Analysis
-
max time kernel
66s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 07:05
Static task
static1
Behavioral task
behavioral1
Sample
04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe
-
Size
136KB
-
MD5
04a2e6117dcfda604934b6d32df2e2dc
-
SHA1
ad3020a0c1b2fcb32d1bc77a9108e078fc02039a
-
SHA256
166c4c03bc5177904bd0739d07b1c71163f235d7bbb444da8a0fb136d1744eb0
-
SHA512
a2d633e5c5aa247387db295777497e5ed9cee5ae824ec6b9ed82251ad4daaf77d1694964eb80f7ca3601d45c914a7f9ef45410f0c9c1bbf8f2a75183a94479d0
-
SSDEEP
3072:w6pQc+sSxnTrGadgsFqZeo4pwkhUmZr3hPsOraSo:w6p2sSxTrGvsFUejWyZr3hPswaH
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation 04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1984 04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1984 wrote to memory of 840 1984 04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe 84 PID 1984 wrote to memory of 840 1984 04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe 84 PID 1984 wrote to memory of 840 1984 04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe 84 PID 840 wrote to memory of 2696 840 cmd.exe 87 PID 840 wrote to memory of 2696 840 cmd.exe 87 PID 840 wrote to memory of 2696 840 cmd.exe 87 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2696 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\qgp1872.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\04a2e6117dcfda604934b6d32df2e2dc_JaffaCakes118.exe"3⤵
- Views/modifies file attributes
PID:2696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53B
MD5b22504105ff880374970028b48515698
SHA117d99b9e2ceb9f5cb2aaf2ed8daa362b236fca4b
SHA2563ffcac5cddf43259f358e44e719f29646b02982a4fb0adb618a553c53a95597d
SHA512941ba313ae29d50d0b453e8b72caf9eb523c7e31b610b3d099a33cbd78e2a4641005c0397d3a7fed24071df7bfa939963ef71c275885c8856990eb8d9c274ec3