Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-12-2024 18:42

General

  • Target

    f0277a027c4e4d174b2cf996e526f77a_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    f0277a027c4e4d174b2cf996e526f77a

  • SHA1

    fc9203736c162d4f940af4f7f82b28a9020f2e5d

  • SHA256

    d8e8c6c9b6f7241fa53a6ee9c7ceb0c5b8914608c49b5de154755a8af252229b

  • SHA512

    1e88bad8ad513d8a3cc3cd9e800e6de63458d260fcbfcbb0bfedcc251bb2b3762b731b63e098ba93c6ad22dea13a3f8543faff3d65628a111d96e5a396cc8385

  • SSDEEP

    24576:N67T4oQm/5Rvy4w7U+wYItAxOqC8+d4vJzT7RJ1deXkWhe:NSQ7ULeOv8ymFXTgkQe

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0277a027c4e4d174b2cf996e526f77a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f0277a027c4e4d174b2cf996e526f77a_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4080
    • C:\Users\Admin\AppData\Local\Temp\server.exe
      "C:\Users\Admin\AppData\Local\Temp\server.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3024
    • C:\Users\Admin\AppData\Local\Temp\TRK.exe
      "C:\Users\Admin\AppData\Local\Temp\TRK.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TRK.exe

    Filesize

    561KB

    MD5

    1a33f0dda2d99acba2eb2b817387ed21

    SHA1

    6e02ffa003f4362b652856eab4335fa34e131c32

    SHA256

    3da541200b2b3ee136f61e83a41307db33441301feeb351e30f1f0d292a643ec

    SHA512

    2893d5fce8f64c51f540789a357c73292e9cab2315f7c402ab3d031173898615dbf3bd16f521676515718b8e8086da7eb0c484a6fd8af7f399bbdf78fad2b6fe

  • C:\Users\Admin\AppData\Local\Temp\server.exe

    Filesize

    555KB

    MD5

    be67118dce14cc30d470f4409488ecf3

    SHA1

    633aa1e4ead28cfe355113b0605405d94818b407

    SHA256

    9238440a35c721cb69a16a027f4f641fa14ca5b1ca81b26709cfbd29bc43efcb

    SHA512

    23059600951a6de13c5203231036f62fbaace7282443a248d8357f9c35ff1190c7d5b65414a7cb5d54b179d07a1726cd47daa8ab3c2f38ad2a098961ee9040cb