Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
06ce45f08a4406e80f113e85c3574c0f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
06ce45f08a4406e80f113e85c3574c0f_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
06ce45f08a4406e80f113e85c3574c0f_JaffaCakes118.exe
-
Size
388KB
-
MD5
06ce45f08a4406e80f113e85c3574c0f
-
SHA1
a14b4c875dfaa9c1db2ed5ce2b5a53bc9c0c263c
-
SHA256
a1a6e17562a99038eb2e705bced4310ba1eb1e1bbbaf6b213f617cbc2090adb9
-
SHA512
36bdcbab960922359caf49facf9f3434bb6ea5b95001426dc168b31f3606831d139c2cdbe59f0a40359214a278977a07669727c708890d90d677621734a7104a
-
SSDEEP
768:J/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJMU60+ppQ1TTGfLd:JRsvcdcQjosnvnZ6LQ1Ed
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation 06ce45f08a4406e80f113e85c3574c0f_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 436 jusched.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-09\bin\UF 06ce45f08a4406e80f113e85c3574c0f_JaffaCakes118.exe File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe 06ce45f08a4406e80f113e85c3574c0f_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe 06ce45f08a4406e80f113e85c3574c0f_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe 436 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4064 wrote to memory of 436 4064 06ce45f08a4406e80f113e85c3574c0f_JaffaCakes118.exe 86 PID 4064 wrote to memory of 436 4064 06ce45f08a4406e80f113e85c3574c0f_JaffaCakes118.exe 86 PID 4064 wrote to memory of 436 4064 06ce45f08a4406e80f113e85c3574c0f_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\06ce45f08a4406e80f113e85c3574c0f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\06ce45f08a4406e80f113e85c3574c0f_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD544fa859e11aefa6d867c0389f4f44c79
SHA1dceb034c224361044b19ade9212a4f4fade4d5f6
SHA256301b946da8f628b198af29edb5af1127dcabca2c966454b4f3d1cdc2303c73d4
SHA512f4683e410c5f73c310fc71237969b530812c93519208d665488bc2585afe588a10c8fb5e64aaa81521a93a7278d4af7a0ab6f8b34bf692b6a53a860246c8f2ba