Analysis

  • max time kernel
    84s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2025, 18:11

General

  • Target

    JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe

  • Size

    150KB

  • MD5

    53158a67f720dadfbea207ae50aaf9fe

  • SHA1

    00d1e2b28f740016f1c8893f01c448afcb4f752d

  • SHA256

    e44881402128927dbf7de2101600303b1f086d7f2e2a08940868cccdefe5fbf5

  • SHA512

    d1aaffa4c5c8b71dd3a77c4b0ce15c76c1803d8a1acba706a6dfa707b3449448f227caefb6cc180e2b81cf9527881ebcb93c02a7639984112e476e0eebfb5f4a

  • SSDEEP

    3072:QaPwiR0gEGSd9GAYnnRdHN7nvCRSc9n39ooTID7jsXTcLd2jr:QwwiRCLGpnDN7KRSQn39oyq7HgP

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Windows directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2544
    • C:\Users\Admin\AppData\Roaming\462C.tmp
      C:\Users\Admin\AppData\Roaming\462C.tmp
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4608
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 264
        3⤵
        • Program crash
        PID:3476
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /i C:\Users\Admin\AppData\Local\Temp\INS57F~1.INI /quiet
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1088
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\run_dws_file.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4704
      • C:\Users\Admin\AppData\Local\Temp\inl5BF8.tmp
        C:\Users\Admin\AppData\Local\Temp\inl5BF8.tmp cdf1912.tmp
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4908
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inl5BF8.tmp > nul
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4316
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext_favurl_cab.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4380
      • C:\Windows\SysWOW64\expand.exe
        expand.exe "C:\Users\Admin\AppData\Local\Temp\favorites_url.cab" -F:*.* "C:\Users\Admin\Favorites"
        3⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:1660
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE > nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2660
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4608 -ip 4608
    1⤵
      PID:4128
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1044
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 39BFA48E9D2C8556763526B3B4CB4FC2
        2⤵
        • System Location Discovery: System Language Discovery
        PID:4080

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e585d60.rbs

      Filesize

      8KB

      MD5

      36cd85e14475ca3024291cce6e03a11e

      SHA1

      fba0ac1901a5ec71b1bbcc45683fc5c483558006

      SHA256

      a3f72713fd9e0b2b2d324e4c383a990cb1882fc05523f2f7f31d4133366d4c1c

      SHA512

      3717ec490bb2699a59ea3b36e7187dce14ad24de75fa88859b8c4423a2704eeb28ac35a37485cee89e5a081dfba8de173c1478bfaad308bf985a7b6d36d953b4

    • C:\Users\Admin\AppData\Local\Temp\INS57F~1.INI

      Filesize

      66KB

      MD5

      a4b6ed84b623ec3122e6111e6db5609f

      SHA1

      cc23df3d81685206e9d5dd72ea52381bcdf380a5

      SHA256

      dd77b9e53bbd709ef38bfbcc1df216a0018e153811d2b5418017e1cda3357d6f

      SHA512

      25286486412ee6ac77a725a7e41921d0cda6d668e19fbb1ead77c6f0af6715518a888c0a34dacb1bda9f30e7c244c68a1d60b0e5ab30594d7497145c2d83b4f0

    • C:\Users\Admin\AppData\Local\Temp\cdf1912.tmp

      Filesize

      766B

      MD5

      b69d002455f1a5a100e717a6a84ff991

      SHA1

      3a99b22845afb2132300095d84534e65823e678d

      SHA256

      c05465e73465c2d6addc7514ad50b517675ce26bfb1a4cad3d3b64b617940934

      SHA512

      1f2e36f1e8c6f66ba746a3450a9f5c07f300bff4682e32344541596b0bdae7e3f443f3e25deaa7936195c48642f9268e3a626a4018772417ce48d26e4f9d1505

    • C:\Users\Admin\AppData\Local\Temp\run_dws_file.bat

      Filesize

      57B

      MD5

      ffcb24e6231a30c9fd4d5f6fe021bdd9

      SHA1

      497daf9294917ac294a752627d4c3ea677e34d3b

      SHA256

      0291ede203370586725633fdea5325d4c8a78b4ef0bae4689a7d5453937e0193

      SHA512

      7f8817040f111d55f33d3a9df28417c3c0af62c4fd86166c7773cd31a95782c2a631f810c35df31063b13e3ae15de885d56303382ffcc41c7ec4fc24b88453de

    • C:\Users\Admin\AppData\Local\Temp\tmp_ext_favurl_cab.bat

      Filesize

      98B

      MD5

      8663de6fce9208b795dc913d1a6a3f5b

      SHA1

      882193f208cf012eaf22eeaa4fef3b67e7c67c15

      SHA256

      2909ea8555f2fc19097c1070a1da8fcfd6dc6886aa1d99d7e0c05e53feeb5b61

      SHA512

      9381063e0f85e874be54ae22675393b82c6ab54b223090148e4acbeff6f22393c96c90b83d6538461b695528af01d1f1231cf5dc719f07d6168386974b490688

    • \??\c:\users\admin\appdata\local\temp\favorites_url.cab

      Filesize

      425B

      MD5

      da68bc3b7c3525670a04366bc55629f5

      SHA1

      15fda47ecfead7db8f7aee6ca7570138ba7f1b71

      SHA256

      73f3605192b676c92649034768378909a19d13883a7ea6f8ba1b096c78ffadb5

      SHA512

      6fee416affcb6a74621479697bca6f14f5429b00de3aa595abe3c60c6b2e094877b59f8783bbe7bdd567fa565d0630bb02def5603f8f0ea92fe8f2c3ac5383c0

    • memory/2544-30-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2544-31-0x00000000001A0000-0x00000000001A3000-memory.dmp

      Filesize

      12KB

    • memory/2544-0-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2544-1-0x00000000001A0000-0x00000000001A3000-memory.dmp

      Filesize

      12KB

    • memory/4608-12-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4608-10-0x00000000001D0000-0x00000000001D2000-memory.dmp

      Filesize

      8KB

    • memory/4608-8-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4908-77-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB