Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2024 11:10
Static task
static1
Behavioral task
behavioral1
Sample
f7dfdf82fa9bedf1442c446885fc8d6b_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f7dfdf82fa9bedf1442c446885fc8d6b_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f7dfdf82fa9bedf1442c446885fc8d6b_JaffaCakes118.exe
-
Size
559KB
-
MD5
f7dfdf82fa9bedf1442c446885fc8d6b
-
SHA1
72aa690361cf1e7a8669f5b1c8e5f224877287c1
-
SHA256
3fd2b975ad9fc6327f0c0a3b29789605931c1c14964d607754611183aff1ee61
-
SHA512
162f97d671396328ca8d22dd8adbd9d963688b0107142826f60d2b17313eff7f2b1f17491e398c98a8a7e79c1414caba1fc0b397cd96df74601bae0b133caefb
-
SSDEEP
6144:7BtLHIAXJrEG9w+z9f3vMv92loae4DmA8sIMLnWXAqM65n1Gl25Zk/yxvU5Qr6XY:fHIAXxEG9VfE9AVfDWX5Gc5ZUyObN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f7dfdf82fa9bedf1442c446885fc8d6b_JaffaCakes118.exesinst.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation f7dfdf82fa9bedf1442c446885fc8d6b_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation sinst.exe -
Executes dropped EXE 2 IoCs
Processes:
mail.exedial.exepid process 2164 mail.exe 552 dial.exe -
Processes:
resource yara_rule C:\Windows\SysWOW64\sin st\mail.exe upx behavioral2/memory/2164-16-0x0000000000400000-0x0000000000416000-memory.dmp upx C:\Windows\SysWOW64\sin st\dial.exe upx behavioral2/memory/2164-25-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/552-26-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/552-27-0x0000000000400000-0x000000000041A000-memory.dmp upx -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
mail.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts mail.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
sinst.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sinst = "C:\\Windows\\SysWOW64\\sinst.exe" sinst.exe -
Drops file in System32 directory 5 IoCs
Processes:
dial.exesinst.exemail.exedescription ioc process File created C:\Windows\SysWOW64\sin st\dial.txt dial.exe File opened for modification C:\Windows\SysWOW64\sin st\dial.txt dial.exe File created C:\Windows\SysWOW64\sin st\mail.exe sinst.exe File created C:\Windows\SysWOW64\sin st\dial.exe sinst.exe File created C:\Windows\SysWOW64\sin st\mail.txt mail.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: RenamesItself 1 IoCs
Processes:
f7dfdf82fa9bedf1442c446885fc8d6b_JaffaCakes118.exepid process 4692 f7dfdf82fa9bedf1442c446885fc8d6b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
f7dfdf82fa9bedf1442c446885fc8d6b_JaffaCakes118.exesinst.exedescription pid process target process PID 4692 wrote to memory of 3548 4692 f7dfdf82fa9bedf1442c446885fc8d6b_JaffaCakes118.exe sinst.exe PID 4692 wrote to memory of 3548 4692 f7dfdf82fa9bedf1442c446885fc8d6b_JaffaCakes118.exe sinst.exe PID 4692 wrote to memory of 3548 4692 f7dfdf82fa9bedf1442c446885fc8d6b_JaffaCakes118.exe sinst.exe PID 3548 wrote to memory of 2164 3548 sinst.exe mail.exe PID 3548 wrote to memory of 2164 3548 sinst.exe mail.exe PID 3548 wrote to memory of 2164 3548 sinst.exe mail.exe PID 3548 wrote to memory of 552 3548 sinst.exe dial.exe PID 3548 wrote to memory of 552 3548 sinst.exe dial.exe PID 3548 wrote to memory of 552 3548 sinst.exe dial.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7dfdf82fa9bedf1442c446885fc8d6b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7dfdf82fa9bedf1442c446885fc8d6b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sinst.exe"C:\Windows\system32\sinst.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sin st\mail.exe"C:\Windows\SysWOW64\sin st\mail.exe" /stext "C:\Windows\SysWOW64\sin st/mail.txt"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
- Drops file in System32 directory
-
C:\Windows\SysWOW64\sin st\dial.exe"C:\Windows\SysWOW64\sin st\dial.exe" /stext "C:\Windows\SysWOW64\sin st/dial.txt"3⤵
- Executes dropped EXE
- Drops file in System32 directory
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\sin st\dial.exeFilesize
39KB
MD5d36cec48ea68809c3bc9b2649158e953
SHA16763c500e815907361a13707eb1b4129feef93a5
SHA256e4e5e1e3b65f9532fff19402e8ff7d060db971da0a9fc11aa56f159f46ebbb41
SHA5120c6307847de847edba13d2da37987844b9fa660aada67869c8b845523a8c6013aca6180d649f5b2e8ea6113cdfb5af8e625f66cdb08a6ab66bd0f0c865b87dc9
-
C:\Windows\SysWOW64\sin st\mail.exeFilesize
32KB
MD5105f3bc196b09346bb002bd09ebba661
SHA1d214f233b32beb1d72b402911ac0a6979ae5ad80
SHA25657c16dc62641cb315373c6284a8027442432e58d900d6107fe453263a0adcfd1
SHA51216805ebe7332f0b961ad4743242f76003294bf2f520e5b0b120a9bf5e784bd1c483a046fe301bf41e4682e9fdf59d37f3743d82ff445e58e0bc6903e2ea8ae4b
-
memory/552-26-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/552-27-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/2164-16-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/2164-25-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/3548-1-0x0000000000650000-0x0000000000651000-memory.dmpFilesize
4KB
-
memory/3548-28-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/3548-29-0x0000000000650000-0x0000000000651000-memory.dmpFilesize
4KB
-
memory/3548-34-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/3548-35-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/4692-0-0x0000000002440000-0x0000000002441000-memory.dmpFilesize
4KB