Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2024, 05:05
Static task
static1
Behavioral task
behavioral1
Sample
dbf774ad30e4afa690724b0e86154ca7_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dbf774ad30e4afa690724b0e86154ca7_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
dbf774ad30e4afa690724b0e86154ca7_JaffaCakes118.exe
-
Size
16KB
-
MD5
dbf774ad30e4afa690724b0e86154ca7
-
SHA1
6aa2400f59aedb85cb48572e7029e2b947920280
-
SHA256
afbe91520bb7a927c54cda30e50e116429e4d68df053f7a31f259e7715854bbf
-
SHA512
4978045dd84c3c1d5f2e8d8939fcc2da49a7a1bc17126612a216f4d83cede6a112aff53a2c6985fa1c5c84433ebe939402b6a2924da467cc4539a792d31112a2
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhY5tL:hDXWipuE+K3/SSHgxm/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation dbf774ad30e4afa690724b0e86154ca7_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation DEM977D.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation DEMF0C8.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation DEM488D.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation DEMA15C.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation DEMF8D2.exe -
Executes dropped EXE 6 IoCs
pid Process 3352 DEM977D.exe 1124 DEMF0C8.exe 1896 DEM488D.exe 2376 DEMA15C.exe 5088 DEMF8D2.exe 3796 DEM5104.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2488 wrote to memory of 3352 2488 dbf774ad30e4afa690724b0e86154ca7_JaffaCakes118.exe 97 PID 2488 wrote to memory of 3352 2488 dbf774ad30e4afa690724b0e86154ca7_JaffaCakes118.exe 97 PID 2488 wrote to memory of 3352 2488 dbf774ad30e4afa690724b0e86154ca7_JaffaCakes118.exe 97 PID 3352 wrote to memory of 1124 3352 DEM977D.exe 100 PID 3352 wrote to memory of 1124 3352 DEM977D.exe 100 PID 3352 wrote to memory of 1124 3352 DEM977D.exe 100 PID 1124 wrote to memory of 1896 1124 DEMF0C8.exe 102 PID 1124 wrote to memory of 1896 1124 DEMF0C8.exe 102 PID 1124 wrote to memory of 1896 1124 DEMF0C8.exe 102 PID 1896 wrote to memory of 2376 1896 DEM488D.exe 104 PID 1896 wrote to memory of 2376 1896 DEM488D.exe 104 PID 1896 wrote to memory of 2376 1896 DEM488D.exe 104 PID 2376 wrote to memory of 5088 2376 DEMA15C.exe 106 PID 2376 wrote to memory of 5088 2376 DEMA15C.exe 106 PID 2376 wrote to memory of 5088 2376 DEMA15C.exe 106 PID 5088 wrote to memory of 3796 5088 DEMF8D2.exe 108 PID 5088 wrote to memory of 3796 5088 DEMF8D2.exe 108 PID 5088 wrote to memory of 3796 5088 DEMF8D2.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbf774ad30e4afa690724b0e86154ca7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dbf774ad30e4afa690724b0e86154ca7_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\DEM977D.exe"C:\Users\Admin\AppData\Local\Temp\DEM977D.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\DEMF0C8.exe"C:\Users\Admin\AppData\Local\Temp\DEMF0C8.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\DEM488D.exe"C:\Users\Admin\AppData\Local\Temp\DEM488D.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\DEMA15C.exe"C:\Users\Admin\AppData\Local\Temp\DEMA15C.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\DEMF8D2.exe"C:\Users\Admin\AppData\Local\Temp\DEMF8D2.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\DEM5104.exe"C:\Users\Admin\AppData\Local\Temp\DEM5104.exe"7⤵
- Executes dropped EXE
PID:3796
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD547185828edbeb0aa38191a61501817f7
SHA198eeaa651a9f363d8a4ba5b453ef5435bd0e4ff9
SHA256d2513b29678b04fb6e4dfba760442fd2de2184401926f772b73526ccce6893e4
SHA5120818255de8029eaa7e421b2903911d2dfa1d982797936ac4e37eed5c0eff12a87ed1a9c7a5244ed69fa5e5e1744ced91f0a56a300f649bd0ff327e65255ec344
-
Filesize
16KB
MD5af8f3e0c648e2447ad0850741513a172
SHA1475908a359d8add1e414ddfab153a87f30ebe41d
SHA2564cb38b1052379177d87948d15a12c2d6170a832448d10dd20074aa2d50a7ab3f
SHA512efb76a50ff74e72d57bb75b7594767d897096b0cc9ca118692f7d5b410293d4725f6befd50c569577e46b811d178082e10cc9d08a344d26cd73b6d514415df3c
-
Filesize
16KB
MD515c79248ad1c92920e6774b4aee6b90e
SHA180544f02f17732613c4b91029d379f4f6b05e4bc
SHA2568541d2aee6a4336cf63342b1997877230810514ed4c4f9199cfc305b149690d7
SHA51224f8e2a0970fab17f4a471aaf6331c3331e412b86ee3703aca66b9783feb4d2cda1d0577f5b0614cc34c28b2588575c9ed4be25966afcf9c9fd0b4a4e119bf33
-
Filesize
16KB
MD514aa28ae3ba0ffccdeaafe52ab4175bf
SHA1ee212ddb0d0ceba70ae2a5ad279e748e938bd6a9
SHA2565304e0a63d0d8b480b77894653b56c724579287d277032c582d69631f06e1628
SHA51210fc3aa37c88b37c820f4e695a45b9abfc0650a0a9274c2b5f2d8eb5ae6bc6a3ddb0f1527aef358065c33ce78b4642a130ae8444b899aeb13fc27a10d61ab98d
-
Filesize
16KB
MD5dcf331082d0aad9e2bc55a4d9bf0ce18
SHA158638475bc9037528393dad5e264058834906c35
SHA256a1adc77f446797cf6749601c6702dda49577c3b7b032a2d411f86fc207fc43c0
SHA5125f96f99c910631e009ef1147f4fcacb3a198772fa54fb7b799a655627a888fb698c95fd01ff03cd7daa6414b879fae5ff2d197c8c69139694bcb266dc14495fa
-
Filesize
16KB
MD517c7fc71d40633762e177c2d286377dc
SHA1b97a441ab258c2db26af7a192376b3fdafa1fb45
SHA2569b63c657ebe8c15d9e2175dbb1186f38ecd94332a9730f2b9cd9d8d93f1a5bd4
SHA5122035aa19126764104eebd3e8404759ca682863a9707b352e28cff49a2aedba0665fe674124dfab8069ba007fff2ff3cae7da2511b64776e21257bec1d9af32de