Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2024 20:22
Static task
static1
Behavioral task
behavioral1
Sample
2bf8b80d12f72c06d8566797f1829d70_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2bf8b80d12f72c06d8566797f1829d70_JaffaCakes118.exe
Resource
win10v2004-20231215-en
General
-
Target
2bf8b80d12f72c06d8566797f1829d70_JaffaCakes118.exe
-
Size
224KB
-
MD5
2bf8b80d12f72c06d8566797f1829d70
-
SHA1
37d029aad8531adeeea53cd3a549390c3a913627
-
SHA256
81b6fe197e9493963fd3e66ebae93ee92f586bd9bd8fa275e3ea0e0723975dd2
-
SHA512
7579eed96a37747a8b97791b83f1efd410f19d52be0e00a62165ba8c437842c03af63f47fe34a220daaddaa7d0bf42122820da3b16c850e31b49996c2ff0086c
-
SSDEEP
3072:q8aQs4BSCpikIp8PwzjdIC0fyEixcHw2m45UpXMhv8XWaOKHmv1z0oo0KXDDlxG3:qTDOHnSP9IRfypSsX500oHKXXG+PZMx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2bf8b80d12f72c06d8566797f1829d70_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 2bf8b80d12f72c06d8566797f1829d70_JaffaCakes118.exe -
Drops startup file 2 IoCs
Processes:
2bf8b80d12f72c06d8566797f1829d70_JaffaCakes118.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2bf8b80d12f72c06d8566797f1829d70_JaffaCakes118.exe 2bf8b80d12f72c06d8566797f1829d70_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2bf8b80d12f72c06d8566797f1829d70_JaffaCakes118.exe 2bf8b80d12f72c06d8566797f1829d70_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2bf8b80d12f72c06d8566797f1829d70_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IBQB4T4P1T = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\2bf8b80d12f72c06d8566797f1829d70_JaffaCakes118.exe\"" 2bf8b80d12f72c06d8566797f1829d70_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2bf8b80d12f72c06d8566797f1829d70_JaffaCakes118.exedescription pid process target process PID 4600 wrote to memory of 2904 4600 2bf8b80d12f72c06d8566797f1829d70_JaffaCakes118.exe schtasks.exe PID 4600 wrote to memory of 2904 4600 2bf8b80d12f72c06d8566797f1829d70_JaffaCakes118.exe schtasks.exe PID 4600 wrote to memory of 2904 4600 2bf8b80d12f72c06d8566797f1829d70_JaffaCakes118.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bf8b80d12f72c06d8566797f1829d70_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2bf8b80d12f72c06d8566797f1829d70_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\2bf8b80d12f72c06d8566797f1829d70_JaffaCakes118.exe2⤵
- Creates scheduled task(s)
PID:2904
-