Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-04-2024 13:44
Behavioral task
behavioral1
Sample
e2abbf30e779a5f8931222f7398e2ee1_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
e2abbf30e779a5f8931222f7398e2ee1_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e2abbf30e779a5f8931222f7398e2ee1_JaffaCakes118.exe
-
Size
23KB
-
MD5
e2abbf30e779a5f8931222f7398e2ee1
-
SHA1
ce71ed03848d2f908237c397fe17b539c969e6a4
-
SHA256
9e8f48eb767fcc815e52b001490086397079986a8389ae9d239097128546024f
-
SHA512
e683298bd2adbe042489116a6f01dd58491f661cb9604baab700f4f5c192e71caa6f0300552e6ce0d7a7596c336b2d28b0e26ef5e94fea0d3fcf5280c5a5a84e
-
SSDEEP
384:bOiObYq5/pvqLyqSbSq0eK5zM+4P/8JI3ryKOxZ9J9m/D6TXPhPf+fF6b2pO7:cbN5hSZBNzJEX3rf6XPh+4H
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation OV3S4IE6.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation eY852eYn.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation e2abbf30e779a5f8931222f7398e2ee1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation MW6K73g7.exe -
Executes dropped EXE 4 IoCs
pid Process 2908 MW6K73g7.exe 3772 OV3S4IE6.exe 816 eY852eYn.exe 2644 1SOr7OS5.exe -
resource yara_rule behavioral2/memory/4512-0-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/4512-1-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/files/0x0008000000023210-8.dat upx behavioral2/memory/4512-12-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/2908-13-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/2908-24-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/3772-28-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/3772-37-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/4512-43-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/816-46-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/2908-54-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/816-61-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/2644-64-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\1SOr7OS5.exe eY852eYn.exe File opened for modification C:\Windows\SysWOW64\1SOr7OS5.exe eY852eYn.exe File created C:\Windows\SysWOW64\MW6K73g7.exe e2abbf30e779a5f8931222f7398e2ee1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MW6K73g7.exe e2abbf30e779a5f8931222f7398e2ee1_JaffaCakes118.exe File created C:\Windows\SysWOW64\OV3S4IE6.exe MW6K73g7.exe File opened for modification C:\Windows\SysWOW64\OV3S4IE6.exe MW6K73g7.exe File created C:\Windows\SysWOW64\eY852eYn.exe OV3S4IE6.exe File opened for modification C:\Windows\SysWOW64\eY852eYn.exe OV3S4IE6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4512 wrote to memory of 2908 4512 e2abbf30e779a5f8931222f7398e2ee1_JaffaCakes118.exe 96 PID 4512 wrote to memory of 2908 4512 e2abbf30e779a5f8931222f7398e2ee1_JaffaCakes118.exe 96 PID 4512 wrote to memory of 2908 4512 e2abbf30e779a5f8931222f7398e2ee1_JaffaCakes118.exe 96 PID 2908 wrote to memory of 3772 2908 MW6K73g7.exe 97 PID 2908 wrote to memory of 3772 2908 MW6K73g7.exe 97 PID 2908 wrote to memory of 3772 2908 MW6K73g7.exe 97 PID 3772 wrote to memory of 816 3772 OV3S4IE6.exe 98 PID 3772 wrote to memory of 816 3772 OV3S4IE6.exe 98 PID 3772 wrote to memory of 816 3772 OV3S4IE6.exe 98 PID 816 wrote to memory of 2644 816 eY852eYn.exe 99 PID 816 wrote to memory of 2644 816 eY852eYn.exe 99 PID 816 wrote to memory of 2644 816 eY852eYn.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2abbf30e779a5f8931222f7398e2ee1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e2abbf30e779a5f8931222f7398e2ee1_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\MW6K73g7.exe"C:\Windows\system32\MW6K73g7.exe" C:\Users\Admin\AppData\Local\Temp\e2abbf30e779a5f8931222f7398e2ee1_JaffaCakes118.exe -firstrun2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\OV3S4IE6.exe"C:\Windows\system32\OV3S4IE6.exe" C:\Windows\SysWOW64\MW6K73g7.exe -firstrun3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\eY852eYn.exe"C:\Windows\system32\eY852eYn.exe" C:\Windows\SysWOW64\OV3S4IE6.exe -firstrun4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\1SOr7OS5.exe"C:\Windows\system32\1SOr7OS5.exe" C:\Windows\SysWOW64\eY852eYn.exe -firstrun5⤵
- Executes dropped EXE
PID:2644
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5e2abbf30e779a5f8931222f7398e2ee1
SHA1ce71ed03848d2f908237c397fe17b539c969e6a4
SHA2569e8f48eb767fcc815e52b001490086397079986a8389ae9d239097128546024f
SHA512e683298bd2adbe042489116a6f01dd58491f661cb9604baab700f4f5c192e71caa6f0300552e6ce0d7a7596c336b2d28b0e26ef5e94fea0d3fcf5280c5a5a84e