa3

    SHA512

    c2fa59870067695b642880504f12283079515cabf330d66219156ad0a4eeb2dc105e48f2fd25400d5c0fe17ffee5a7eb3f6703a3a529c79b2c2fca88f0f5fe02

  • C:\Users\Admin\AppData\Local\Temp\~240617671.tmp\e8ac9f66515fe0b801b2b1e19916fb1e_JaffaCakes118.exe

    Filesize

    86KB

    MD5

    aa75db7df95102ee109e53d45f3584b8

    SHA1

    e1fb4048a77fc10c11469572bb79af7a8c6780b9

    SHA256

    db568d4cc9b8d95edece035a9f624184698651cedcc69cf4ef9910ef026ce864

    SHA512

    5ce5b0d3f8f6ce692306b9780b119028017e1641cb3d6841cccafbf39a69d6d85883627b255c25e6b8d2d515396c88dfb506e8a49f29e537d54de083af4c2e98

  • C:\Users\Admin\AppData\Local\Temp\~BD06.txt

    Filesize

    149B

    MD5

    8ecd7a528d6e72ff585813cd2b0b9f66

    SHA1

    44f4c841fd516752521f354ca979c1cd2c9a44aa

    SHA256

    8416d297eb3f168e5de21f3b4dc9a7240052859115463de43341338665b10c2c

    SHA512

    4524d8eeb7637da3a1612ee29a612ba801174b09b1893dc52ef1530f8c980b0bd668b955eef90624525d14d89b465f29c28fbc6ed04af087e11c52d87431ed1d

  • memory/216-0-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/216-11-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/628-6-0x0000000013140000-0x0000000013149000-memory.dmp

    Filesize

    36KB