Analysis
-
max time kernel
92s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07-04-2024 07:44
Behavioral task
behavioral1
Sample
e469d954208648089041e21f6d882702_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e469d954208648089041e21f6d882702_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e469d954208648089041e21f6d882702_JaffaCakes118.exe
-
Size
2.7MB
-
MD5
e469d954208648089041e21f6d882702
-
SHA1
454bf06e9f471a7590187c7806231cb957fec5e5
-
SHA256
03dd5030cf9419d5f328b6ddf8bce820199c0aad46caf85c68aeb1645133972d
-
SHA512
54f53702056611a8be894a77651f8635bfddaa0be1705a983497b290b4b1ea8fd8513db4ddcb0831beba9fda421efb2cf67921679a5863ead16462fba478ca9a
-
SSDEEP
24576:pZKlRgOIfgOIcVylQpgst89780uEOjxWfmP/UDMS08Ckn3U:pZMW5/pVP5tI7nfmP/SA8Nk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4928 mspaint.exe 4928 mspaint.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3220 e469d954208648089041e21f6d882702_JaffaCakes118.exe 3220 e469d954208648089041e21f6d882702_JaffaCakes118.exe 3220 e469d954208648089041e21f6d882702_JaffaCakes118.exe 4928 mspaint.exe 4928 mspaint.exe 4928 mspaint.exe 4928 mspaint.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3220 wrote to memory of 4056 3220 e469d954208648089041e21f6d882702_JaffaCakes118.exe 89 PID 3220 wrote to memory of 4056 3220 e469d954208648089041e21f6d882702_JaffaCakes118.exe 89 PID 3220 wrote to memory of 4056 3220 e469d954208648089041e21f6d882702_JaffaCakes118.exe 89 PID 4056 wrote to memory of 4928 4056 cmd.exe 91 PID 4056 wrote to memory of 4928 4056 cmd.exe 91 PID 4056 wrote to memory of 4928 4056 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\e469d954208648089041e21f6d882702_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e469d954208648089041e21f6d882702_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4928
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:2028