Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 04:38
Static task
static1
Behavioral task
behavioral1
Sample
1894e0de246deb45f6e380e0331a13dd_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
1894e0de246deb45f6e380e0331a13dd_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
1894e0de246deb45f6e380e0331a13dd_JaffaCakes118.exe
-
Size
8.9MB
-
MD5
1894e0de246deb45f6e380e0331a13dd
-
SHA1
4b1c9a6ff7e867ddbe6f096317a42b3a57a0d9c5
-
SHA256
8324e15c5e7d70eb9ea63a31ef95c241784dd314927fd5bafad0cbc726f0ba58
-
SHA512
3aad3e0b93e1bb966c87ab50233f607eb785cc946496d1a502879202a720e626942ff8a198ed526a2e9bff9b296b1c64453e518efca8d9f61bf38dd6b777cdb8
-
SSDEEP
196608:8fazg7DSmfazg7DSmSfazg7DSmfazg7DSmh:Tg7uVg7uwg7uVg7uy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation 1894e0de246deb45f6e380e0331a13dd_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 3212 7D57AD13E21.exe 4832 Scegli_nome_allegato.exe 4636 7D57AD13E21.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\7D57AD13E21.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3212 set thread context of 4636 3212 7D57AD13E21.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Scegli_nome_allegato.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Scegli_nome_allegato.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Internet Explorer\IESettingSync Scegli_nome_allegato.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Scegli_nome_allegato.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2216 reg.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4832 Scegli_nome_allegato.exe 4832 Scegli_nome_allegato.exe 4832 Scegli_nome_allegato.exe 4636 7D57AD13E21.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3236 wrote to memory of 2216 3236 1894e0de246deb45f6e380e0331a13dd_JaffaCakes118.exe 96 PID 3236 wrote to memory of 2216 3236 1894e0de246deb45f6e380e0331a13dd_JaffaCakes118.exe 96 PID 3236 wrote to memory of 2216 3236 1894e0de246deb45f6e380e0331a13dd_JaffaCakes118.exe 96 PID 3236 wrote to memory of 3212 3236 1894e0de246deb45f6e380e0331a13dd_JaffaCakes118.exe 98 PID 3236 wrote to memory of 3212 3236 1894e0de246deb45f6e380e0331a13dd_JaffaCakes118.exe 98 PID 3236 wrote to memory of 3212 3236 1894e0de246deb45f6e380e0331a13dd_JaffaCakes118.exe 98 PID 3236 wrote to memory of 4832 3236 1894e0de246deb45f6e380e0331a13dd_JaffaCakes118.exe 99 PID 3236 wrote to memory of 4832 3236 1894e0de246deb45f6e380e0331a13dd_JaffaCakes118.exe 99 PID 3236 wrote to memory of 4832 3236 1894e0de246deb45f6e380e0331a13dd_JaffaCakes118.exe 99 PID 3212 wrote to memory of 4636 3212 7D57AD13E21.exe 101 PID 3212 wrote to memory of 4636 3212 7D57AD13E21.exe 101 PID 3212 wrote to memory of 4636 3212 7D57AD13E21.exe 101 PID 3212 wrote to memory of 4636 3212 7D57AD13E21.exe 101 PID 3212 wrote to memory of 4636 3212 7D57AD13E21.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\1894e0de246deb45f6e380e0331a13dd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1894e0de246deb45f6e380e0331a13dd_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:2216
-
-
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4636
-
-
-
C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.9MB
MD5710682fd6b130f9b7c7cbe6f564efd4b
SHA1c2eab8bb24bbb2a504ac61dab8f9328c3972c15d
SHA2564676fcf81e5638434104df16df9a7de14cfb22ea06ec3d3f8af428d6eecf1a07
SHA512b72a476b030c6852303e183bdeb66877226538788f9a1ab399eb401e99a32281038de941d0ec2d7605d81ce835178cbc90e8fbe7966b6b8e3e8bf8e6acf9acd1
-
Filesize
1.0MB
MD5a2f259ceb892d3b0d1d121997c8927e3
SHA16e0a7239822b8d365d690a314f231286355f6cc6
SHA256ab01a333f38605cbcebd80e0a84ffae2803a9b4f6bebb1e9f773e949a87cb420
SHA5125ae1b60390c94c9e79d3b500a55b775d82556e599963d533170b9f35ad5cfa2df1b7d24de1890acf8e1e2c356830396091d46632dbc6ee43a7d042d4facb5dad