Analysis
-
max time kernel
145s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 12:59
Static task
static1
Behavioral task
behavioral1
Sample
fa586732153fe8f79335bfd5f788815a_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fa586732153fe8f79335bfd5f788815a_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fa586732153fe8f79335bfd5f788815a_JaffaCakes118.exe
-
Size
388KB
-
MD5
fa586732153fe8f79335bfd5f788815a
-
SHA1
7a56400eb617e28e7767a53befbd3db7b7251acb
-
SHA256
ea4f41e53a9878fca8b3ef819da7b01d7c8eec64b8d9c3df73b78233d9495178
-
SHA512
417c0eb393d527897bf47df4f1912f3a4be557551352ec6b20a1a3199c7a2532d491e0a09ee3f59fbc7c02c09737f361601c8f2e3798932ef3ca78d9d13c1274
-
SSDEEP
6144:KMxPjA+CNWKAlc9VSoSz44f0uUK6V+iw:/xs8TcSlz4e0uUf+iw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation fa586732153fe8f79335bfd5f788815a_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 5020 hllromq.exe -
Loads dropped DLL 1 IoCs
pid Process 5020 hllromq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 3248 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3756 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5020 hllromq.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3248 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 5020 hllromq.exe 5020 hllromq.exe 5020 hllromq.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 5020 hllromq.exe 5020 hllromq.exe 5020 hllromq.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2652 wrote to memory of 1364 2652 fa586732153fe8f79335bfd5f788815a_JaffaCakes118.exe 84 PID 2652 wrote to memory of 1364 2652 fa586732153fe8f79335bfd5f788815a_JaffaCakes118.exe 84 PID 2652 wrote to memory of 1364 2652 fa586732153fe8f79335bfd5f788815a_JaffaCakes118.exe 84 PID 1364 wrote to memory of 3248 1364 cmd.exe 86 PID 1364 wrote to memory of 3248 1364 cmd.exe 86 PID 1364 wrote to memory of 3248 1364 cmd.exe 86 PID 1364 wrote to memory of 3756 1364 cmd.exe 89 PID 1364 wrote to memory of 3756 1364 cmd.exe 89 PID 1364 wrote to memory of 3756 1364 cmd.exe 89 PID 1364 wrote to memory of 5020 1364 cmd.exe 93 PID 1364 wrote to memory of 5020 1364 cmd.exe 93 PID 1364 wrote to memory of 5020 1364 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa586732153fe8f79335bfd5f788815a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa586732153fe8f79335bfd5f788815a_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2652 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\fa586732153fe8f79335bfd5f788815a_JaffaCakes118.exe" & start C:\Users\Admin\AppData\Local\hllromq.exe -f2⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 26523⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3248
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:3756
-
-
C:\Users\Admin\AppData\Local\hllromq.exeC:\Users\Admin\AppData\Local\hllromq.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5020
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5fa586732153fe8f79335bfd5f788815a
SHA17a56400eb617e28e7767a53befbd3db7b7251acb
SHA256ea4f41e53a9878fca8b3ef819da7b01d7c8eec64b8d9c3df73b78233d9495178
SHA512417c0eb393d527897bf47df4f1912f3a4be557551352ec6b20a1a3199c7a2532d491e0a09ee3f59fbc7c02c09737f361601c8f2e3798932ef3ca78d9d13c1274