Analysis
-
max time kernel
149s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2024 13:54
Static task
static1
Behavioral task
behavioral1
Sample
23ba6264867c529085c766f6b984db80_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
23ba6264867c529085c766f6b984db80_JaffaCakes118.exe
Resource
win10v2004-20240319-en
General
-
Target
23ba6264867c529085c766f6b984db80_JaffaCakes118.exe
-
Size
152KB
-
MD5
23ba6264867c529085c766f6b984db80
-
SHA1
a5509ce39be3b00ce89fccc497cba46348648d3b
-
SHA256
d69c7020eeb7de540f830d03515ec2250e38ea65d3d07c193cdceab91690352c
-
SHA512
c8981dce82651071ce17351cc84d85ba5ead1a1c73bdc35311e705400c8a7b293360b9a6580b793b96c9b5f3bd5ce4e116cdd069bdd3d8f2191cf9c0ecba8a7f
-
SSDEEP
3072:gbpfhDOW7hBhr4pX5r9x29E9z5HpZDGunCc9/0Q7BWDjIIO0r9bD6G:UJhBhrAXvQE9hPD7l08BkjIf0r9bWG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation COM7.EXE -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PDF Reader Launcher.exe COM7.EXE -
Executes dropped EXE 4 IoCs
pid Process 2924 ashcv.exe 4172 COM7.EXE 2532 COM7.EXE 1500 ashcv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\COM_LOADER = "\\\\.\\F:\\Program Files\\PDF_Reader\\bin\\COM7.EXE" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 524 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 2924 ashcv.exe 2924 ashcv.exe 4172 COM7.EXE 4172 COM7.EXE 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 2532 COM7.EXE 2532 COM7.EXE 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 1500 ashcv.exe 1500 ashcv.exe 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 4172 COM7.EXE 4172 COM7.EXE 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 4172 COM7.EXE 4172 COM7.EXE 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 4172 COM7.EXE 4172 COM7.EXE 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 4172 COM7.EXE 4172 COM7.EXE 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 4172 COM7.EXE 4172 COM7.EXE 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 4172 COM7.EXE 4172 COM7.EXE 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 4172 COM7.EXE 4172 COM7.EXE 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 4172 COM7.EXE 4172 COM7.EXE 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 4172 COM7.EXE 4172 COM7.EXE 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 4172 COM7.EXE 4172 COM7.EXE 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 4172 COM7.EXE 4172 COM7.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2924 ashcv.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2924 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 99 PID 1544 wrote to memory of 2924 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 99 PID 1544 wrote to memory of 2924 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 99 PID 1544 wrote to memory of 4172 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 104 PID 1544 wrote to memory of 4172 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 104 PID 1544 wrote to memory of 4172 1544 23ba6264867c529085c766f6b984db80_JaffaCakes118.exe 104 PID 4172 wrote to memory of 524 4172 COM7.EXE 108 PID 4172 wrote to memory of 524 4172 COM7.EXE 108 PID 4172 wrote to memory of 524 4172 COM7.EXE 108 PID 2924 wrote to memory of 2532 2924 ashcv.exe 110 PID 2924 wrote to memory of 2532 2924 ashcv.exe 110 PID 2924 wrote to memory of 2532 2924 ashcv.exe 110 PID 4172 wrote to memory of 1500 4172 COM7.EXE 111 PID 4172 wrote to memory of 1500 4172 COM7.EXE 111 PID 4172 wrote to memory of 1500 4172 COM7.EXE 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\23ba6264867c529085c766f6b984db80_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\23ba6264867c529085c766f6b984db80_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\ashcv.exe\\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\ashcv.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\COM7.EXE\\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\COM7.EXE3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
-
-
C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\COM7.EXE\\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\COM7.EXE2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /t REG_SZ /v COM_LOADER /d "\\.\F:\Program Files\PDF_Reader\bin\COM7.EXE"3⤵
- Adds Run key to start application
- Modifies registry key
PID:524
-
-
C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\ashcv.exe\\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\ashcv.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2584 --field-trial-handle=3536,i,10914981530159316853,12381340356750224673,262144 --variations-seed-version /prefetch:81⤵PID:4388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD5beb1d94050b54428e03464c90f466181
SHA19b9f90a1469e4b27955f63cf982bbd9627eaeeae
SHA256956be1a44e0354109258ac3d33e58274b661250feacfe0e3f7b150c35ccfa99b
SHA5124b725e780d50a9a4d819b9ee2937e5911cf9a48d4194ee1adfd65cc7c51a8090c5f51c97184a04829035904112006661fd4ca7c3876dae2368df6d8fd6792e86
-
Filesize
152KB
MD583731394f7d26f266ff2158d972b6281
SHA10d30ebbaee18431b6929edf4373b7772d2f6fd89
SHA25646ee12d6a2e24f223fde780dda85388a66ddc2d6363179f2b15c91a3a350ea5f
SHA512aae1f4c433fbf673abfb2ab618ee882b62980b17a6b417ba55cde8e33a42e6d815ad509c113c1930dfeb5db2d8f6f0244f4e42d84bd166424e3ccdc9693a1827