Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2024, 11:18
Static task
static1
Behavioral task
behavioral1
Sample
d24d403152e422b4ec7bcd4f8ce37e59_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d24d403152e422b4ec7bcd4f8ce37e59_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
d24d403152e422b4ec7bcd4f8ce37e59_JaffaCakes118.exe
-
Size
15KB
-
MD5
d24d403152e422b4ec7bcd4f8ce37e59
-
SHA1
18dfd2cdb03de3c2aa4944e6e80342abad2ffd7c
-
SHA256
b5a3bc1ccfb072c5f73967f0c507b7d66594912bb002e28df0efa2143a53fde9
-
SHA512
8836c260981a5ebeaa764a57c1574513859e79c0d80d9cf0d1a124dd2f0dad4623ba7731266f3a9195c1bead37a08b2adab6bff0a6402a9199b7a1b6c2c926e4
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhY4lCj:hDXWipuE+K3/SSHgxmF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation DEME966.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation DEM4002.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation DEM9601.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation d24d403152e422b4ec7bcd4f8ce37e59_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation DEM3BF0.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation DEM9357.exe -
Executes dropped EXE 6 IoCs
pid Process 732 DEM3BF0.exe 4528 DEM9357.exe 3256 DEME966.exe 532 DEM4002.exe 4136 DEM9601.exe 2452 DEMEC4F.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4936 wrote to memory of 732 4936 d24d403152e422b4ec7bcd4f8ce37e59_JaffaCakes118.exe 97 PID 4936 wrote to memory of 732 4936 d24d403152e422b4ec7bcd4f8ce37e59_JaffaCakes118.exe 97 PID 4936 wrote to memory of 732 4936 d24d403152e422b4ec7bcd4f8ce37e59_JaffaCakes118.exe 97 PID 732 wrote to memory of 4528 732 DEM3BF0.exe 100 PID 732 wrote to memory of 4528 732 DEM3BF0.exe 100 PID 732 wrote to memory of 4528 732 DEM3BF0.exe 100 PID 4528 wrote to memory of 3256 4528 DEM9357.exe 102 PID 4528 wrote to memory of 3256 4528 DEM9357.exe 102 PID 4528 wrote to memory of 3256 4528 DEM9357.exe 102 PID 3256 wrote to memory of 532 3256 DEME966.exe 104 PID 3256 wrote to memory of 532 3256 DEME966.exe 104 PID 3256 wrote to memory of 532 3256 DEME966.exe 104 PID 532 wrote to memory of 4136 532 DEM4002.exe 106 PID 532 wrote to memory of 4136 532 DEM4002.exe 106 PID 532 wrote to memory of 4136 532 DEM4002.exe 106 PID 4136 wrote to memory of 2452 4136 DEM9601.exe 108 PID 4136 wrote to memory of 2452 4136 DEM9601.exe 108 PID 4136 wrote to memory of 2452 4136 DEM9601.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\d24d403152e422b4ec7bcd4f8ce37e59_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d24d403152e422b4ec7bcd4f8ce37e59_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\DEM3BF0.exe"C:\Users\Admin\AppData\Local\Temp\DEM3BF0.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Users\Admin\AppData\Local\Temp\DEM9357.exe"C:\Users\Admin\AppData\Local\Temp\DEM9357.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\DEME966.exe"C:\Users\Admin\AppData\Local\Temp\DEME966.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\DEM4002.exe"C:\Users\Admin\AppData\Local\Temp\DEM4002.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\DEM9601.exe"C:\Users\Admin\AppData\Local\Temp\DEM9601.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\DEMEC4F.exe"C:\Users\Admin\AppData\Local\Temp\DEMEC4F.exe"7⤵
- Executes dropped EXE
PID:2452
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5e3d711ca24a76588c8c9470dcc3d32ae
SHA16d03f7966683c0aff823e25f5d2745482e2f0f2b
SHA256344c007c902857ef8de8561f6977362bdee02414162d495bd4fff739622e8676
SHA51264aacff4d4dda4eee0dba08bf46e0c8ef9050ffc705e8ee91fa1df30291c6e9a8d10ee63d478bef8f299c885188c4daad524d488efa6c08a21efc652b799aec4
-
Filesize
15KB
MD5b6234f956c662323484ed6047f0e67b0
SHA1532a74aaec75a55f5e8fa9a17f95745fbd5e4a9a
SHA256e2a9aca0428d8789e69021e224ca71675af1224d442d12681629c83275a9cc1d
SHA5121a653024f0663ba54193feb721a3b9a948910dbcaf206aeae3cb999660eff9b1e5e9d292a20022a8ce35164f6aba56a53160aaed72f231a07c7c71cbfe065f11
-
Filesize
15KB
MD52ef167fc16e641dedd82c98a12d9ad3f
SHA18cf444ce3d8736a852b35d06204c29abba5c00ac
SHA256b3c15c7f0d2acf84a8049f50311528c72597c5db475ea0d5e5796221f3be088e
SHA512c33d260ace29fcae96b4f783a011518dc1ffd276c9a7885ef5153348dd1f33a1156e9d83342b2eb02b8372992ed671016394f799cc607f28ab3ddb2471692e1a
-
Filesize
15KB
MD5e3cf25138bb173acb466f90424204b4e
SHA142b20b142644b6a18af57ebbdd7ed9e402031f7d
SHA256aa6cfa4b8209ee325d71d604db03c47e755b830ff7838c0c3efb9eafe00c3a4a
SHA512fd37ff44402a2775fcb4bbf67ee91cf8738b606e27bf0e4dd46309fdb7c599097fc00ed6937fa6cd2df432dfeede91b7fd506fb3d67a8b5d3e46c2379f460697
-
Filesize
15KB
MD5a68166f59a4cb649bdf52b4d6bbdcdcd
SHA1d909e04157077c0455ad70c282cc366db96554b0
SHA2563f93be7b4a6e8a635ed2cccecee692f95b08c49b58bdadd7c689bcfe5ef8fe64
SHA512aff50e3ddb3a1ace83c4443afb9fed8020b2b3026b781f01bfde6dcbac257579ce8b55fb41e94426f99ed81f59822e7baacf7b54757feb11e7d8d3b1488afaa7
-
Filesize
15KB
MD5eef2f0099899a7f134d9633d087560f5
SHA14d9f726ac0fe8a02f3fd6426fa25228f979025f2
SHA2567933bf9c17a59346809fb872dc1b3db4cfcb6de2d8e2c64db00d99ffff58e1e0
SHA512c45db4a2a4d22c5b336055796ec5af1fb41c1b828db231d3d8eeddb5c54c303e98576f89216dfe7769117640e1e4617c44a7087faba890fbb3e40db59799375c