Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2024 02:38
Static task
static1
Behavioral task
behavioral1
Sample
08d701fea25937c46ab1af409e3f22d4_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
08d701fea25937c46ab1af409e3f22d4_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
08d701fea25937c46ab1af409e3f22d4_JaffaCakes118.exe
-
Size
156KB
-
MD5
08d701fea25937c46ab1af409e3f22d4
-
SHA1
9d09842741ef59901ca4855610569e08024f8605
-
SHA256
326cfbda2969b2ab9c6f72480aa443cce112482bd1d5e354cb8c572fa9817d03
-
SHA512
5e8ba97bdf5603ce47a4786646b12f0d81d4aa314f1762d6d4b71e7ead22e6c010964eb84f78a9ad3901ad26fdca697e890b1d252c23aa27c103f2e4383ab45e
-
SSDEEP
768:G/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJMU60+ppQ1TTGfLx:GRsvcdcQjosnvnZ6LQ1Ex
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 08d701fea25937c46ab1af409e3f22d4_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2300 jusched.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe 08d701fea25937c46ab1af409e3f22d4_JaffaCakes118.exe File created C:\Program Files (x86)\Java\jre-09\bin\UF 08d701fea25937c46ab1af409e3f22d4_JaffaCakes118.exe File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe 08d701fea25937c46ab1af409e3f22d4_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe 2300 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4996 wrote to memory of 2300 4996 08d701fea25937c46ab1af409e3f22d4_JaffaCakes118.exe 91 PID 4996 wrote to memory of 2300 4996 08d701fea25937c46ab1af409e3f22d4_JaffaCakes118.exe 91 PID 4996 wrote to memory of 2300 4996 08d701fea25937c46ab1af409e3f22d4_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\08d701fea25937c46ab1af409e3f22d4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\08d701fea25937c46ab1af409e3f22d4_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD55ac3798dbda70ab463ae9ad6f378f613
SHA1a48bd0ed8817b09d2c1027499899b9bf240b3c8f
SHA2568a2860c7960c506031230d113b8eee240657114e8b94dc432ce2e38cdfd7a3e8
SHA51274c61b3d2474fdf8467658cbc8c215244a0ab10ad47bfd7c2c38e5ede95d141ba8d6b9971abbd1ec95eea25f9e1dd7b7a68064443fc5ebc7b87dfb7fb9232fde