Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 01:36
Static task
static1
Behavioral task
behavioral1
Sample
fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$TEMP/arpa.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
$TEMP/arpa.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$TEMP/http_dll.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$TEMP/http_dll.dll
Resource
win10v2004-20240412-en
General
-
Target
fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe
-
Size
125KB
-
MD5
fba356748c02da7a65ddef9470aa1cf2
-
SHA1
e0e3b538d015b1eb06a8a663bc746a36c3cc5848
-
SHA256
792eba5ba91a52bfb3b369107f38fb9a7e7b7987cd870f465338eae59e81f3f6
-
SHA512
f626824b33ea03f690500058c73ba662a1363535f80e7b05149dc8b580bd6bf514b334f3509283933993d0947b254c30cb6ddbf7be99d53de471997a2ef2f71d
-
SSDEEP
3072:DQIURTXJ+MSx7NqlTE6jSOJH9deWpA9+MlScvohy8oAYS0tzgv:Ds9Sx7NqRz9In+Ml1vob6dtK
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation rundll32.exe -
Executes dropped EXE 2 IoCs
pid Process 3456 arpa.exe 1368 unsecapp.exe -
Loads dropped DLL 2 IoCs
pid Process 3456 arpa.exe 1368 unsecapp.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ESET Malware ProtectionLYo = "\"C:\\ProgramData\\ESET Malware ProtectionLYo\\unsecapp.exe\" -app" arpa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ESET Malware ProtectionLYo = "\"C:\\ProgramData\\ESET Malware ProtectionLYo\\unsecapp.exe\" -app" arpa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1400 wrote to memory of 2592 1400 fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe 86 PID 1400 wrote to memory of 2592 1400 fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe 86 PID 1400 wrote to memory of 2592 1400 fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe 86 PID 2592 wrote to memory of 3456 2592 rundll32.exe 88 PID 2592 wrote to memory of 3456 2592 rundll32.exe 88 PID 2592 wrote to memory of 3456 2592 rundll32.exe 88 PID 3456 wrote to memory of 1368 3456 arpa.exe 89 PID 3456 wrote to memory of 1368 3456 arpa.exe 89 PID 3456 wrote to memory of 1368 3456 arpa.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" url.dll, FileProtocolHandler C:\Users\Admin\AppData\Local\Temp\arpa.exe2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\arpa.exe"C:\Users\Admin\AppData\Local\Temp\arpa.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\ProgramData\ESET Malware ProtectionLYo\unsecapp.exe"C:\ProgramData\ESET Malware ProtectionLYo\unsecapp.exe" -app4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1368
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD527a4ed145a9a6cb41af09b8927fd5bee
SHA1815be32e1ae7ec20621e87239a6279fbba2fc8b5
SHA2563fbbf30015b64b50912c09c43052ac48b1983e869cebfb88dd1271fcb4e60d10
SHA5122978496330e0dcfafad6b9186181febe4af28cb7bec227bfab3f0be711e5160b96692a9752e260bf585abc0a5d481bd4d408ead88e0e2973552e4abb934107a8
-
Filesize
95KB
MD528c6f235946fd694d2634c7a2f24c1ba
SHA1e9a9ce1ff07834d6ba9a51ba0d9e7c7a0b68d3e5
SHA256c3159d4f85ceb84c4a0f7ea9208928e729a30ddda4fead7ec6257c7dd1984763
SHA51216865c473e010950a2aa25263af70074ad7539a86dc20e0a253df39e54e3635e99e821d4df83cd7a0eaeff10c75782966439d16d056427e824be8df953e138be
-
Filesize
20KB
MD55b92266d9a26260b4c9920ede267ba37
SHA1372d5455fdb689787e7e49f7799510c6c2cdf6b7
SHA256d3c41834ea1a05eb19b6012a9c0c4a2dd9df243af0df56885edabedfe3fea261
SHA512db9b277d74d1c50b8580b8dbeef1f5c3f54a6cf436a95c658bf7b8201d48ed651400fdde84d7297abf7f71b1f8f2bf335716833e564fa25cf10483b5f8766ec5