Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 08:44
Static task
static1
Behavioral task
behavioral1
Sample
f31e625570cdb72d7ff6655c0c1f07a9_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f31e625570cdb72d7ff6655c0c1f07a9_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f31e625570cdb72d7ff6655c0c1f07a9_JaffaCakes118.exe
-
Size
175KB
-
MD5
f31e625570cdb72d7ff6655c0c1f07a9
-
SHA1
7315d6541a1a6af9fb778d1742bdd690a76c9726
-
SHA256
1843a48e711c316bcea8d1147aec6bb4cd6ba82f5f9ea1fbd1cb562ecb542791
-
SHA512
185aa7ac76715fa681d3b5d3b4d1bc3e3daca1a156fdf91579b34641d56a6027c44acb1929983a6b0dde34c2cc67095f123449ef129f981e27a5ac75673467df
-
SSDEEP
3072:MdGXmmfdNLMF88L4WJk90HxozECnZEqnjGVAdG9iXluLLOyK5kkQnlYysVxx+3wK:MNmf7v8LXZHyg0HnjvG4XlIL85kktysi
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f31e625570cdb72d7ff6655c0c1f07a9_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation f31e625570cdb72d7ff6655c0c1f07a9_JaffaCakes118.exe -
Loads dropped DLL 4 IoCs
Processes:
f31e625570cdb72d7ff6655c0c1f07a9_JaffaCakes118.exerundll32.execmd.exepid process 5052 f31e625570cdb72d7ff6655c0c1f07a9_JaffaCakes118.exe 1968 2768 rundll32.exe 1888 cmd.exe -
Drops file in System32 directory 2 IoCs
Processes:
f31e625570cdb72d7ff6655c0c1f07a9_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\SysWOW64\ktmuuota.dll f31e625570cdb72d7ff6655c0c1f07a9_JaffaCakes118.exe File opened for modification C:\Windows\system32\ktmuuota64.dll f31e625570cdb72d7ff6655c0c1f07a9_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2528 1888 WerFault.exe cmd.exe 1624 1888 WerFault.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
f31e625570cdb72d7ff6655c0c1f07a9_JaffaCakes118.exepid process 5052 f31e625570cdb72d7ff6655c0c1f07a9_JaffaCakes118.exe 5052 f31e625570cdb72d7ff6655c0c1f07a9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
f31e625570cdb72d7ff6655c0c1f07a9_JaffaCakes118.exedescription pid process target process PID 5052 wrote to memory of 2768 5052 f31e625570cdb72d7ff6655c0c1f07a9_JaffaCakes118.exe rundll32.exe PID 5052 wrote to memory of 2768 5052 f31e625570cdb72d7ff6655c0c1f07a9_JaffaCakes118.exe rundll32.exe PID 5052 wrote to memory of 1888 5052 f31e625570cdb72d7ff6655c0c1f07a9_JaffaCakes118.exe cmd.exe PID 5052 wrote to memory of 1888 5052 f31e625570cdb72d7ff6655c0c1f07a9_JaffaCakes118.exe cmd.exe PID 5052 wrote to memory of 1888 5052 f31e625570cdb72d7ff6655c0c1f07a9_JaffaCakes118.exe cmd.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\f31e625570cdb72d7ff6655c0c1f07a9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f31e625570cdb72d7ff6655c0c1f07a9_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\system32\ktmuuota64.dll",CreateProcessNotify2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240640062.bat" "C:\Users\Admin\AppData\Local\Temp\f31e625570cdb72d7ff6655c0c1f07a9_JaffaCakes118.exe""2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h"C:\Users\Admin\AppData\Local\Temp\f31e625570cdb72d7ff6655c0c1f07a9_JaffaCakes118.exe"3⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 4883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 4963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5052 -ip 50521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1888 -ip 18881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1888 -ip 18881⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\240640062.batFilesize
75B
MD5bd3925ffa7a3132fb98cb92beacd0eab
SHA1e28f5b585b0e44049ca8f26f506e0932b03528ea
SHA25671c63acacab0ea6b78d2f0a66d4c5ba8ade5244848ba1dd55e2c06d7f7f8a790
SHA5125465fea6eda8b045005836ba5707210bdb5e8060e4727aaf44620d8e1fd08173042cb6fb8deeff53c32533387d0466b8f02b8173ff35bbdc232879bd2a706677
-
C:\Windows\SysWOW64\ktmuuota.dllFilesize
56KB
MD54870be9c2cde34feea9145ed299778d1
SHA173afeed2d50552076c351c2c0ef8521bf7d98e99
SHA256cde00252370ba704c241efc15a475331657b0030f649ddca7be00ee743f55f51
SHA51276f487e0067a233b3d671fcce6c05b7946d74c918a42289684bdb3d469745003b63c84d58ecf32db1b25593cf90ed4ff867bf3ff81b47b9274871e8f5e547c68
-
C:\Windows\System32\ktmuuota64.dllFilesize
62KB
MD566f3dc1c18ad7a4e41eaecff0b6219d7
SHA18b7eff8c8c138c4621ef5edfbb612bdd0a796ad5
SHA2560577d73ea2359816944c7a22f0974459df9c0119b048941f6416c8a356b0f938
SHA5120ff1ad87952094a038de4fdd52472f40635d5e881ab2e15bca389d61df0ac7f6b503dc6df94e88539df5bfb34e0003999fc6b1885d03912f02e85252de2167f9
-
memory/1888-22-0x0000000010000000-0x0000000010012000-memory.dmpFilesize
72KB
-
memory/2768-14-0x00000292C4CC0000-0x00000292C4CC1000-memory.dmpFilesize
4KB
-
memory/5052-0-0x0000000000190000-0x0000000000191000-memory.dmpFilesize
4KB
-
memory/5052-1-0x0000000001000000-0x000000000102E000-memory.dmpFilesize
184KB
-
memory/5052-6-0x0000000003690000-0x0000000003691000-memory.dmpFilesize
4KB
-
memory/5052-7-0x0000000010000000-0x0000000010012000-memory.dmpFilesize
72KB
-
memory/5052-9-0x0000000001000000-0x000000000102E000-memory.dmpFilesize
184KB
-
memory/5052-10-0x0000000010000000-0x0000000010012000-memory.dmpFilesize
72KB
-
memory/5052-17-0x0000000001000000-0x000000000102E000-memory.dmpFilesize
184KB