Analysis
-
max time kernel
132s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 11:49
Static task
static1
Behavioral task
behavioral1
Sample
fa3bb13c3afb72fe3c4ad1f3eec80bc0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fa3bb13c3afb72fe3c4ad1f3eec80bc0_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fa3bb13c3afb72fe3c4ad1f3eec80bc0_JaffaCakes118.exe
-
Size
14KB
-
MD5
fa3bb13c3afb72fe3c4ad1f3eec80bc0
-
SHA1
2a936b3b7742fad42f65c50c2a9202d12bc403b5
-
SHA256
aa2b5dfdbcdc575e456161b37d4290444070217e874b9e66276cfa687f1090cc
-
SHA512
71a851b4b4d50d9d1abfb2a23de797a8733bd7be0986e3acc24d707c4c9205fbed7f0b67d9e5b5a589487c0da74e96e96dfd9bfdadc5158fd143be7558a4f355
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhY5N:hDXWipuE+K3/SSHgxmz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation DEMB35D.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation fa3bb13c3afb72fe3c4ad1f3eec80bc0_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation DEM59F7.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation DEMB0A3.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation DEM6E1.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation DEM5D0F.exe -
Executes dropped EXE 6 IoCs
pid Process 1052 DEM59F7.exe 4308 DEMB0A3.exe 3148 DEM6E1.exe 2084 DEM5D0F.exe 3488 DEMB35D.exe 3192 DEM99B.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4088 wrote to memory of 1052 4088 fa3bb13c3afb72fe3c4ad1f3eec80bc0_JaffaCakes118.exe 91 PID 4088 wrote to memory of 1052 4088 fa3bb13c3afb72fe3c4ad1f3eec80bc0_JaffaCakes118.exe 91 PID 4088 wrote to memory of 1052 4088 fa3bb13c3afb72fe3c4ad1f3eec80bc0_JaffaCakes118.exe 91 PID 1052 wrote to memory of 4308 1052 DEM59F7.exe 96 PID 1052 wrote to memory of 4308 1052 DEM59F7.exe 96 PID 1052 wrote to memory of 4308 1052 DEM59F7.exe 96 PID 4308 wrote to memory of 3148 4308 DEMB0A3.exe 99 PID 4308 wrote to memory of 3148 4308 DEMB0A3.exe 99 PID 4308 wrote to memory of 3148 4308 DEMB0A3.exe 99 PID 3148 wrote to memory of 2084 3148 DEM6E1.exe 101 PID 3148 wrote to memory of 2084 3148 DEM6E1.exe 101 PID 3148 wrote to memory of 2084 3148 DEM6E1.exe 101 PID 2084 wrote to memory of 3488 2084 DEM5D0F.exe 104 PID 2084 wrote to memory of 3488 2084 DEM5D0F.exe 104 PID 2084 wrote to memory of 3488 2084 DEM5D0F.exe 104 PID 3488 wrote to memory of 3192 3488 DEMB35D.exe 106 PID 3488 wrote to memory of 3192 3488 DEMB35D.exe 106 PID 3488 wrote to memory of 3192 3488 DEMB35D.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa3bb13c3afb72fe3c4ad1f3eec80bc0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa3bb13c3afb72fe3c4ad1f3eec80bc0_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\DEM59F7.exe"C:\Users\Admin\AppData\Local\Temp\DEM59F7.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\DEMB0A3.exe"C:\Users\Admin\AppData\Local\Temp\DEMB0A3.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\DEM6E1.exe"C:\Users\Admin\AppData\Local\Temp\DEM6E1.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\DEM5D0F.exe"C:\Users\Admin\AppData\Local\Temp\DEM5D0F.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\DEMB35D.exe"C:\Users\Admin\AppData\Local\Temp\DEMB35D.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\DEM99B.exe"C:\Users\Admin\AppData\Local\Temp\DEM99B.exe"7⤵
- Executes dropped EXE
PID:3192
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD549e8d4596a750860c8bf844a2ec266a5
SHA1323f7d9ba6a17fd4e65eb6cbe65995fcff454b79
SHA2567b398182a1a095a5a54ff539ba4648a3deaac5b91995670743d819bfe5998648
SHA5125cee74bf7cd48bba42a0cefae1b6f42f0844a76960ba444c0332e8ab9815107bc3116627a1fe982f6a3a4d5afc3c8dd90b0d4a5d1748f4b93ad829c465587093
-
Filesize
14KB
MD5f3ba88ce056f3ec657d783e63403b24f
SHA129fa0536468699486620549b4d9043ef653204ca
SHA25605a52dd53c016b992eb9e8fad9af40e5876e23634938bbe6989276a1e3f7930b
SHA512faa49e6e8d428de2dcd8e91a69406e28fa058ecb05ce5638b77747b3f21f29b275047e501d88517510586d03f207982c38050abac3a538b733dd9cfe11929df4
-
Filesize
14KB
MD5f9614d8918aa2dd261ca201cd0c14a75
SHA1077e6e64ebf0dacb939fb88eaedf1f7fdae47912
SHA2562c3e2361f728957d8af249c5815bca98f80b039d55c3a5dce9cdb6c7d8dc5b34
SHA5129a6a8897b40010138e2739524ea90eabff2ee0beee04b2e51645b1619ae53db9af9bad1d894f553f7a24cdde1485ada111d18c53e181cb8f08658f524db0d55a
-
Filesize
15KB
MD5756cd21ae8d6ebe5ed14e439c7093f47
SHA197b0a1cb4e640973a94109f4d5d8f0099869ad43
SHA25669b0fc2eb847d0a00365da55c1c9b60d575cb2fd011e746f4f56d6cffdd2ee48
SHA512d6489ea93671f07103fcf6d0c2f73cf13c9caff5011e4f691844efcf85ac82c51ef5de462db9f3eabd4d3754216c5d05ca4faa17572ad9145a435ae472bd6ec3
-
Filesize
14KB
MD5d39abe738063147bc9568c1686689b29
SHA111a2663423522530d40574ef690d41112c82b587
SHA25664d909c7da294a29fb4b893ce426f201fde403667ee69aa0c4971ff111c51a12
SHA512decdfdb54ffcd10e66794e069cccd37d2fed661940d32d7773a1fcfda2db716eaa3ac2bd0014782c42a95065fca5aa64e036e5708fdbce10bd1353efbad2d82e
-
Filesize
14KB
MD509b35073cdb250ee847503b245bd88f7
SHA12391b2101e0d729206ac1c195382990bdab5cbdf
SHA256936e31978d9e1d244a1493b6c839b5c1a989b5d14291ad43ce2bde3d6e4e2fe1
SHA512446d78b2026355a25a4d6bdefc741f2756258578edda9e8e29250b1db4e4027caf3ffc3e7f72cf4cbfebf22a65eeac2f3b1a5b010fa0fc6a54caa44ee910b040