Analysis

  • max time kernel
    102s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/03/2025, 21:02

General

  • Target

    JaffaCakes118_991d453966f2710887d63540216ff40d.exe

  • Size

    2.7MB

  • MD5

    991d453966f2710887d63540216ff40d

  • SHA1

    42bd94f26e36c5e9a8ee9d9120d4621993f932f6

  • SHA256

    2e8c45281d65f80244cecf99b939d4bc506597eb94a9f1c0fe0404c028f42c4f

  • SHA512

    a32888aae4a4d983f2c691c504c2398175a6055595c9e69c050c94d9dc27ac5087f9aa794e176b4bd91fbb9df9bd9700c4698cf806459482aff0378cdc538227

  • SSDEEP

    49152:acQ/QOxVY6yvunHkq/m2hJcax2EOZYgUjWbb0SdSLrgWQUaRZHJTBJvWempJF+UQ:aD/xxV9ypXw8Rlbpj+NFvJIpsMl

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_991d453966f2710887d63540216ff40d.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_991d453966f2710887d63540216ff40d.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3280
    • C:\Users\Admin\AppData\Local\Temp\Crypted.exe
      "C:\Users\Admin\AppData\Local\Temp\Crypted.exe"
      2⤵
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • System Location Discovery: System Language Discovery
      PID:1588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Crypted.exe

    Filesize

    2.0MB

    MD5

    cdae2ae9d1f43b27ff80ce989a34a906

    SHA1

    2d509bb047d42f4fda74f6279c1e206155a62b58

    SHA256

    ecf9f457bbf099155ab96e9971baf0ade765240ae0b7c5ede9262a07415a83fe

    SHA512

    23cf45b4f76510529eccfca7eeec61c458ea8383c6601593ffe7ef0ca8ffa45f1b677d4076d58113220dbb3d4a32b909aeeeec4304699dc17a560486244707fc

  • memory/1588-23-0x0000000000B30000-0x0000000000B31000-memory.dmp

    Filesize

    4KB

  • memory/1588-22-0x0000000000400000-0x000000000086B000-memory.dmp

    Filesize

    4.4MB

  • memory/1588-20-0x0000000000B30000-0x0000000000B31000-memory.dmp

    Filesize

    4KB

  • memory/1588-21-0x0000000002980000-0x0000000002A7D000-memory.dmp

    Filesize

    1012KB

  • memory/1588-18-0x0000000000400000-0x000000000086B000-memory.dmp

    Filesize

    4.4MB

  • memory/3280-4-0x000000001C670000-0x000000001CB3E000-memory.dmp

    Filesize

    4.8MB

  • memory/3280-7-0x000000001CD50000-0x000000001CD9C000-memory.dmp

    Filesize

    304KB

  • memory/3280-8-0x00007FFB06DD0000-0x00007FFB07771000-memory.dmp

    Filesize

    9.6MB

  • memory/3280-6-0x0000000001AA0000-0x0000000001AA8000-memory.dmp

    Filesize

    32KB

  • memory/3280-5-0x000000001CBF0000-0x000000001CC8C000-memory.dmp

    Filesize

    624KB

  • memory/3280-19-0x00007FFB06DD0000-0x00007FFB07771000-memory.dmp

    Filesize

    9.6MB

  • memory/3280-0-0x00007FFB07085000-0x00007FFB07086000-memory.dmp

    Filesize

    4KB

  • memory/3280-3-0x00007FFB06DD0000-0x00007FFB07771000-memory.dmp

    Filesize

    9.6MB

  • memory/3280-2-0x00007FFB06DD0000-0x00007FFB07771000-memory.dmp

    Filesize

    9.6MB

  • memory/3280-1-0x000000001C0B0000-0x000000001C156000-memory.dmp

    Filesize

    664KB