Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2024 15:48
Behavioral task
behavioral1
Sample
0eec641ad196440c6b96d26eb1e2df71_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
0eec641ad196440c6b96d26eb1e2df71_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
0eec641ad196440c6b96d26eb1e2df71
-
SHA1
57390f67569275821600629d4af0b866d8d767b4
-
SHA256
0e4632b9d987a4aa439602b85e250fd4452e0a7275d20c71a61cf94f163a5e64
-
SHA512
811a1a0ec66186fbdcc3c4ea6db5bd56b13255f0e8468db9c19baa5393366c23e44edc8e43ffc7332b70b5b09d7468fcbcc1fe4fc3570dcecb40100bcea2290e
-
SSDEEP
49152:oj94sjTFctV5ymxJk7uIMppc6V4e17qbUnQEFPFNrK2vS2Yr9R+FOBvLHqnDsYo4:4jpg/ymxJkQpc6V3lHQEFPFNrK24X+Fr
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation 0eec641ad196440c6b96d26eb1e2df71_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1300 anpgrbehaq.exe 2092 anpgrbehaq.tmp -
resource yara_rule behavioral2/memory/1708-0-0x0000000000AF0000-0x0000000000DF4000-memory.dmp upx behavioral2/memory/1708-7-0x0000000000AF0000-0x0000000000DF4000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 11 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Xunjie\msvidc32.dll anpgrbehaq.tmp File created C:\Program Files (x86)\Xunjie\unins000.dat anpgrbehaq.tmp File created C:\Program Files (x86)\Xunjie\is-D84PB.tmp anpgrbehaq.tmp File created C:\Program Files (x86)\Xunjie\is-U6996.tmp anpgrbehaq.tmp File created C:\Program Files (x86)\Xunjie\is-I0H3A.tmp anpgrbehaq.tmp File created C:\Program Files (x86)\Xunjie\is-IDN4A.tmp anpgrbehaq.tmp File created C:\Program Files (x86)\Xunjie\is-87O0F.tmp anpgrbehaq.tmp File opened for modification C:\Program Files (x86)\Xunjie\unins000.dat anpgrbehaq.tmp File opened for modification C:\Program Files (x86)\Xunjie\xjhelper.exe anpgrbehaq.tmp File opened for modification C:\Program Files (x86)\Xunjie\msvcrt40.dll anpgrbehaq.tmp File created C:\Program Files (x86)\Xunjie\is-5E62J.tmp anpgrbehaq.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1708 0eec641ad196440c6b96d26eb1e2df71_JaffaCakes118.exe 1708 0eec641ad196440c6b96d26eb1e2df71_JaffaCakes118.exe 1708 0eec641ad196440c6b96d26eb1e2df71_JaffaCakes118.exe 1708 0eec641ad196440c6b96d26eb1e2df71_JaffaCakes118.exe 2092 anpgrbehaq.tmp 2092 anpgrbehaq.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2092 anpgrbehaq.tmp -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2980 1708 0eec641ad196440c6b96d26eb1e2df71_JaffaCakes118.exe 84 PID 1708 wrote to memory of 2980 1708 0eec641ad196440c6b96d26eb1e2df71_JaffaCakes118.exe 84 PID 1708 wrote to memory of 2980 1708 0eec641ad196440c6b96d26eb1e2df71_JaffaCakes118.exe 84 PID 2980 wrote to memory of 1300 2980 cmd.exe 86 PID 2980 wrote to memory of 1300 2980 cmd.exe 86 PID 2980 wrote to memory of 1300 2980 cmd.exe 86 PID 1300 wrote to memory of 2092 1300 anpgrbehaq.exe 90 PID 1300 wrote to memory of 2092 1300 anpgrbehaq.exe 90 PID 1300 wrote to memory of 2092 1300 anpgrbehaq.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\0eec641ad196440c6b96d26eb1e2df71_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0eec641ad196440c6b96d26eb1e2df71_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\anpgrbehaq.exe" /VERYSILENT2⤵
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\anpgrbehaq.exe"C:\Users\Admin\AppData\Local\Temp\anpgrbehaq.exe" /VERYSILENT3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\is-H9709.tmp\anpgrbehaq.tmp"C:\Users\Admin\AppData\Local\Temp\is-H9709.tmp\anpgrbehaq.tmp" /SL5="$C011E,799475,54272,C:\Users\Admin\AppData\Local\Temp\anpgrbehaq.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2092
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5a1efbe65547fd9a8a533eb788eadf155
SHA18aa18ff2560f212e2e1f776673aa1c1c86a75bae
SHA2567b9747384f7f5732e6fb3bc12c3f96bcab53ed8d066d064e465bf9f51bb88618
SHA5125292b87e3f239a96499e74bfb301e6446773ea0390c9564e9781fd1afcd78a1c993f951e58908668fef1505749d2dd7ae3e695d003e7e3b10557e294a17433b7
-
Filesize
900KB
MD5f8b110dc2063d3b29502aa7042d26122
SHA11a0fd3db79eadc1ce714f6267d476ddbec0f5e79
SHA256e8730b0bf8f94cbb8babbfefb32cef8e8d19ec823f28c33a7d48c78589710762
SHA512f3125d3f575aff68105ebb3eadbce30547d34e12237d8ebbc555c6fe12bcc0a5ea85a38e26f2900d70af70ec07efde3b8cd65dc0fdada637496531245ea5052f