Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2024 12:18
Behavioral task
behavioral1
Sample
0567ceaa15b58ac8282039830669c131_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
0567ceaa15b58ac8282039830669c131_JaffaCakes118.exe
-
Size
783KB
-
MD5
0567ceaa15b58ac8282039830669c131
-
SHA1
80178812314de1ca3d4fc6f94343a70de45407a1
-
SHA256
3e565dd4814f427642ade68f4fea3b82790d45174355099994c419b87d2ee464
-
SHA512
b67fd02ec50f53c92328d5c99cc289b07dd75b03b4608ccb3eab036013409cdde3ee68832f8a07fffa534a3b1505e2f4c40ad145dec14e06da5f816762676b3c
-
SSDEEP
12288:YOlx4kk9HKda4YfM/1T3PPSnPI2VAWNDTJHq9DIMTW8c1O:YA4Ya1fQzPPSnPFqWtTJK9DIMTW8T
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation 0567ceaa15b58ac8282039830669c131_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation ezruq.exe -
Executes dropped EXE 2 IoCs
pid Process 4956 ezruq.exe 4748 mugob.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe 4748 mugob.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4748 mugob.exe Token: SeIncBasePriorityPrivilege 4748 mugob.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5108 wrote to memory of 4956 5108 0567ceaa15b58ac8282039830669c131_JaffaCakes118.exe 91 PID 5108 wrote to memory of 4956 5108 0567ceaa15b58ac8282039830669c131_JaffaCakes118.exe 91 PID 5108 wrote to memory of 4956 5108 0567ceaa15b58ac8282039830669c131_JaffaCakes118.exe 91 PID 5108 wrote to memory of 2472 5108 0567ceaa15b58ac8282039830669c131_JaffaCakes118.exe 92 PID 5108 wrote to memory of 2472 5108 0567ceaa15b58ac8282039830669c131_JaffaCakes118.exe 92 PID 5108 wrote to memory of 2472 5108 0567ceaa15b58ac8282039830669c131_JaffaCakes118.exe 92 PID 4956 wrote to memory of 4748 4956 ezruq.exe 108 PID 4956 wrote to memory of 4748 4956 ezruq.exe 108 PID 4956 wrote to memory of 4748 4956 ezruq.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\0567ceaa15b58ac8282039830669c131_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0567ceaa15b58ac8282039830669c131_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\ezruq.exe"C:\Users\Admin\AppData\Local\Temp\ezruq.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\mugob.exe"C:\Users\Admin\AppData\Local\Temp\mugob.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD5304e258c63cbb2ded8cf7cac8eacfb14
SHA1c769059fc23b7de60aa9b97b823673cebf016141
SHA2564d1c5f82f7b3c543f3fae39d4078352a67fbfea01c0417ed1a954bd069d7db05
SHA512ec6b1b7b909f8d3833de5c807d24b8974bcb3c10fa1ba032d4390cf60effbb791994f05dcf363694b0093ecfd6fac52561b426f4292f125ff6e9982ab549eb99
-
Filesize
783KB
MD525ea2d41958a7a7cedcdcc3f37e39609
SHA1948f4bd3bd828b57ad21374fabe4b4d8454034e7
SHA256a975e63714df5d19db97a6139a6bf5d142e29eef08398e40b554b3ed3754c737
SHA51240d9e25ef7696810d0a364893e0ee1151a9d4ea75fe2bc3627f1afe2104d057edb12598b570629193ee09896463a947e931960d0eaf5465218acbaff74b91472
-
Filesize
512B
MD512ac2e0689b58c713eeb4f23ccfc5695
SHA1ea3c01e7c48e735bb2ab2198ccd8195683ac91ad
SHA256294819f8d56b92d08da4c244bb67b5c2354f8a7666d158862c6a0ac7a9f7a40d
SHA51251d042ff43e2794d32aad566cac0d66c46132d0aebfbc4962e0079014d2d4537a562e3743bb252ea8cfd8791ff404224db598ba4459d78edc842faeb81db14eb
-
Filesize
156KB
MD5c1f8897c7c50ee33c7aeef7a3f242155
SHA14867a1c7c833afca3f1b1565c3078de012fd3168
SHA2565f863b7143a8ea9bcdd01460ff70ff94092b945c44335b5aadcdf4189749cad7
SHA512176b0712d122c21d6406fd1776f11b2b31a17ac513065e83f683e00ffe9209c57c7e4f51f981bfacffc3531f75f745bf598a7f2d8efc4ca62f7a809e9655c45a