Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 12:16
Behavioral task
behavioral1
Sample
fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe
-
Size
16.9MB
-
MD5
fa46be7de1266de82f9ce2453cb43142
-
SHA1
41402c4db36b729cb68b17305f6d20377e2c69a3
-
SHA256
1b47098f9be36f976fe2cc3cb4380f2630bca36ced0e0eb1aa1b82f45f7f634f
-
SHA512
53490d90fdb18f8f204ecb271e61c34f13111196659f272a73de738f8240a919b55c5688ad6a06bf9970d27dee47d3bb201d755cdf2945b6a9b6bd1c46124167
-
SSDEEP
393216:LO0QCEDmlh2psL2ciIrHWi5tN3ZWyWJTCpy1cQ:mCEDUQps4ILdtN35Jpy1B
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" reg.exe -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Control Panel\International\Geo\Nation fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe -
Loads dropped DLL 25 IoCs
Processes:
fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exepid process 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000_Classes\Local Settings fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exefa46be7de1266de82f9ce2453cb43142_JaffaCakes118.execmd.exedescription pid process target process PID 1172 wrote to memory of 1256 1172 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe PID 1172 wrote to memory of 1256 1172 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe PID 1256 wrote to memory of 1104 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe cmd.exe PID 1256 wrote to memory of 1104 1256 fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe cmd.exe PID 1104 wrote to memory of 1728 1104 cmd.exe reg.exe PID 1104 wrote to memory of 1728 1104 cmd.exe reg.exe PID 1104 wrote to memory of 4368 1104 cmd.exe reg.exe PID 1104 wrote to memory of 4368 1104 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa46be7de1266de82f9ce2453cb43142_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Loads dropped DLL
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\ProgramData\regedit.bat"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f4⤵
- Disables RegEdit via registry modification
- Modifies registry key
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\regedit.batFilesize
226B
MD525c6732e894e408350e8506cd958a1e8
SHA180760b5000f810c3f7668f8f6a4a6dfdae519afe
SHA25615003fa7305091cb56a31aec7983aaaa9aa8c8933cf8087807957a326b310a5d
SHA5125b664cb14a644e0b5e63ae5e36afb0ca3d859a571dd73968550fa7f761e25ced7bfbc0ce0b5ab2104b6f0555b06d1e4a118cc5cb127ca8f1af0d7d38773c84df
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\MSVCP140.dllFilesize
613KB
MD5c1b066f9e3e2f3a6785161a8c7e0346a
SHA18b3b943e79c40bc81fdac1e038a276d034bbe812
SHA25699e3e25cda404283fbd96b25b7683a8d213e7954674adefa2279123a8d0701fd
SHA51236f9e6c86afbd80375295238b67e4f472eb86fcb84a590d8dba928d4e7a502d4f903971827fdc331353e5b3d06616664450759432fdc8d304a56e7dacb84b728
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\PIL\_imaging.cp39-win_amd64.pydFilesize
3.0MB
MD57bdda60c9136dfcef785132a0c77b193
SHA1f6bcd152d638cf54767203edb238eef2993b98bd
SHA256bec23da5408f0fff9fe31c0ba49f6cd305ab6e242c270305c904295e54e88266
SHA512b2e3df1aefdf271e494c91a9fa19bf0dbf8696fe30e524827659198080467dc5dc5d4a2394f27cefd8bb9923ece8757ccedaae3b5f836d4175690f128032098d
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\VCRUNTIME140.dllFilesize
94KB
MD518049f6811fc0f94547189a9e104f5d2
SHA1dc127fa1ff0aab71abd76b89fc4b849ad3cf43a6
SHA256c865c3366a98431ec3a5959cb5ac3966081a43b82dfcd8bfefafe0146b1508db
SHA51238fa01debdb8c5369b3be45b1384434acb09a6afe75a50a31b3f0babb7bc0550261a5376dd7e5beac74234ec1722967a33fc55335b1809c0b64db42f7e56cdf7
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\_bz2.pydFilesize
84KB
MD5a991152fd5b8f2a0eb6c34582adf7111
SHA13589342abea22438e28aa0a0a86e2e96e08421a1
SHA2567301fc2447e7e6d599472d2c52116fbe318a9ff9259b8a85981c419bfd20e3ef
SHA512f039ac9473201d27882c0c11e5628a10bdbe5b4c9b78ead246fd53f09d25e74c984e9891fccbc27c63edc8846d5e70f765ca7b77847a45416675d2e7c04964fc
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\_ctypes.pydFilesize
124KB
MD57322f8245b5c8551d67c337c0dc247c9
SHA15f4cb918133daa86631211ae7fa65f26c23fcc98
SHA2564fcf4c9c98b75a07a7779c52e1f7dff715ae8a2f8a34574e9dac66243fb86763
SHA51252748b59ce5d488d2a4438548963eb0f2808447c563916e2917d08e5f4aab275e4769c02b63012b3d2606fdb5a8baa9eb5942ba5c5e11b7678f5f4187b82b0c2
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\_decimal.pydFilesize
264KB
MD53cce2ca89817962aea5b6a98891eea1c
SHA1831ce9370688b3131f9e75a4784d5443dc1b5b09
SHA2560809de4a8dee3b6cf6ddc40a10c52d53867ee47bf5a6769d16027f2ab766b5cf
SHA5123b683f9a10002fccd6c09925bc3ae369da3e90c8cded9533ccfb62831aeaf13227c5ddab57f3f1edacb66eed16a7dc20f633089f7e2a85e3e41f154cb199a527
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\_hashlib.pydFilesize
64KB
MD588e2bf0a590791891fb5125ffcf5a318
SHA139f96abbabf3fdd46844ba5190d2043fb8388696
SHA256e7aecb61a54dcc77b6d9cafe9a51fd1f8d78b2194cc3baf6304bbd1edfd0aee6
SHA5127d91d2fa95bb0ffe92730679b9a82e13a3a6b9906b2c7f69bc9065f636a20be65e1d6e7a557bfd6e4b80edd0f00db92eb7fea06345c2c9b98176c65d18c4bdbf
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\_lzma.pydFilesize
159KB
MD5cdd13b537dad6a910cb9cbb932770dc9
SHA1b37706590d5b6f18c042119d616df6ff8ce3ad46
SHA256638cd8c336f90629a6260e67827833143939497d542838846f4fc94b2475bb3e
SHA512c375fb6914cda3ae7829d016d3084f3b5b9f78f200a62f076ec1646576f87694eec7fa6f1c99cbe30824f2fe6e2d61ecdeb50061383b12143cd2678004703199
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\_queue.pydFilesize
28KB
MD5f19d9a56df14aea465e7ead84751ea5f
SHA1f170ccbeb8fb4a1e0fe56f9a7c20ae4c1a48e4a9
SHA25617ccd37dfba38bba706189d12ed28ca32c7330cc60db7bf203bf7198287073e4
SHA5122b69a11026bf4fe3792082d57eaf3b24713e7bd44dfd61ccaa6e5adb6771e49b6c81c1b542fbb159c9055db9739b9c4473a856914c72683a2a4cf658d6d7a469
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\_socket.pydFilesize
78KB
MD5478abd499eefeba3e50cfc4ff50ec49d
SHA1fe1aae16b411a9c349b0ac1e490236d4d55b95b2
SHA256fdb14859efee35e105f21a64f7afdf50c399ffa0fa8b7fcc76dae4b345d946cb
SHA512475b8d533599991b4b8bfd27464b379d78e51c41f497e81698b4e7e871f82b5f6b2bfec70ec2c0a1a8842611c8c2591133eaef3f7fc4bc7625e18fc4189c914e
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\_sqlite3.pydFilesize
87KB
MD546d80e7c337787fa37c7b413b70c6c44
SHA17e714ddf236dc80b54200e7bd4b92573ffdc66e5
SHA256638c284d9e4bf328971086e90a4c61483323fa4b2cae6100e4a22e4cdff65e2a
SHA512b6dec4be48574c8b6928af00a94debfae20a18d61f7220c7e759432b9f4933b7cae787416e1f520547a35f2661fd8d770f627b337e8274a3aeaa4ac5fee338fb
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\_ssl.pydFilesize
151KB
MD5cf7886b3ac590d2ea1a6efe4ee47dc20
SHA18157a0c614360162588f698a2b0a4efe321ea427
SHA2563d183c1b3a24d634387cce3835f58b8e1322bf96ab03f9fe9f02658fb17d1f8c
SHA512b171f7d683621fdab5989bfed20c3f6479037035f334ea9a19feb1184f46976095a7666170a06f1258c6ddf2c1f8bdb4e31cbfd33d3b8fa4b330f097d1c09d81
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\base_library.zipFilesize
763KB
MD5c6b38adf85add9f9a7ea0b67eea508b4
SHA123a398ffdae6047d9777919f7b6200dd2a132887
SHA25677479f65578cf9710981255a3ad5495d45f8367b2f43c2f0680fce0fed0e90fb
SHA512d6abc793a7b6cc6138b50305a8c1cad10fa1628ca01a2284d82222db9bd1569959b05bdf4581d433ff227438131e43eec98bf265e746b17e76b1c9e9e21d447d
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\certifi\cacert.pemFilesize
253KB
MD53dcd08b803fbb28231e18b5d1eef4258
SHA1b81ea40b943cd8a0c341f3a13e5bc05090b5a72a
SHA256de2fa17c4d8ae68dc204a1b6b58b7a7a12569367cfeb8a3a4e1f377c73e83e9e
SHA5129cc7106e921fbcf8c56745b38051a5a56154c600e3c553f2e64d93ec988c88b17f6d49698bdc18e3aa57ae96a79ee2c08c584c7c4c91cc6ea72db3dca6ccc2f5
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\libcrypto-1_1.dllFilesize
3.2MB
MD589511df61678befa2f62f5025c8c8448
SHA1df3961f833b4964f70fcf1c002d9fd7309f53ef8
SHA256296426e7ce11bc3d1cfa9f2aeb42f60c974da4af3b3efbeb0ba40e92e5299fdf
SHA5129af069ea13551a4672fdd4635d3242e017837b76ab2815788148dd4c44b4cf3a650d43ac79cd2122e1e51e01fb5164e71ff81a829395bdb8e50bb50a33f0a668
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\libffi-7.dllFilesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\libssl-1_1.dllFilesize
674KB
MD550bcfb04328fec1a22c31c0e39286470
SHA13a1b78faf34125c7b8d684419fa715c367db3daa
SHA256fddd0da02dcd41786e9aa04ba17ba391ce39dae6b1f54cfa1e2bb55bc753fce9
SHA512370e6dfd318d905b79baf1808efbf6da58590f00006513bdaaed0c313f6fa6c36f634ea3b05f916cee59f4db25a23dd9e6f64caf3c04a200e78c193027f57685
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\psutil\_psutil_windows.cp39-win_amd64.pydFilesize
74KB
MD5789827bcbae298d8d3223f33228b26af
SHA129de4ad19963292504414196dd3e353084a0e864
SHA256f79f6732ea5a3675312ef4b9506bed8e15aa2d9c722d30d0c96274675aa9dc68
SHA512e4d53c2a31b046862accc33ca1fb3327df10fa92e79556d16ca5dccc132bb0812df9454196554c848644c312c58faa07558382a58b53cf8889e61684cfe14885
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\python39.dllFilesize
4.3MB
MD51d5e4c20a20740f38f061bdf48aaca4f
SHA1de1b64ab5219aa6fef95cd2b0ccead1c925fd0d0
SHA256f8172151d11bcf934f2a7518cd0d834e3f079bd980391e9da147ce4cff72c366
SHA5129df64c97e4e993e815fdaf7e8ecbc3ce32aa8d979f8f4f7a732b2efa636cfeb9a145fe2c2dcdf2e5e9247ee376625e1fdc62f9657e8007bb504336ac8d05a397
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\pythoncom39.dllFilesize
543KB
MD526ebff360b70ca5de0a81fccbae0b02c
SHA12415d8c46eb188648225f55a26bd19a9fb225749
SHA2564077005b6ae8272d82892d183cbc972780e3aa80f848c447626761a6c244d3a3
SHA51209645c61421f245df7a2f62683bc90b5e3d51607b5dd9b1e7af9d54d93bccad132d6ff8aa4ba7d083da443f2b6220302178f9a120fecce661876cbab6d90a3df
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\pywintypes39.dllFilesize
139KB
MD5d658ffb571a541e9e21a6b859a67e112
SHA1d9e7f54eb92ce32ff4d02fedd5c9b738dabbfbdb
SHA2560cc26e2acaa1933647f885b47ac6da6625be7a4cd93fae220fb172906ff22091
SHA5120040b19841d2d19ab5506cefc3186813cc92f57144b7b3f0bfec45638eebc053ddb8a40f2843cafe5d0ae5c6dc7f5db646a6441d34e02d749eb9563edbe5c7b9
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\select.pydFilesize
28KB
MD5fed3dae56f7c9ea35d2e896fede29581
SHA1ae5b2ef114138c4d8a6479d6441967c170c5aa23
SHA256d56542143775d02c70ad713ac36f295d473329ef3ad7a2999811d12151512931
SHA5123128c57724b0609cfcaca430568d79b0e6abd13e5bba25295493191532dba24af062d4e0340d0ed68a885c24fbbf36b7a3d650add2f47f7c2364eab6a0b5faff
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\sqlite3.dllFilesize
1.5MB
MD57b523ec0e5eaf72ba72a8601d82fb97d
SHA16ea37960e7b915deaffb42f942271627cc4e06e6
SHA2563c206503837ce6c4a9fbec94678eba80114ee6506aa94b93c5dccc5911c48a73
SHA512b48a5627afedffb0ad913b728b5cfa0f64ccede395b99504892846b41b7aac4dced46d9b1f5230d95b0e48784db522d300071e6bbb912f77893ae2eceb020712
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\unicodedata.pydFilesize
1.1MB
MD5cd12c15c6eef60d9ea058cd4092e5d1b
SHA157a7c0b0468f0be8e824561b45f86e0aa0db28dd
SHA256e3ab6e5749a64e04ee8547f71748303ba159dd68dfc402cb69356f35e645badd
SHA512514e76174f977cc73300bc40ff170007a444e743a39947d5e2f76e60b2a149c16d57b42b6a82a7fea8dd4e9addb3e876d8ab50ea1898ee896c1907667277cf00
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\win32api.pydFilesize
131KB
MD58ccfec535f312418015bcd067fe32208
SHA179aa4bc6d681972afadfa4b2bae230ce06570a56
SHA2569157829433f0bd8a12b1a1cf2fb90301e20ecf43802eb0ac85525ebcc53d0e30
SHA512698b3a57338ffa47e2afecf9e8f8f709061e5cb56d82d8e10e48c6d4c8d26d2e0a21f2dcedc599a1b605ee2026dc2af7bd79d9f8b035c5c6fd9bd9fc817673b8
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\win32crypt.pydFilesize
124KB
MD569fa92932743edb9cdc05077fae6ebde
SHA187103a91d8810bf6ad243189650ca9d81a4c8cf7
SHA25643fd57f9631dfa2a25588b30dc904422c91cf3a960aa45cfadbdce11150b0d44
SHA51228b37a9ee7e93a8ab3f18db1cef5eb8759a7a0eece4c9bbd061e83fd777f638bf784195d5e9dca0d2f643a1a8ce27b95b48dc1e71d725419ae253fbfa169e095
-
C:\Users\Admin\AppData\Local\Temp\_MEI11722\win32gui.pydFilesize
223KB
MD56b671bc3676e868789caca8671f4f963
SHA10f464c7dcca0f3d6590286a9c240ea369e155e8c
SHA25623074dc90395366a8e9653d1b7ee32f61ed8b4c95bbafed2a25d6f2e17a550ce
SHA51269b42d227d53f789126c5e61d4d3140b3f7b3d8ba13116f266dd01da4e5f9b0bbe942973c98c85edac390cde4f7b9b3be349ef4401ff93fe2979bf5f3d237ee5