Analysis
-
max time kernel
138s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2024 19:36
Static task
static1
Behavioral task
behavioral1
Sample
f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe
-
Size
676KB
-
MD5
f89f25bb6d3e0dbc8e63118a4f512814
-
SHA1
04b0eb534c8ecd591dd2a8b0cdb62fe775eecab8
-
SHA256
cc2e079e8fec70fec1b52104725cdc35ff118da22487d7e4c0fbb91fbd10f5f7
-
SHA512
510f90026438636ccbfb9f735d91f06b14fe2bbc1effb031785f5821eec6435e9caa154649ee9848249adc470127ab9fdb869a86b27165264823c7e02a7ced7c
-
SSDEEP
12288:4f6tHCebR0tCyflokFUFp1AphvuErVFjORSAQ1C:XtXaYyfKkFUFp6zzrVR2SY
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe -
Executes dropped EXE 12 IoCs
pid Process 4632 XfireSpread.exe 2296 ri0t.exe 1584 taskmngr.exe 4656 taskmngr.exe 4612 taskmngr.exe 448 taskmngr.exe 4216 taskmngr.exe 1324 taskmngr.exe 4684 taskmngr.exe 4968 taskmngr.exe 1180 taskmngr.exe 2472 taskmngr.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File opened for modification C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File created C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File opened for modification C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File opened for modification C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File created C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File created C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File created C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File opened for modification C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File created C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File opened for modification C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File opened for modification C:\Windows\SysWOW64\taskmngr.exe ri0t.exe File created C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File opened for modification C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File opened for modification C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File opened for modification C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File created C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File created C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File opened for modification C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File created C:\Windows\SysWOW64\taskmngr.exe ri0t.exe File opened for modification C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File created C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3404 wrote to memory of 4632 3404 f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe 88 PID 3404 wrote to memory of 4632 3404 f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe 88 PID 3404 wrote to memory of 4632 3404 f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe 88 PID 3404 wrote to memory of 2296 3404 f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe 90 PID 3404 wrote to memory of 2296 3404 f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe 90 PID 3404 wrote to memory of 2296 3404 f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe 90 PID 2296 wrote to memory of 1584 2296 ri0t.exe 91 PID 2296 wrote to memory of 1584 2296 ri0t.exe 91 PID 2296 wrote to memory of 1584 2296 ri0t.exe 91 PID 1584 wrote to memory of 4656 1584 taskmngr.exe 99 PID 1584 wrote to memory of 4656 1584 taskmngr.exe 99 PID 1584 wrote to memory of 4656 1584 taskmngr.exe 99 PID 4656 wrote to memory of 4612 4656 taskmngr.exe 102 PID 4656 wrote to memory of 4612 4656 taskmngr.exe 102 PID 4656 wrote to memory of 4612 4656 taskmngr.exe 102 PID 4612 wrote to memory of 448 4612 taskmngr.exe 104 PID 4612 wrote to memory of 448 4612 taskmngr.exe 104 PID 4612 wrote to memory of 448 4612 taskmngr.exe 104 PID 448 wrote to memory of 4216 448 taskmngr.exe 105 PID 448 wrote to memory of 4216 448 taskmngr.exe 105 PID 448 wrote to memory of 4216 448 taskmngr.exe 105 PID 4216 wrote to memory of 1324 4216 taskmngr.exe 106 PID 4216 wrote to memory of 1324 4216 taskmngr.exe 106 PID 4216 wrote to memory of 1324 4216 taskmngr.exe 106 PID 1324 wrote to memory of 4684 1324 taskmngr.exe 107 PID 1324 wrote to memory of 4684 1324 taskmngr.exe 107 PID 1324 wrote to memory of 4684 1324 taskmngr.exe 107 PID 4684 wrote to memory of 4968 4684 taskmngr.exe 108 PID 4684 wrote to memory of 4968 4684 taskmngr.exe 108 PID 4684 wrote to memory of 4968 4684 taskmngr.exe 108 PID 4968 wrote to memory of 1180 4968 taskmngr.exe 109 PID 4968 wrote to memory of 1180 4968 taskmngr.exe 109 PID 4968 wrote to memory of 1180 4968 taskmngr.exe 109 PID 1180 wrote to memory of 2472 1180 taskmngr.exe 110 PID 1180 wrote to memory of 2472 1180 taskmngr.exe 110 PID 1180 wrote to memory of 2472 1180 taskmngr.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\XfireSpread.exe"C:\Users\Admin\AppData\Local\Temp\XfireSpread.exe"2⤵
- Executes dropped EXE
PID:4632
-
-
C:\Users\Admin\AppData\Local\Temp\ri0t.exe"C:\Users\Admin\AppData\Local\Temp\ri0t.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe 1040 "C:\Users\Admin\AppData\Local\Temp\ri0t.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe 1152 "C:\Windows\SysWOW64\taskmngr.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe 1128 "C:\Windows\SysWOW64\taskmngr.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe 1108 "C:\Windows\SysWOW64\taskmngr.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe 1132 "C:\Windows\SysWOW64\taskmngr.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe 1136 "C:\Windows\SysWOW64\taskmngr.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe 1140 "C:\Windows\SysWOW64\taskmngr.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe 1148 "C:\Windows\SysWOW64\taskmngr.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe 1144 "C:\Windows\SysWOW64\taskmngr.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe 1156 "C:\Windows\SysWOW64\taskmngr.exe"12⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2472
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56a6f2a286368e44a6a6cc29ac8426b83
SHA1030afbd9ddc76ca1afc7f812d71cac3d6490c8cb
SHA256504277259e9c7e032122a1255c1f1350d940d4bbce618800a80ec1da1473046f
SHA512a720bd8623bdaba1b20df0c815dcf7fcbf8824666098e1d89fd8f24806a10a7ecff906d9793f02888df865a30fad5df0d963e40e847ec4bda5a93a88f4d6c649
-
Filesize
220KB
MD50fe319575a3c53eae13851cd310567ba
SHA1b218afac76c097620d6d6e06255519526400da03
SHA256d728bde25afd081c33a72a2879e0af45e1dc289dfc87720e221dde512de649e3
SHA512c3c2506c9a531d606cdf2f9b19c08082a1cc88b325487aaf83346d32722bbf0a31a99bc25186bd038fc3250781a94e86fe0ab782afffb7c988d9df6f3f87816d
-
Filesize
348KB
MD538d968abd419bdbd0f9d3137b6149a4c
SHA1f0699004834df6d8c816a3dbca908acfb4b68f7d
SHA2563e8b87cf337ac43f6e094680efd645fe631410d3960fd993d3d1f3b630659d7e
SHA512de264947a1103f67df1032ffb611ea3c13e75085d4046638bb52d410f36959ae03331ca5458e921f057a364ac0c5dbd120840ee45bef2322a76490bc15c0fc0f