Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 13:04
Static task
static1
Behavioral task
behavioral1
Sample
ff56fe5666997d26f95a8db7068e0079_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ff56fe5666997d26f95a8db7068e0079_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
ff56fe5666997d26f95a8db7068e0079_JaffaCakes118.exe
-
Size
264KB
-
MD5
ff56fe5666997d26f95a8db7068e0079
-
SHA1
308466709bf45c1c4211656958aa343435286aab
-
SHA256
8905ed9a1de99b7e5451a80654d7c8161c845a6b914532f03bb7a484c01d632d
-
SHA512
4203dff75caed0e1bc8008e6175cbfcdedd8e1c1eaf47db4216d57a879b619e2a7ea60da5cab64176e534bfb53074bc1e3666f7f7aaa6eec692a21b882035400
-
SSDEEP
3072:uFCUs5/OfdffBoK/PyP3dOh/z51HUvtw2tpNskX+ZcBqkDGvtABJhqSAQL+NmPWl:5Ol5pPyV+/Vsw2tpNs7ZcZKwqjQLoj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation ff56fe5666997d26f95a8db7068e0079_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation ~imsinst.exe -
Executes dropped EXE 2 IoCs
pid Process 4488 ~imsinst.exe 3716 zLoader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2884 wrote to memory of 4488 2884 ff56fe5666997d26f95a8db7068e0079_JaffaCakes118.exe 87 PID 2884 wrote to memory of 4488 2884 ff56fe5666997d26f95a8db7068e0079_JaffaCakes118.exe 87 PID 2884 wrote to memory of 4488 2884 ff56fe5666997d26f95a8db7068e0079_JaffaCakes118.exe 87 PID 4488 wrote to memory of 3716 4488 ~imsinst.exe 88 PID 4488 wrote to memory of 3716 4488 ~imsinst.exe 88 PID 4488 wrote to memory of 3716 4488 ~imsinst.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff56fe5666997d26f95a8db7068e0079_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff56fe5666997d26f95a8db7068e0079_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\~imsinst.exe"C:\Users\Admin\AppData\Local\Temp\~imsinst.exe" C:\Users\Admin\AppData\Local\Temp\ff56fe5666997d26f95a8db7068e0079_JaffaCakes118.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\zLoader.exe"C:\Users\Admin\AppData\Local\Temp\zLoader.exe"3⤵
- Executes dropped EXE
PID:3716
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD5ea0a991d31ff4c264f175e53cd983ab8
SHA123f6222b84d04b32b7907620a0a410ae181da336
SHA2567489cc75c022b7a77e009a601fb5344e75d12b821faeb7c9cb1d47799d78aa20
SHA512f9a76a65995f1050718d17476ff455e5dd7a248977d67bb84559f4a539381d744d075017d82d92cd18cacd2b7c1992b49b8c84867823d0bb7d3dd0da653c929d
-
Filesize
264KB
MD5ff56fe5666997d26f95a8db7068e0079
SHA1308466709bf45c1c4211656958aa343435286aab
SHA2568905ed9a1de99b7e5451a80654d7c8161c845a6b914532f03bb7a484c01d632d
SHA5124203dff75caed0e1bc8008e6175cbfcdedd8e1c1eaf47db4216d57a879b619e2a7ea60da5cab64176e534bfb53074bc1e3666f7f7aaa6eec692a21b882035400