Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 02:05
Static task
static1
Behavioral task
behavioral1
Sample
f270db5f7baedc42d14ef24269002e3f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f270db5f7baedc42d14ef24269002e3f_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f270db5f7baedc42d14ef24269002e3f_JaffaCakes118.exe
-
Size
304KB
-
MD5
f270db5f7baedc42d14ef24269002e3f
-
SHA1
6bda8899da0244b5e6af1457d4d0b6870bc33e6f
-
SHA256
f059929a572ea4779efe325bdcf649f0f535721a101e3faa6c7cfcd904ee3eab
-
SHA512
043a5e28005422b7e840b062f08882de6394470ada1bfb94502e9125142afdb14b6a5a45340f0673c067878aaacf53301beb954d464f9fb295af5c16f72bd97a
-
SSDEEP
6144:hD1PqteLZrtcpjjwGJVtPhXaMccErnEfPG3DYJ35KfRHPXNT06g:hxUcrwjwGJj1lHCEfmmURPX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\Control Panel\International\Geo\Nation f270db5f7baedc42d14ef24269002e3f_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1412 googleupdate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3448 1412 WerFault.exe 90 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 836 f270db5f7baedc42d14ef24269002e3f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 836 wrote to memory of 1412 836 f270db5f7baedc42d14ef24269002e3f_JaffaCakes118.exe 90 PID 836 wrote to memory of 1412 836 f270db5f7baedc42d14ef24269002e3f_JaffaCakes118.exe 90 PID 836 wrote to memory of 1412 836 f270db5f7baedc42d14ef24269002e3f_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\f270db5f7baedc42d14ef24269002e3f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f270db5f7baedc42d14ef24269002e3f_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\googleupdate.exe"C:\Users\Admin\AppData\Local\Temp\googleupdate.exe" C:\Users\Admin\AppData\Local\Temp\A48D.tmp2⤵
- Executes dropped EXE
PID:1412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1412 -s 5003⤵
- Program crash
PID:3448
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1412 -ip 14121⤵PID:3024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304KB
MD5f270db5f7baedc42d14ef24269002e3f
SHA16bda8899da0244b5e6af1457d4d0b6870bc33e6f
SHA256f059929a572ea4779efe325bdcf649f0f535721a101e3faa6c7cfcd904ee3eab
SHA512043a5e28005422b7e840b062f08882de6394470ada1bfb94502e9125142afdb14b6a5a45340f0673c067878aaacf53301beb954d464f9fb295af5c16f72bd97a