Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2024 16:25
Static task
static1
Behavioral task
behavioral1
Sample
0a69e8195beb55f2c99fb98daf97f39d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0a69e8195beb55f2c99fb98daf97f39d_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
0a69e8195beb55f2c99fb98daf97f39d_JaffaCakes118.exe
-
Size
7.9MB
-
MD5
0a69e8195beb55f2c99fb98daf97f39d
-
SHA1
ea6ade92c66579e8b5131761ef01013e99c847b1
-
SHA256
426ea9671dd9a5fca6c3c98bf70ceb5637d669b2320b015f8a607b42e73dce30
-
SHA512
c1d558536d2c7011c3fa8c97950c6ca37014b5744c580a521b7be89f783032d9cc75a67e394f2bcee7bac2cc9fe45f0aca1c495c3d7d54f28712e622c748960b
-
SSDEEP
196608:8Aazg7DSmAazg7DSmAazg7DSmAazg7DSN:Wg7uwg7uwg7uwg7uN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 0a69e8195beb55f2c99fb98daf97f39d_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 1624 7D57AD13E21.exe 3300 Scegli_nome_allegato.exe 2240 7D57AD13E21.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\7D57AD13E21.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1624 set thread context of 2240 1624 7D57AD13E21.exe 108 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Scegli_nome_allegato.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Scegli_nome_allegato.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\IESettingSync Scegli_nome_allegato.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Scegli_nome_allegato.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4064 reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2240 7D57AD13E21.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 440 wrote to memory of 4064 440 0a69e8195beb55f2c99fb98daf97f39d_JaffaCakes118.exe 103 PID 440 wrote to memory of 4064 440 0a69e8195beb55f2c99fb98daf97f39d_JaffaCakes118.exe 103 PID 440 wrote to memory of 4064 440 0a69e8195beb55f2c99fb98daf97f39d_JaffaCakes118.exe 103 PID 440 wrote to memory of 1624 440 0a69e8195beb55f2c99fb98daf97f39d_JaffaCakes118.exe 105 PID 440 wrote to memory of 1624 440 0a69e8195beb55f2c99fb98daf97f39d_JaffaCakes118.exe 105 PID 440 wrote to memory of 1624 440 0a69e8195beb55f2c99fb98daf97f39d_JaffaCakes118.exe 105 PID 440 wrote to memory of 3300 440 0a69e8195beb55f2c99fb98daf97f39d_JaffaCakes118.exe 106 PID 440 wrote to memory of 3300 440 0a69e8195beb55f2c99fb98daf97f39d_JaffaCakes118.exe 106 PID 440 wrote to memory of 3300 440 0a69e8195beb55f2c99fb98daf97f39d_JaffaCakes118.exe 106 PID 1624 wrote to memory of 2240 1624 7D57AD13E21.exe 108 PID 1624 wrote to memory of 2240 1624 7D57AD13E21.exe 108 PID 1624 wrote to memory of 2240 1624 7D57AD13E21.exe 108 PID 1624 wrote to memory of 2240 1624 7D57AD13E21.exe 108 PID 1624 wrote to memory of 2240 1624 7D57AD13E21.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a69e8195beb55f2c99fb98daf97f39d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0a69e8195beb55f2c99fb98daf97f39d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:4064
-
-
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2240
-
-
-
C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1316 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:81⤵PID:4704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.9MB
MD5eef25c2534f56eee7f5015f7aafdf7a6
SHA11b755ce6fe6797b13d113187641900ae764709ca
SHA2560ff65d75db1ebb800d65878d12a509e136d06faee22a8aa43b36d49a35276c60
SHA512481820f0bca0482abf2ac3ae6f578d0aea167928736514ad40cab7aeeb847a6542be097667a9a52ef60ed2263eb5907641ae3ecece6a790bcd1436029905c85b
-
Filesize
1.0MB
MD5a2f259ceb892d3b0d1d121997c8927e3
SHA16e0a7239822b8d365d690a314f231286355f6cc6
SHA256ab01a333f38605cbcebd80e0a84ffae2803a9b4f6bebb1e9f773e949a87cb420
SHA5125ae1b60390c94c9e79d3b500a55b775d82556e599963d533170b9f35ad5cfa2df1b7d24de1890acf8e1e2c356830396091d46632dbc6ee43a7d042d4facb5dad