Analysis
-
max time kernel
135s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 06:40
Static task
static1
Behavioral task
behavioral1
Sample
f2e9b3569c6805694787578f51c6f928_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f2e9b3569c6805694787578f51c6f928_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f2e9b3569c6805694787578f51c6f928_JaffaCakes118.exe
-
Size
213KB
-
MD5
f2e9b3569c6805694787578f51c6f928
-
SHA1
0102d27426413619ff42dc5b3dfc3769c3c27be7
-
SHA256
9e6e06a9ccda1c82b355ab3e163897a9187159781e902beb76276862d7ade6c3
-
SHA512
1eb326949fa9ee2787bee8961c40ba971b5622f3fa2471ea25a172f3601531a95147ecdc6587d92e4693b9af6cd4c8d52f665d5ee39c6a19ce078f6b31932853
-
SSDEEP
3072:AfP+miCL5fWqeKuIwxLBqbWeUJIj4tWVAHZux6fKQJ:8PECL5+/KunEqeSxtuwnfX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation f2e9b3569c6805694787578f51c6f928_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3068 wrote to memory of 4764 3068 f2e9b3569c6805694787578f51c6f928_JaffaCakes118.exe 91 PID 3068 wrote to memory of 4764 3068 f2e9b3569c6805694787578f51c6f928_JaffaCakes118.exe 91 PID 3068 wrote to memory of 4764 3068 f2e9b3569c6805694787578f51c6f928_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2e9b3569c6805694787578f51c6f928_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2e9b3569c6805694787578f51c6f928_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Jbp..bat" > nul 2> nul2⤵PID:4764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD5d201422e156dd402cc25416980d18c7a
SHA1fd17389aafa9e6f12e9c32adb039a15768fd70bd
SHA256b176679c8ae6e1fc9d841b3824e8da5c81a19cb2365c1c6fda64f70323b9b810
SHA512038a09a76967b213e313b28b12c48433e5e9836679ce1e627d7d88b1270369228332fee842841e92b01ce88f4847475cddf0efd83d565e071fe743bafb82512c