Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2024 13:31
Static task
static1
Behavioral task
behavioral1
Sample
23440f371220f5473ee19450f12d9e28_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
23440f371220f5473ee19450f12d9e28_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
23440f371220f5473ee19450f12d9e28_JaffaCakes118.exe
-
Size
33KB
-
MD5
23440f371220f5473ee19450f12d9e28
-
SHA1
4da5871b1a75d1c4ffcf0b1f479f5eaf7d14d8dd
-
SHA256
a1a8dbfdf668d614386ac24cdfea52df2d58e472f11837ddacd92867cc1b4d71
-
SHA512
8ce3e8351ee7244b9dd34add94a7e9eb1643ca2ada727a63a65b8d3595f84716b7b8f101bff055baafab893cd96cefaa2fd61d74bf7f0cdc9e3d53e2a4016183
-
SSDEEP
768:kf1Y9RRw/dUT6vurGd/pkUOyGAv+rh95kRCalySylZyya:GY9jw/dUT62rGdiUOWWrNlg
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation 23440f371220f5473ee19450f12d9e28_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4128 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1832 wrote to memory of 4128 1832 23440f371220f5473ee19450f12d9e28_JaffaCakes118.exe 94 PID 1832 wrote to memory of 4128 1832 23440f371220f5473ee19450f12d9e28_JaffaCakes118.exe 94 PID 1832 wrote to memory of 4128 1832 23440f371220f5473ee19450f12d9e28_JaffaCakes118.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\23440f371220f5473ee19450f12d9e28_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\23440f371220f5473ee19450f12d9e28_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:4128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5bf33311794ce1426fd9c5774d9df50fb
SHA11b4301a5d27870750bcf27e66f6b08532a7e1831
SHA256bda7eb6375347db16875ad491d845b50d126aacf5a858596e45e8a610567d08e
SHA51232f2d934d0d218f65be8f9d3efe419878ee80313dd1f401dc73b25081f3e875e48cdc043e5f88ab085d3dc7fffc4a42595efdcb9ac2531b999c5193de0b7cdeb