Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
05-04-2024 02:30
Static task
static1
Behavioral task
behavioral1
Sample
c85b10abe69d46e64027f311ca445b79_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c85b10abe69d46e64027f311ca445b79_JaffaCakes118.exe
Resource
win10v2004-20240319-en
General
-
Target
c85b10abe69d46e64027f311ca445b79_JaffaCakes118.exe
-
Size
20KB
-
MD5
c85b10abe69d46e64027f311ca445b79
-
SHA1
396f7bddf93d1d43f9061cf34b8aaf793a40f8ec
-
SHA256
0b248187a0fda22086ff20301424dc97b8bcebf8308f59a0ea30383fd85a3cf2
-
SHA512
63e71a60a9365536e711751139e84b235b05bd6680ec494a1c53bed67e0a75d0bbc7e1d17fe5712b5dc3259dd11777439d219c3e65a1930c1e89b2d71dcdb7bf
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYQMx+L4b:hDXWipuE+K3/SSHgxmHZb
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation c85b10abe69d46e64027f311ca445b79_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation DEM70FA.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation DEMCA35.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation DEM2239.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation DEM7877.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation DEMCFBF.exe -
Executes dropped EXE 6 IoCs
pid Process 1156 DEM70FA.exe 5080 DEMCA35.exe 2812 DEM2239.exe 3848 DEM7877.exe 2724 DEMCFBF.exe 4544 DEM27F1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1156 2372 c85b10abe69d46e64027f311ca445b79_JaffaCakes118.exe 109 PID 2372 wrote to memory of 1156 2372 c85b10abe69d46e64027f311ca445b79_JaffaCakes118.exe 109 PID 2372 wrote to memory of 1156 2372 c85b10abe69d46e64027f311ca445b79_JaffaCakes118.exe 109 PID 1156 wrote to memory of 5080 1156 DEM70FA.exe 113 PID 1156 wrote to memory of 5080 1156 DEM70FA.exe 113 PID 1156 wrote to memory of 5080 1156 DEM70FA.exe 113 PID 5080 wrote to memory of 2812 5080 DEMCA35.exe 117 PID 5080 wrote to memory of 2812 5080 DEMCA35.exe 117 PID 5080 wrote to memory of 2812 5080 DEMCA35.exe 117 PID 2812 wrote to memory of 3848 2812 DEM2239.exe 119 PID 2812 wrote to memory of 3848 2812 DEM2239.exe 119 PID 2812 wrote to memory of 3848 2812 DEM2239.exe 119 PID 3848 wrote to memory of 2724 3848 DEM7877.exe 129 PID 3848 wrote to memory of 2724 3848 DEM7877.exe 129 PID 3848 wrote to memory of 2724 3848 DEM7877.exe 129 PID 2724 wrote to memory of 4544 2724 DEMCFBF.exe 131 PID 2724 wrote to memory of 4544 2724 DEMCFBF.exe 131 PID 2724 wrote to memory of 4544 2724 DEMCFBF.exe 131
Processes
-
C:\Users\Admin\AppData\Local\Temp\c85b10abe69d46e64027f311ca445b79_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c85b10abe69d46e64027f311ca445b79_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\DEM70FA.exe"C:\Users\Admin\AppData\Local\Temp\DEM70FA.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\DEMCA35.exe"C:\Users\Admin\AppData\Local\Temp\DEMCA35.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\DEM2239.exe"C:\Users\Admin\AppData\Local\Temp\DEM2239.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\DEM7877.exe"C:\Users\Admin\AppData\Local\Temp\DEM7877.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\DEMCFBF.exe"C:\Users\Admin\AppData\Local\Temp\DEMCFBF.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\DEM27F1.exe"C:\Users\Admin\AppData\Local\Temp\DEM27F1.exe"7⤵
- Executes dropped EXE
PID:4544
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5716 --field-trial-handle=2264,i,1475924722205134884,16549311107360026087,262144 --variations-seed-version /prefetch:81⤵PID:1564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD55cc2c48b3b9b7a5412f0a396ad823b63
SHA1520d8bdf1eabbaafa2396859ff9795a40e06227d
SHA256be3af9c746d19cc9bd407fa3e9801469f0c8bd4b668a0b75e3d68d01b4e9e9f9
SHA5121ffb0a850d1766c20ba65757bbe15478edcb439d831478603be0be76b4ae3f1d02f70d5af89845ef7d0f76179ad300b0679698935aad1b991f20999f7747c765
-
Filesize
20KB
MD5134225cda4d331211dfc0a212412ec40
SHA1693aa646086f3a55835624a2046adb03bdb1e330
SHA256adbf18f0d7f0a9e7be197aabb3816dd928ef015772144553a68d6659e32720f5
SHA512d053e6c5481981585ee11ca58a471621a703f24d07775096bcee758541a3f133fb2913a499364b93ddd0a8eee5bc31d7d4769d8770014db2f7d0d4cfda3d3265
-
Filesize
20KB
MD5b40ad273cc89662eb5980c6d3ba1407b
SHA1836f1e11a2354c6062de69ddde17f6091a79fccd
SHA256fc9d651329dfc1198135e6189dd971407f2d4901e145ec013cb12374fb4dcae3
SHA5125e981a70796174be49f124eae047784be292f836c7cb7b8ddd53d08e619fb10d8f259256182dba7bf27e15b2327888e993730ee8558a5808aff7c0f9690b6681
-
Filesize
20KB
MD5a46d05583970b53595fbfd606f8cedd1
SHA12794998d42c82ca821cd36e841c529126610e402
SHA256e5f9279bf18b0fb2ab330385db1d763b07130eb615f73450aaa1681a08a87549
SHA5129dcca60aa7a045852881e013d492f1d815ea728d7be87a6a40dacfa4f4d8aa558dae8cf5ed5924b8c92214884256a28678108aeb16fb52c825a900af44b4f068
-
Filesize
20KB
MD5f5c65a21cb865b322370a51ad7028ba6
SHA196cd796ce6bc44c219700854d102db454a6d0b75
SHA2568dc8cd6b91924ebf59af9d226b0080e17b61cef5a1103f50cc87868182a87e39
SHA512e49a41106c7996f5ed14d7423102925c8f1d7f18becdcbce36bbf7c951b2f645c4bd6e4406dc16c666ef23d3756b1dd569b1fa63ebaf5b6fb60d495ee4ff097a
-
Filesize
20KB
MD5baa3b17501059ab034c254b3bd0c56d0
SHA1f300f1e130de483aee0c8d5660d985628963cb0f
SHA2560d7a03c7ef0dab312f33fffa5585701a0e89abb894da6eaaf8bd2997eb93f156
SHA51282538d1ab79f71cfbeefa57c1ecf2cea05c7a2732944249fac30d699a37a70d483331974b72eae59334ad3f0db691a1021a4f331fc1bfa66a8ac248ff113af56