Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 15:39
Static task
static1
Behavioral task
behavioral1
Sample
fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
fd18cb6b114d2c48722490c57f50719f
-
SHA1
2fdb4ac9f294f7830261488fc84a3e6d08105c47
-
SHA256
8e5caec6fea2749a170d97616807e3033763cf26ca14ef8d199b71e34a5b76e6
-
SHA512
6ff228ebe2cc10541faca98580c2becd12cb472a852c82139f694abf74c00f6adeb8ba6a60c34c791247349095c3b867cbb1640f3542b6c3b97087ed096b09d4
-
SSDEEP
24576:NWC+YtWTUGsC0nJ2FQe2SIdtig0nC8F18RlUP:QC+YQ1h0/x0nC8FORlUP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\International\Geo\Nation fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
Processes:
drvhostB.exedllhost.exepid process 2176 drvhostB.exe 1680 dllhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Driver Component = "\"C:\\Windows\\system32\\drvhostB.exe\"" fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
Processes:
fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exedescription ioc process File created C:\Windows\SysWOW64\drvhostB.exe fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drvhostB.exe fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
drvhostB.exedescription pid process target process PID 2176 set thread context of 1680 2176 drvhostB.exe dllhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 560 1680 WerFault.exe dllhost.exe 1612 1680 WerFault.exe dllhost.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exedrvhostB.exepid process 3276 fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exe 3276 fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exe 3276 fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exe 3276 fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exe 3276 fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exe 3276 fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exe 3276 fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exe 3276 fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exe 2176 drvhostB.exe 2176 drvhostB.exe 2176 drvhostB.exe 2176 drvhostB.exe 2176 drvhostB.exe 2176 drvhostB.exe 2176 drvhostB.exe 2176 drvhostB.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exedrvhostB.exedescription pid process Token: SeDebugPrivilege 3276 fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exe Token: SeDebugPrivilege 2176 drvhostB.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exedrvhostB.exedescription pid process target process PID 3276 wrote to memory of 2176 3276 fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exe drvhostB.exe PID 3276 wrote to memory of 2176 3276 fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exe drvhostB.exe PID 3276 wrote to memory of 2176 3276 fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exe drvhostB.exe PID 2176 wrote to memory of 1680 2176 drvhostB.exe dllhost.exe PID 2176 wrote to memory of 1680 2176 drvhostB.exe dllhost.exe PID 2176 wrote to memory of 1680 2176 drvhostB.exe dllhost.exe PID 2176 wrote to memory of 1680 2176 drvhostB.exe dllhost.exe PID 2176 wrote to memory of 1680 2176 drvhostB.exe dllhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd18cb6b114d2c48722490c57f50719f_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\drvhostB.exe"C:\Windows\system32\drvhostB.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\dllhost.exeC:\ProgramData\dllhost.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 124⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 244⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1680 -ip 16801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1680 -ip 16801⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\dllhost.exeFilesize
6KB
MD536c689700adbb227867e409938607270
SHA16123e236f73faa37600a60107a5b167980b83a61
SHA256a2158014ecd471868954d0e97397f9df43e310c48d56fa0b5a6ef908dc654adf
SHA512c75728ed30135032a6755e33b9034b98c871554c33a4b8ba1586e0b3282dbc65e3b61571d407365b24289dae2de56b514ef0db744f85e6648dc6432a33b85fef
-
C:\Windows\SysWOW64\drvhostB.exeFilesize
1.4MB
MD5fd18cb6b114d2c48722490c57f50719f
SHA12fdb4ac9f294f7830261488fc84a3e6d08105c47
SHA2568e5caec6fea2749a170d97616807e3033763cf26ca14ef8d199b71e34a5b76e6
SHA5126ff228ebe2cc10541faca98580c2becd12cb472a852c82139f694abf74c00f6adeb8ba6a60c34c791247349095c3b867cbb1640f3542b6c3b97087ed096b09d4
-
memory/1680-28-0x0000000000400000-0x0000000000400000-memory.dmp
-
memory/2176-17-0x0000000075430000-0x00000000759E1000-memory.dmpFilesize
5.7MB
-
memory/2176-19-0x0000000000CD0000-0x0000000000CE0000-memory.dmpFilesize
64KB
-
memory/2176-20-0x0000000075430000-0x00000000759E1000-memory.dmpFilesize
5.7MB
-
memory/2176-27-0x0000000075430000-0x00000000759E1000-memory.dmpFilesize
5.7MB
-
memory/3276-0-0x0000000075430000-0x00000000759E1000-memory.dmpFilesize
5.7MB
-
memory/3276-1-0x0000000000FF0000-0x0000000001000000-memory.dmpFilesize
64KB
-
memory/3276-2-0x0000000075430000-0x00000000759E1000-memory.dmpFilesize
5.7MB
-
memory/3276-18-0x0000000075430000-0x00000000759E1000-memory.dmpFilesize
5.7MB