Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 10:57
Static task
static1
Behavioral task
behavioral1
Sample
f7d9fdb5587a91c8ab0ac23209619391_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f7d9fdb5587a91c8ab0ac23209619391_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f7d9fdb5587a91c8ab0ac23209619391_JaffaCakes118.exe
-
Size
20KB
-
MD5
f7d9fdb5587a91c8ab0ac23209619391
-
SHA1
6657cacd38d47e8a6945fe7cb4757f4eb5a7c978
-
SHA256
b89c231f6dcf0b73adf3111ac77a41dd604b4c59fe2fc5ac4eb61f26bc23c443
-
SHA512
0a7c2687d67255194ffd22c833a86b93d0157b75b3955d3cda9140841ec3a79eba8fd2399dc23a96def8e1b8e9a9393912b9f6569b30bf9b439e1d955a17135d
-
SSDEEP
384:IKkBB78HJUwxq1y83vFoPJE8osGRi+UqzPNe+VvXJL8Wpa0TTCziUuF5HV4Xf+iD:xvpt01h/FoPJE8osGRi+UqzPNe+VvXJu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation f7d9fdb5587a91c8ab0ac23209619391_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 1816 msisrv.exe -
Executes dropped EXE 1 IoCs
pid Process 1816 msisrv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\msisrv = "C:\\msisrv.exe" msisrv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 5 IoCs
Uses commandline utility to view network configuration.
pid Process 2364 ipconfig.exe 2504 ipconfig.exe 3588 ipconfig.exe 3452 ipconfig.exe 3012 ipconfig.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3452 wrote to memory of 1816 3452 f7d9fdb5587a91c8ab0ac23209619391_JaffaCakes118.exe 86 PID 3452 wrote to memory of 1816 3452 f7d9fdb5587a91c8ab0ac23209619391_JaffaCakes118.exe 86 PID 3452 wrote to memory of 1816 3452 f7d9fdb5587a91c8ab0ac23209619391_JaffaCakes118.exe 86 PID 1816 wrote to memory of 2364 1816 msisrv.exe 91 PID 1816 wrote to memory of 2364 1816 msisrv.exe 91 PID 1816 wrote to memory of 2364 1816 msisrv.exe 91 PID 1816 wrote to memory of 2504 1816 msisrv.exe 97 PID 1816 wrote to memory of 2504 1816 msisrv.exe 97 PID 1816 wrote to memory of 2504 1816 msisrv.exe 97 PID 1816 wrote to memory of 3588 1816 msisrv.exe 101 PID 1816 wrote to memory of 3588 1816 msisrv.exe 101 PID 1816 wrote to memory of 3588 1816 msisrv.exe 101 PID 1816 wrote to memory of 3452 1816 msisrv.exe 103 PID 1816 wrote to memory of 3452 1816 msisrv.exe 103 PID 1816 wrote to memory of 3452 1816 msisrv.exe 103 PID 1816 wrote to memory of 3012 1816 msisrv.exe 105 PID 1816 wrote to memory of 3012 1816 msisrv.exe 105 PID 1816 wrote to memory of 3012 1816 msisrv.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7d9fdb5587a91c8ab0ac23209619391_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7d9fdb5587a91c8ab0ac23209619391_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\msisrv.exe"C:\msisrv.exe" C:\Users\Admin\AppData\Local\Temp\F7D9FD~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:2364
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:2504
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:3588
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:3452
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:3012
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5f7d9fdb5587a91c8ab0ac23209619391
SHA16657cacd38d47e8a6945fe7cb4757f4eb5a7c978
SHA256b89c231f6dcf0b73adf3111ac77a41dd604b4c59fe2fc5ac4eb61f26bc23c443
SHA5120a7c2687d67255194ffd22c833a86b93d0157b75b3955d3cda9140841ec3a79eba8fd2399dc23a96def8e1b8e9a9393912b9f6569b30bf9b439e1d955a17135d