Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 02:57
Behavioral task
behavioral1
Sample
fe449fcb5e1fb6d57fb52cfd8f7100f1_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fe449fcb5e1fb6d57fb52cfd8f7100f1_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
fe449fcb5e1fb6d57fb52cfd8f7100f1_JaffaCakes118.exe
-
Size
9KB
-
MD5
fe449fcb5e1fb6d57fb52cfd8f7100f1
-
SHA1
c15c7a7d48362cbacb88ca9304956e0930f3f057
-
SHA256
8a5cacdd6bf0d78b117f86caf9856f88b0a38b6bf79c6e9a85117d91d76e3c5b
-
SHA512
e0e5651e437a55c9dde2203f8586b7f93e3c933b80a4eadd37f3f706866ed448817792477cff059166ad8ee9f45ad29865affcb1ced04ecde61451c4abe33ebc
-
SSDEEP
192:GYE8fuG4Jl/wOi/Bx+l9wMC0qZ1Jc862MhdZD/:GYEBj4x+Xwz0qZ1i86TdZD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation fe449fcb5e1fb6d57fb52cfd8f7100f1_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1496-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/1496-1-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\multimediaControls.chl fe449fcb5e1fb6d57fb52cfd8f7100f1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\multimediaControls.chl\CLSID\ = "{6BF52A52-394A-11D3-B153-00C04F79FAA6}" fe449fcb5e1fb6d57fb52cfd8f7100f1_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\multimediaControls.chl\CLSID fe449fcb5e1fb6d57fb52cfd8f7100f1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1496 wrote to memory of 824 1496 fe449fcb5e1fb6d57fb52cfd8f7100f1_JaffaCakes118.exe 98 PID 1496 wrote to memory of 824 1496 fe449fcb5e1fb6d57fb52cfd8f7100f1_JaffaCakes118.exe 98 PID 1496 wrote to memory of 824 1496 fe449fcb5e1fb6d57fb52cfd8f7100f1_JaffaCakes118.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe449fcb5e1fb6d57fb52cfd8f7100f1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe449fcb5e1fb6d57fb52cfd8f7100f1_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gdsh0.bat" "2⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4140 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵PID:2624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
302B
MD5862af5ea160dfd81e5daa9d8cf352bdd
SHA13acd72c6577ab93e18c5acd1666fd44e6bf8a0f4
SHA256fa9e8731feb1e7e93a53367af5760b3bab55bccf2dcb826a34f0c267b4d8ec27
SHA5126663606d5814a28c498d4d3a951933a8700d2539d98cf2ba9d25b2946ed53db77907bf3d5cfbef87d24a543ffda0b7ca13658ce7d58e0012606c7d623f025ef0