Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 14:51
Behavioral task
behavioral1
Sample
ff87d3344db8278ea877e9e5a3288fab_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
ff87d3344db8278ea877e9e5a3288fab_JaffaCakes118.exe
-
Size
411KB
-
MD5
ff87d3344db8278ea877e9e5a3288fab
-
SHA1
107f1e16d3a320332df626182d090740d3a5d2fc
-
SHA256
3440b1488ab8f40d03f054481b4e7dde3dc9f5a6794b233b83339b4527d23256
-
SHA512
ed064abd7988248858f23ac078f118835e61a37e62e6934873249d3d75884ebed3b108609d319d62d271aa053f52a79ea02e403216b76d45b7e67cbf283e9b6a
-
SSDEEP
6144:kzU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInOYKa:eU7M5ijWh0XOW4sEfeOY
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
resource yara_rule behavioral2/files/0x000f00000002338a-20.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation ff87d3344db8278ea877e9e5a3288fab_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation wonei.exe -
Executes dropped EXE 2 IoCs
pid Process 1076 wonei.exe 4288 atvuv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe 4288 atvuv.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4272 wrote to memory of 1076 4272 ff87d3344db8278ea877e9e5a3288fab_JaffaCakes118.exe 89 PID 4272 wrote to memory of 1076 4272 ff87d3344db8278ea877e9e5a3288fab_JaffaCakes118.exe 89 PID 4272 wrote to memory of 1076 4272 ff87d3344db8278ea877e9e5a3288fab_JaffaCakes118.exe 89 PID 4272 wrote to memory of 696 4272 ff87d3344db8278ea877e9e5a3288fab_JaffaCakes118.exe 90 PID 4272 wrote to memory of 696 4272 ff87d3344db8278ea877e9e5a3288fab_JaffaCakes118.exe 90 PID 4272 wrote to memory of 696 4272 ff87d3344db8278ea877e9e5a3288fab_JaffaCakes118.exe 90 PID 1076 wrote to memory of 4288 1076 wonei.exe 110 PID 1076 wrote to memory of 4288 1076 wonei.exe 110 PID 1076 wrote to memory of 4288 1076 wonei.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff87d3344db8278ea877e9e5a3288fab_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff87d3344db8278ea877e9e5a3288fab_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\wonei.exe"C:\Users\Admin\AppData\Local\Temp\wonei.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\atvuv.exe"C:\Users\Admin\AppData\Local\Temp\atvuv.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4288
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵PID:696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD558ad4ac27a48257005b263527a5e0d52
SHA17670701f29abd03e94f5af95a419aeea3c8a2566
SHA256e05ebb0edc79beb3d8b26b65b8c14037703c78bbd4fd8b5c7c85bfec00a466b4
SHA51232e2604ea6198c668c82f1499cca94f9721dfe784318b1d5ad886e9a7733bebb30b7b81dc76f882f13c31e1367e7f331c8467e40b096b2b3188b41ad5f274439
-
Filesize
212KB
MD510ec3b4141b16d3948ba624b82bf430a
SHA10bbce44c37c73e00627119b45cbd5aaa9d7e14aa
SHA256325e15f000222e97909f1c17a534970678b956ba133eb2f6019f187da7c911d7
SHA51243583427aee934f8a06476e7988dc1f4a8cacc4b0aa2549e0b7ea9ec47ba0244d3f85bbe70f04d6ef56ad66370ab98dbd97a46858ab1a6617aaff7acff9b490d
-
Filesize
512B
MD5667925c5945dba7063a4b40ac877048a
SHA1952f9d8fa66fd542a80fc82ed78cf5d1a64968b1
SHA256866cd61eb01112e9e41cb2da9b6448673df940597dd83d66dfcb9ddd7dc9f14a
SHA512fd4eaf0342586b616fb47bd1801054fd3d922afb7a82ac12b4a488a60ad6bc4895357ef1eb3d8a2fc270dc24cbaf9d8b6b245a81be3612ee8e7df6ebb4955b18
-
Filesize
411KB
MD5db317ac9402f9322c74272361d04e939
SHA13ab4b80abcf078ca3f20dcc2512afc7cbe4cd742
SHA2568c62440151ab6e1008fc02d31a01416dd4e0c23a65907990e8edad723d2153d4
SHA512aa72456ee5b88e71ed285215dae74c751f5a3d9bbf5d627d00ebd89cb4fff63b3d9c4245fe7c1cf71f437888aa415058503a5bb601a88d386336a8070ea5bc47