Analysis
-
max time kernel
67s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29-04-2024 14:36
Static task
static1
Behavioral task
behavioral1
Sample
07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exe
-
Size
888KB
-
MD5
07e44ffcffde46ad96eb9c018bed6193
-
SHA1
43ebee608da73cdc476c773284d1257a4d6fe8ff
-
SHA256
97329752b4a2f48fed6e10ec54492c31413fe7148bfe6152bffe49ab4a9c7246
-
SHA512
ec70827ae4267a2340ece89224dd26c98301c64d972d768ff462d8ee84397b8f0571d50afda71b8982fa76ccb88ef7d282d9a7d0e1f31a43c06c6c243c7025e8
-
SSDEEP
12288:kuOG1pSLsBKa0BBmzmBoJCcsk6TtXGLErHeSVT2j7UyAi46qYIYnnqno8Fyhm0BO:P1UvBqmaJWXTtFrt2XOi46qYICKbCV
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation 07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exedescription pid Process procid_target PID 4092 set thread context of 2956 4092 07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 3604 2956 WerFault.exe 88 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exedescription pid Process procid_target PID 4092 wrote to memory of 3904 4092 07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exe 86 PID 4092 wrote to memory of 3904 4092 07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exe 86 PID 4092 wrote to memory of 3904 4092 07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exe 86 PID 4092 wrote to memory of 2956 4092 07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exe 88 PID 4092 wrote to memory of 2956 4092 07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exe 88 PID 4092 wrote to memory of 2956 4092 07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exe 88 PID 4092 wrote to memory of 2956 4092 07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exe 88 PID 4092 wrote to memory of 2956 4092 07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exe 88 PID 4092 wrote to memory of 2956 4092 07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exe 88 PID 4092 wrote to memory of 2956 4092 07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exe 88 PID 4092 wrote to memory of 2956 4092 07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exe 88 PID 4092 wrote to memory of 2956 4092 07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exe 88 PID 4092 wrote to memory of 2956 4092 07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exe 88 PID 4092 wrote to memory of 2956 4092 07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exe 88 PID 4092 wrote to memory of 2956 4092 07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Update\secure" /XML "C:\Users\Admin\AppData\Local\Temp\z694.xml"2⤵
- Creates scheduled task(s)
PID:3904
-
-
C:\Users\Admin\AppData\Local\Temp\07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\07e44ffcffde46ad96eb9c018bed6193_JaffaCakes118.exe"2⤵PID:2956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 6363⤵
- Program crash
PID:3604
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2956 -ip 29561⤵PID:1304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57cca47de3ad1c45ab472b738da8a1491
SHA10d59ad527edc33dba5fc807739cf609309fbda5d
SHA2567c200bf8fbb6acf41827bd30314f99e892c89236e90d319c5e046871bca5e575
SHA5127c058b31c0f036e2ca151eef649c3395db04174f118bf844df952a7642311b00ccf1ce7e1e51e2af8d028ce577709ab3742a73f2222428a31e4d7b9d38163aec