Analysis
-
max time kernel
67s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 22:31
Static task
static1
Behavioral task
behavioral1
Sample
0636ca1a0acb3e040b06234b31ac1d7b_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0636ca1a0acb3e040b06234b31ac1d7b_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
0636ca1a0acb3e040b06234b31ac1d7b_JaffaCakes118.exe
-
Size
120KB
-
MD5
0636ca1a0acb3e040b06234b31ac1d7b
-
SHA1
48a9a582f86312f5ad41ee4112e765fcdb9c6ce0
-
SHA256
3d3f357e4ad24e91c3e7bf4d93357b4aba1e31c23829eb1b7f434676de89862e
-
SHA512
616ef9833e03c5c72e6328b16c7053ed1064adef771e4cf0092c60b8aee27c86a1e7cb3a069dec017e9ba4284ba17b9c9e88acf485c7ed8affaedb27afe84569
-
SSDEEP
3072:4V3J6kkt5h1X+HqTi0BW69hd1MMdxPe9N9uA0/+hL9TBfnPdL:Vt5hBPi0BW69hd1MMdxPe9N9uA069TBB
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 0636ca1a0acb3e040b06234b31ac1d7b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4756 wrote to memory of 3716 4756 0636ca1a0acb3e040b06234b31ac1d7b_JaffaCakes118.exe 83 PID 4756 wrote to memory of 3716 4756 0636ca1a0acb3e040b06234b31ac1d7b_JaffaCakes118.exe 83 PID 3716 wrote to memory of 3532 3716 cmd.exe 85 PID 3716 wrote to memory of 3532 3716 cmd.exe 85 PID 3532 wrote to memory of 1548 3532 net.exe 86 PID 3532 wrote to memory of 1548 3532 net.exe 86 PID 3716 wrote to memory of 4316 3716 cmd.exe 87 PID 3716 wrote to memory of 4316 3716 cmd.exe 87 PID 4316 wrote to memory of 3776 4316 net.exe 88 PID 4316 wrote to memory of 3776 4316 net.exe 88 PID 3716 wrote to memory of 620 3716 cmd.exe 89 PID 3716 wrote to memory of 620 3716 cmd.exe 89 PID 620 wrote to memory of 1204 620 net.exe 90 PID 620 wrote to memory of 1204 620 net.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\0636ca1a0acb3e040b06234b31ac1d7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0636ca1a0acb3e040b06234b31ac1d7b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\3400.tmp\3401.tmp\3402.bat C:\Users\Admin\AppData\Local\Temp\0636ca1a0acb3e040b06234b31ac1d7b_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\system32\net.exenet user hack32 /add3⤵
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user hack32 /add4⤵PID:1548
-
-
-
C:\Windows\system32\net.exenet localgroup administrateurs hack32 /add3⤵
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrateurs hack32 /add4⤵PID:3776
-
-
-
C:\Windows\system32\net.exenet user hack32 abcd3⤵
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user hack32 abcd4⤵PID:1204
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97B
MD5ff8f2a3d62844ae2cbd5fe4e8d0c6a57
SHA187d5b055c1fb58c4922d40895c9960181255775b
SHA256c9c8d929834a7b24149b93e53c5b3b295580bc7e2866314281e59e91d68e7293
SHA51271fdd1dcd93120a38518b532173728ebd8b98ae2a9856d84301ba61a3f324fae1a8bfbc3ef6713ecb44093aee010b448a69282ca015caba900a6b585cb74d3f0