Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 10:45
Static task
static1
Behavioral task
behavioral1
Sample
1ffbc834f4fa6e7b67431715665caaa6_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
1ffbc834f4fa6e7b67431715665caaa6_JaffaCakes118.exe
-
Size
60KB
-
MD5
1ffbc834f4fa6e7b67431715665caaa6
-
SHA1
ee2ec528b9bc60e7e45eee87fc1b71bdae899fe9
-
SHA256
bc30f5d97dab7340562c99beb25245cf90595d52c3bb6c7ca32c10b39b3468d3
-
SHA512
670c1af43fd8ae7026282e1c5c60a569401d7432a008cf9f90747eb8e011e3ecbb4aad9f7f301836176a8367fa9955a999e423e82573930afc8bbade61651de9
-
SSDEEP
768:n5mhew0GpSyMe6hwUkdwJzh+qciaQRENEzxZbARtR06g2wqp4YPeznellmqGwxPE:nK0GjMeQG3iaQREuVZ6ro29p4YxbKdnn
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation 1ffbc834f4fa6e7b67431715665caaa6_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3372 biudfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2700 wrote to memory of 3372 2700 1ffbc834f4fa6e7b67431715665caaa6_JaffaCakes118.exe 91 PID 2700 wrote to memory of 3372 2700 1ffbc834f4fa6e7b67431715665caaa6_JaffaCakes118.exe 91 PID 2700 wrote to memory of 3372 2700 1ffbc834f4fa6e7b67431715665caaa6_JaffaCakes118.exe 91 PID 2700 wrote to memory of 3828 2700 1ffbc834f4fa6e7b67431715665caaa6_JaffaCakes118.exe 92 PID 2700 wrote to memory of 3828 2700 1ffbc834f4fa6e7b67431715665caaa6_JaffaCakes118.exe 92 PID 2700 wrote to memory of 3828 2700 1ffbc834f4fa6e7b67431715665caaa6_JaffaCakes118.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ffbc834f4fa6e7b67431715665caaa6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1ffbc834f4fa6e7b67431715665caaa6_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
PID:3372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵PID:3828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5c975007f2115ce8cc01803603f4b9fc7
SHA1b86f7e73c6814c9fe87dedac143c8151a974bdc1
SHA25637fde4d6e011a768b4a4f14ca5a6df881e5ff3a29abdcc27b72fe0584af7e33c
SHA51228a30d2d2ed63a741f5ea003d9eb4292e738dd09d35aa5c6103ef35e2dd1feadeaee72211d1f3abdf55afb723b6510440c524ba57e883b2269875ee612b15084
-
Filesize
512B
MD555e10a9af74d3f3fa5ae3cb7ff5ad9d4
SHA1449221fd8d7196a54de2bd583625d8d1b64db56a
SHA256a945a44cfe50423c01f26a16445ed177a347052e791364a9cb7de6bcaa18f3c1
SHA5124af5ba74467b4c61302ea9571f19346c05f911843f2c6153fcd9a7340f9bc6e1f8867cdb72ec7ba0dc4930199aa5c302711ad5da9fd35241839418f6e70a515a
-
Filesize
302B
MD5125e50ac0f9c0efa88381f2867a95d69
SHA15857bd74837ac898883e77222f8cdc0f98bd4033
SHA25653b91439de26ba00fea29150ebc0eb2d5d2d0799b529a8a6fa0e847cc05a10dc
SHA512b49360aae8e007addf3a6b0534ff319b7e4730018c89e139a9ba8c73b0220556d9c76bab0387fa5cebb637d19bf0a9173a47b217a6a53cb11b2b14bac4b12e43