Analysis
-
max time kernel
155s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 10:05
Static task
static1
Behavioral task
behavioral1
Sample
ead21fb652823bb0861ac73a96b23abb_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
ead21fb652823bb0861ac73a96b23abb_JaffaCakes118.exe
Resource
win10v2004-20240319-en
General
-
Target
ead21fb652823bb0861ac73a96b23abb_JaffaCakes118.exe
-
Size
166KB
-
MD5
ead21fb652823bb0861ac73a96b23abb
-
SHA1
815e706d7b3fb32adf45bf4aa5759ebdef14e3cc
-
SHA256
5bef40ada35f18a826b25404aebebc8143e898411d1db77a61f79efa2c018ad7
-
SHA512
003fdb1f95accfda593dddabc5d0ddd342c43d098f9955da4e083d260cf4e100644e2c7c3223c807fc76a3b0869395d599b15baaaa1f4be8957453910d0d0437
-
SSDEEP
3072:W0A2QfyV2jXJx+SuH7W575zgrUpWNPFNmHC1NFPqoLFTfPJEA/1w/sgWWr8pIOVl:W0Pexo27pgrvFmEHJnSs1wYzpIOV
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation ead21fb652823bb0861ac73a96b23abb_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 4276 NewSrv3.exe 3764 iPatch.exe 3600 NewSrv3.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3600 set thread context of 3348 3600 NewSrv3.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ NewSrv3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" NewSrv3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key NewSrv3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ NewSrv3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" NewSrv3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key NewSrv3.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4664 wrote to memory of 4276 4664 ead21fb652823bb0861ac73a96b23abb_JaffaCakes118.exe 97 PID 4664 wrote to memory of 4276 4664 ead21fb652823bb0861ac73a96b23abb_JaffaCakes118.exe 97 PID 4664 wrote to memory of 4276 4664 ead21fb652823bb0861ac73a96b23abb_JaffaCakes118.exe 97 PID 4664 wrote to memory of 3764 4664 ead21fb652823bb0861ac73a96b23abb_JaffaCakes118.exe 98 PID 4664 wrote to memory of 3764 4664 ead21fb652823bb0861ac73a96b23abb_JaffaCakes118.exe 98 PID 4664 wrote to memory of 3764 4664 ead21fb652823bb0861ac73a96b23abb_JaffaCakes118.exe 98 PID 4276 wrote to memory of 3600 4276 NewSrv3.exe 99 PID 4276 wrote to memory of 3600 4276 NewSrv3.exe 99 PID 4276 wrote to memory of 3600 4276 NewSrv3.exe 99 PID 3600 wrote to memory of 3348 3600 NewSrv3.exe 56 PID 3600 wrote to memory of 3348 3600 NewSrv3.exe 56 PID 3600 wrote to memory of 3348 3600 NewSrv3.exe 56 PID 3600 wrote to memory of 3348 3600 NewSrv3.exe 56 PID 3600 wrote to memory of 3348 3600 NewSrv3.exe 56 PID 3600 wrote to memory of 3348 3600 NewSrv3.exe 56 PID 3600 wrote to memory of 3348 3600 NewSrv3.exe 56 PID 3600 wrote to memory of 3348 3600 NewSrv3.exe 56 PID 3600 wrote to memory of 3348 3600 NewSrv3.exe 56 PID 3600 wrote to memory of 3348 3600 NewSrv3.exe 56 PID 3600 wrote to memory of 3348 3600 NewSrv3.exe 56 PID 3600 wrote to memory of 3348 3600 NewSrv3.exe 56 PID 3600 wrote to memory of 3348 3600 NewSrv3.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\ead21fb652823bb0861ac73a96b23abb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ead21fb652823bb0861ac73a96b23abb_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\NewSrv3.exe"C:\Users\Admin\AppData\Local\Temp\NewSrv3.exe"3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\NewSrv3.exeStubPath4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3600
-
-
-
C:\Users\Admin\AppData\Local\Temp\iPatch.exe"C:\Users\Admin\AppData\Local\Temp\iPatch.exe"3⤵
- Executes dropped EXE
PID:3764
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4140 --field-trial-handle=2320,i,3025503729105798828,9325691672526736153,262144 --variations-seed-version /prefetch:81⤵PID:4680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD53efa7fb495c824e4a95d00cc66430fe8
SHA19774c31e329255a48141ff1cc222910c2ee88668
SHA256c771b008506ae133929d72f5bd69f503de70b02b2e746cd103e00f8850b400ab
SHA5129fb1ed7e2bd6b2292d2b8ef100bc790a0b0fb462bc2b0087735ba81c1a3fe08af2d503dff4d04835414c0356edeb5db949c57c3595ec389a1af4705bdab153af
-
Filesize
69KB
MD559ca358d62b768bdbe842e356a8a799c
SHA1f81e4eb5e4ce5eb2a02c25dba86c35f166eb4b34
SHA2565d5e85edac16fc502eab12d31903d054aea8132f5f27c38d78d65d7e2aec0c77
SHA5124335694d074f26b4dc3ec1ec437e442228a10e286150e676f50e088ade18fb74214a2a01af055a2ec913cd141f89ee837220a646818ae184cff608877425a1d7