Analysis

  • max time kernel
    91s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/03/2025, 19:10

General

  • Target

    JaffaCakes118_60e596aceceb753502e61f04694d00b6.exe

  • Size

    260KB

  • MD5

    60e596aceceb753502e61f04694d00b6

  • SHA1

    f2e3c1fc1caedd93d559c531e10364610f260b11

  • SHA256

    42f6e4ab38b0722ea9da92e074ad03d43b7f59572ca6e24393274888f5f5b45f

  • SHA512

    c618d7e0753bf0808e0fe3daaf71cea5603188637e332c20895be44f5e2b5f7cf59bcf3285b61eb9fd3b83665ad9f368bdcb0a797ef026605b48734c24b47081

  • SSDEEP

    3072:koGBO/N78kfQ6buHBBahMFfT5f98KYWk97A6y4R+j2/3+kewAy0FVCAdmzcfnbH:uOl73fQ6buHDagT5fAZ79JbhSfj

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Windows directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60e596aceceb753502e61f04694d00b6.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60e596aceceb753502e61f04694d00b6.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:556
    • C:\Users\Admin\AppData\Roaming\8368.tmp
      C:\Users\Admin\AppData\Roaming\8368.tmp
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2572
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 264
        3⤵
        • Program crash
        PID:4144
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /i C:\Users\Admin\AppData\Local\Temp\INS94A~1.INI /quiet
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:872
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\run_dws_file.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Users\Admin\AppData\Local\Temp\inl98D7.tmp
        C:\Users\Admin\AppData\Local\Temp\inl98D7.tmp cdf1912.tmp
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1900
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inl98D7.tmp > nul
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3968
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext_favurl_cab.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:952
      • C:\Windows\SysWOW64\expand.exe
        expand.exe "C:\Users\Admin\AppData\Local\Temp\favorites_url.cab" -F:*.* "C:\Users\Admin\Favorites"
        3⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:5060
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE > nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3728
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2572 -ip 2572
    1⤵
      PID:2712
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4916
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 238F2EC66CD664CF509EC867FC80A19F
        2⤵
        • System Location Discovery: System Language Discovery
        PID:744

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e579984.rbs

      Filesize

      8KB

      MD5

      0107b19d81d5d87ed0887797fdbd958b

      SHA1

      f732bf84324eb0449556eae1633401d2c3a57ea4

      SHA256

      6d096abaa2046f893bb48ea795c9f90eca1d962566484cbafebc036faf322516

      SHA512

      958ece2598a4f3fc685564036ab78ce742585a425492b6b17ec247161651c6eca31e5e73ebc538f84183ab198d6004141a903d68bcd28fe6c7883149b7f1d348

    • C:\Users\Admin\AppData\Local\Temp\INS94A~1.INI

      Filesize

      66KB

      MD5

      0c7806baec01b972433fb8d996a97a52

      SHA1

      b4c67730a087225065df02b8b897262b76b451d9

      SHA256

      c1a7a2ddbca1032df6ad092449938d816185e2944b8de02abdd610609e7013e1

      SHA512

      2cee480f0d10d66fff141fc6e868fbea9c00e1b54301278792ff4b7f1984ac2f3de6e2a38310faec18fbd758bb3a61786d8c389272763a395199f790cd5ebc20

    • C:\Users\Admin\AppData\Local\Temp\cdf1912.tmp

      Filesize

      768B

      MD5

      d20d9eda31a2d0300e4589df7f352370

      SHA1

      79b46d2dbb489914cfedafdbc90e62951471b48e

      SHA256

      d7a1d6a8cf5c3fbb85cd06147a599f5274630b86b1c89721f10a60c1bbe994d8

      SHA512

      d28c5b69325a9833776ea362445b77b231a0ec9b9b8b4a2ad37a434ee8b2b0c1903d6ade1e372f73ac8ada951e0a24076cf23d9307d27fed5927f4bf8b0d0a5e

    • C:\Users\Admin\AppData\Local\Temp\run_dws_file.bat

      Filesize

      57B

      MD5

      5a304ea8ca7c76bb39774069de20bfb8

      SHA1

      c78f298029334debcb702def1d2f185473138ec4

      SHA256

      ca7ad71fec1c4466a8a764fb96689c8e2ff14b16b7d88da715b60a225efdf41a

      SHA512

      0b99646aa9c3d1177769d84e33560a1327633bc1bbfe41017ca356b47418805abf4dd3bc3aaac5676e3a299d9ba99b7486c22b79f9d8d3d7922dff691256a5d1

    • C:\Users\Admin\AppData\Local\Temp\tmp_ext_favurl_cab.bat

      Filesize

      98B

      MD5

      8663de6fce9208b795dc913d1a6a3f5b

      SHA1

      882193f208cf012eaf22eeaa4fef3b67e7c67c15

      SHA256

      2909ea8555f2fc19097c1070a1da8fcfd6dc6886aa1d99d7e0c05e53feeb5b61

      SHA512

      9381063e0f85e874be54ae22675393b82c6ab54b223090148e4acbeff6f22393c96c90b83d6538461b695528af01d1f1231cf5dc719f07d6168386974b490688

    • \??\c:\users\admin\appdata\local\temp\favorites_url.cab

      Filesize

      425B

      MD5

      da68bc3b7c3525670a04366bc55629f5

      SHA1

      15fda47ecfead7db8f7aee6ca7570138ba7f1b71

      SHA256

      73f3605192b676c92649034768378909a19d13883a7ea6f8ba1b096c78ffadb5

      SHA512

      6fee416affcb6a74621479697bca6f14f5429b00de3aa595abe3c60c6b2e094877b59f8783bbe7bdd567fa565d0630bb02def5603f8f0ea92fe8f2c3ac5383c0

    • memory/556-0-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/556-37-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/1900-74-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/2572-7-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2572-9-0x00000000001D0000-0x00000000001D2000-memory.dmp

      Filesize

      8KB

    • memory/2572-11-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB