Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 16:24
Static task
static1
Behavioral task
behavioral1
Sample
26d528273d64f31a01d7e5c996aed784_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
26d528273d64f31a01d7e5c996aed784_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
26d528273d64f31a01d7e5c996aed784_JaffaCakes118.exe
-
Size
16KB
-
MD5
26d528273d64f31a01d7e5c996aed784
-
SHA1
9c0e21824542d0c424d140e287d7081d0b09c5a0
-
SHA256
c8bb87265246115782284ea649d91abd0189510f45df49df27db008608c4c38b
-
SHA512
a43294b2ca23815039e2c448c253bc86b012bdcad7ee5257a3c28799459bf99236b799b543cb652b4800de2872da0bb46c1eb756dfad0b43db62729d96026dd8
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYQMxt2F:hDXWipuE+K3/SSHgxmHDU
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation 26d528273d64f31a01d7e5c996aed784_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation DEM664B.exe Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation DEMBF87.exe Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation DEM178A.exe Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation DEM6F6E.exe Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation DEMC733.exe -
Executes dropped EXE 6 IoCs
pid Process 4732 DEM664B.exe 1296 DEMBF87.exe 1860 DEM178A.exe 4392 DEM6F6E.exe 1172 DEMC733.exe 1596 DEM1F07.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3420 wrote to memory of 4732 3420 26d528273d64f31a01d7e5c996aed784_JaffaCakes118.exe 97 PID 3420 wrote to memory of 4732 3420 26d528273d64f31a01d7e5c996aed784_JaffaCakes118.exe 97 PID 3420 wrote to memory of 4732 3420 26d528273d64f31a01d7e5c996aed784_JaffaCakes118.exe 97 PID 4732 wrote to memory of 1296 4732 DEM664B.exe 100 PID 4732 wrote to memory of 1296 4732 DEM664B.exe 100 PID 4732 wrote to memory of 1296 4732 DEM664B.exe 100 PID 1296 wrote to memory of 1860 1296 DEMBF87.exe 102 PID 1296 wrote to memory of 1860 1296 DEMBF87.exe 102 PID 1296 wrote to memory of 1860 1296 DEMBF87.exe 102 PID 1860 wrote to memory of 4392 1860 DEM178A.exe 104 PID 1860 wrote to memory of 4392 1860 DEM178A.exe 104 PID 1860 wrote to memory of 4392 1860 DEM178A.exe 104 PID 4392 wrote to memory of 1172 4392 DEM6F6E.exe 106 PID 4392 wrote to memory of 1172 4392 DEM6F6E.exe 106 PID 4392 wrote to memory of 1172 4392 DEM6F6E.exe 106 PID 1172 wrote to memory of 1596 1172 DEMC733.exe 108 PID 1172 wrote to memory of 1596 1172 DEMC733.exe 108 PID 1172 wrote to memory of 1596 1172 DEMC733.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\26d528273d64f31a01d7e5c996aed784_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\26d528273d64f31a01d7e5c996aed784_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\DEM664B.exe"C:\Users\Admin\AppData\Local\Temp\DEM664B.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\DEMBF87.exe"C:\Users\Admin\AppData\Local\Temp\DEMBF87.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\DEM178A.exe"C:\Users\Admin\AppData\Local\Temp\DEM178A.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\DEM6F6E.exe"C:\Users\Admin\AppData\Local\Temp\DEM6F6E.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\DEMC733.exe"C:\Users\Admin\AppData\Local\Temp\DEMC733.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\DEM1F07.exe"C:\Users\Admin\AppData\Local\Temp\DEM1F07.exe"7⤵
- Executes dropped EXE
PID:1596
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD590759a3d815c81f7f473fd4d6bf3a441
SHA184fd03e0d0dd57af8982043669eba9db27ab995a
SHA256a3f0c92408e6fb89d681af02215dd91031e6210587c21fbcc83d30cae9c20da2
SHA51271a4a82b31566f7d4960f5f45883d4a38c5f4b26bf2a7971100fd826831263acf8dd6d51652d5b4e99eb64bceda19c279c0a471ca77102517563dd0e7d836230
-
Filesize
16KB
MD5a12c5423819c5459ff12520fe5650097
SHA195743a4df1ef9b0b2157b12870a39d7abada3f26
SHA256e02ffefb9bb147e2abd8e41663146020fbb1d438d16f1e41b81cfda6a905b46f
SHA51243ce6b80cfe040d3e109507520c56d5d66b03623180a3193e25c222066a1bcb28da73b588dc600d173933e1c92a14c3fc7584220c0398968eb6687b082c90d69
-
Filesize
16KB
MD5aef06c4596713ec08be3a21429e51674
SHA136620536cd8b489f3d456d64ed936acc06e7c207
SHA256423958e0c252dc868a923778a3e9411befc93de2b09978c71b1b10cb78a1d7fe
SHA51256918ce529d65d45d9399d273b1b5f51005af97b7d43cf26753a2b0d1ea3bf496de39620228bcbd38af90a4ae949f6a9f1e69f6f0ab4e014d69cc879df328a34
-
Filesize
16KB
MD5c8a6ba92235c6fe9a26178c6c6595254
SHA138749653b347979c8176ed54222858d9722bd12d
SHA256e8b9c2e4adba231b09e9579aed709878a38a292bce1a8a59e42fba69c4f715cf
SHA512f97a806a9521fae02a819ad0bfcb6a878ba40ab9bed5f0184efe846158394b174d5c7e44ecbc4319f1eb9071f97ab37c0bd93d1f648006ffe7903a45b6ae8ee6
-
Filesize
16KB
MD5ef5cfcd4aa605c21207fa5485be1355b
SHA199c4e52fb0c55b39dfad866a086a6d64e829d3e1
SHA256180c4cbcfa2b868fb14cde3745ac2057ac8423be391737b5b88111f2796472fa
SHA5126afb6ca2f677ac6a54e7a9cf66e1adc6580b750b2954f8f6908f6d8502c71d2b22080a74d1b3deaea84d6b06143803f17e5be574c272e6679ba25b5b21f16767
-
Filesize
16KB
MD55ada51800b3ef0c13d2782aaeffe4696
SHA12f9c3089e4c9d8d34021dfbbe7c8fed341811770
SHA2563493bef2df3d90182e3ae65cb0ed0f809cbf28447f25b89aed951d69b12ae643
SHA51230ea93db6e1504c5aeb3c9734d3f04313b205e4e52d04427ab5fc92a2bf04245075b929050b5d5118038d01b57b2c04f199963a0c17ce80f6509a176e757acb8