Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2024, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe
-
Size
20KB
-
MD5
e82dc44873355cc5e14ca4fc3a2f7549
-
SHA1
7ffa882401969381208b70d52beca4bac542b575
-
SHA256
e9bcdd20918f977764f5bc5b18e3b44830db72a1ee20f823e71244a08890f557
-
SHA512
e5cc0e64cb5304b5b2c2f2b0458f885902120a7cb3fd8bd7414690053f8ab7592063ae13d4c86672f59a211a1c00a557622a4b47c9b9ac5280bd47ff59d34038
-
SSDEEP
384:t8sippSBahKmiv94WpSWmpknhu1jKnv7D3y:/o0BahKmUJSmu1jKvC
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1668 3348 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe Token: SeSystemtimePrivilege 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3348 wrote to memory of 1868 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 88 PID 3348 wrote to memory of 1868 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 88 PID 3348 wrote to memory of 1868 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 88 PID 3348 wrote to memory of 4016 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 91 PID 3348 wrote to memory of 4016 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 91 PID 3348 wrote to memory of 4016 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 91 PID 3348 wrote to memory of 640 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 93 PID 3348 wrote to memory of 640 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 93 PID 3348 wrote to memory of 640 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 93 PID 3348 wrote to memory of 5032 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 95 PID 3348 wrote to memory of 5032 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 95 PID 3348 wrote to memory of 5032 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 95 PID 3348 wrote to memory of 2824 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 97 PID 3348 wrote to memory of 2824 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 97 PID 3348 wrote to memory of 2824 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 97 PID 3348 wrote to memory of 4728 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 99 PID 3348 wrote to memory of 4728 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 99 PID 3348 wrote to memory of 4728 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 99 PID 3348 wrote to memory of 4892 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 102 PID 3348 wrote to memory of 4892 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 102 PID 3348 wrote to memory of 4892 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 102 PID 3348 wrote to memory of 3912 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 104 PID 3348 wrote to memory of 3912 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 104 PID 3348 wrote to memory of 3912 3348 e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e82dc44873355cc5e14ca4fc3a2f7549_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" c:\windows\system32\packet.dll /e /p everyone:f2⤵PID:1868
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" c:\windows\system32\pthreadVC.dll /e /p everyone:f2⤵PID:4016
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" c:\windows\system32\wpcap.dll /e /p everyone:f2⤵PID:640
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" c:\windows\system32\drivers\npf.sys /e /p everyone:f2⤵PID:5032
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" c:\windows\system32\npptools.dll /e /p everyone:f2⤵PID:2824
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" c:\windows\system32\drivers\acpidisk.sys /e /p everyone:f2⤵PID:4728
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" c:\windows\system32\wanpacket.dll /e /p everyone:f2⤵PID:4892
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" c:\Documents and Settings\All Users\¡¸¿ªÊ¼¡¹²Ëµ¥\³ÌÐò\Æô¶¯ /e /p everyone:f2⤵PID:3912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3348 -s 7002⤵
- Program crash
PID:1668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3348 -ip 33481⤵PID:4988