Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2024 18:50
Static task
static1
Behavioral task
behavioral1
Sample
29fe2c949b974249d80eb4bef2cddebc_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
29fe2c949b974249d80eb4bef2cddebc_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
29fe2c949b974249d80eb4bef2cddebc_JaffaCakes118.exe
-
Size
7.9MB
-
MD5
29fe2c949b974249d80eb4bef2cddebc
-
SHA1
d4bdbbc3a9f0cc9a01ea05019532a064f12653ca
-
SHA256
151274aeb9c0cc6a0f441c7a42f4ab5c2b58574989e499deabba4cdf35961543
-
SHA512
f0893fe54b2d1f23e8d135bb0a1e0dfe7d6e8d5665780ba56c87768a51d46ab8aeea7bd96656bc1acca9dcc20be4b58078cc98ab8ff80a837adc14df4f19d99f
-
SSDEEP
196608:8Lazg7DSmLazg7DSmLazg7DSmLazg7DSN:rg7uRg7uRg7uRg7uN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation 29fe2c949b974249d80eb4bef2cddebc_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 4464 7D57AD13E21.exe 4504 Scegli_nome_allegato.exe 3024 7D57AD13E21.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\7D57AD13E21.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4464 set thread context of 3024 4464 7D57AD13E21.exe 102 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Scegli_nome_allegato.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Scegli_nome_allegato.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\IESettingSync Scegli_nome_allegato.exe Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Scegli_nome_allegato.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2088 reg.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4504 Scegli_nome_allegato.exe 4504 Scegli_nome_allegato.exe 4504 Scegli_nome_allegato.exe 3024 7D57AD13E21.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2088 2200 29fe2c949b974249d80eb4bef2cddebc_JaffaCakes118.exe 97 PID 2200 wrote to memory of 2088 2200 29fe2c949b974249d80eb4bef2cddebc_JaffaCakes118.exe 97 PID 2200 wrote to memory of 2088 2200 29fe2c949b974249d80eb4bef2cddebc_JaffaCakes118.exe 97 PID 2200 wrote to memory of 4464 2200 29fe2c949b974249d80eb4bef2cddebc_JaffaCakes118.exe 99 PID 2200 wrote to memory of 4464 2200 29fe2c949b974249d80eb4bef2cddebc_JaffaCakes118.exe 99 PID 2200 wrote to memory of 4464 2200 29fe2c949b974249d80eb4bef2cddebc_JaffaCakes118.exe 99 PID 2200 wrote to memory of 4504 2200 29fe2c949b974249d80eb4bef2cddebc_JaffaCakes118.exe 100 PID 2200 wrote to memory of 4504 2200 29fe2c949b974249d80eb4bef2cddebc_JaffaCakes118.exe 100 PID 2200 wrote to memory of 4504 2200 29fe2c949b974249d80eb4bef2cddebc_JaffaCakes118.exe 100 PID 4464 wrote to memory of 3024 4464 7D57AD13E21.exe 102 PID 4464 wrote to memory of 3024 4464 7D57AD13E21.exe 102 PID 4464 wrote to memory of 3024 4464 7D57AD13E21.exe 102 PID 4464 wrote to memory of 3024 4464 7D57AD13E21.exe 102 PID 4464 wrote to memory of 3024 4464 7D57AD13E21.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\29fe2c949b974249d80eb4bef2cddebc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\29fe2c949b974249d80eb4bef2cddebc_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:2088
-
-
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3024
-
-
-
C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.9MB
MD51009506de9030a123d108ed7a00252e2
SHA10596ec4865c65b7cadcb11577f98c11046d54f0f
SHA256b346dc6fac9073558c4403f74f00259dfeec6c3466a9747c6cb81fb3dd438fc2
SHA5127b432b10f08bdfc21af4375b470a3028ddb65dd8b92f805a26955b6962ce191e171642348191dea3cf6ad34c868f07b208484b5dd4e2cab2145b48c8add42d9d
-
Filesize
1.0MB
MD5a2f259ceb892d3b0d1d121997c8927e3
SHA16e0a7239822b8d365d690a314f231286355f6cc6
SHA256ab01a333f38605cbcebd80e0a84ffae2803a9b4f6bebb1e9f773e949a87cb420
SHA5125ae1b60390c94c9e79d3b500a55b775d82556e599963d533170b9f35ad5cfa2df1b7d24de1890acf8e1e2c356830396091d46632dbc6ee43a7d042d4facb5dad