Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 09:42
Static task
static1
Behavioral task
behavioral1
Sample
33f2ea12e7c2a0617631cd2c06213c43_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
33f2ea12e7c2a0617631cd2c06213c43_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$_3_.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$_3_.exe
Resource
win10v2004-20240508-en
General
-
Target
$_3_.exe
-
Size
1.7MB
-
MD5
d4c16982f8a834bc0f8028b45c3ae543
-
SHA1
9d9cec9af8f23a23521e20d48d9af1024663a4a7
-
SHA256
932badf8ce27381bd595c9d861d7f7142fe98f233a893a2003a5f5e5ec163b3b
-
SHA512
c94b8d978afac107c08a5405cf9510e48d4bcf1284292eee1d08898f1c7a43a83a9655dc4d85d27d3b825e45a8f136c7beb71405fab94bb5e2437b7c4ad44b5c
-
SSDEEP
49152:n7mrmYPoEHVGTWFkO4ITVpSuEqM/vrM3rA3SuN5:km2Z12WFYFVf
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation $_3_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4132 $_3_.exe 4132 $_3_.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4132 $_3_.exe 4132 $_3_.exe 4132 $_3_.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4132 wrote to memory of 4416 4132 $_3_.exe 88 PID 4132 wrote to memory of 4416 4132 $_3_.exe 88 PID 4132 wrote to memory of 4416 4132 $_3_.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\$_3_.exe"C:\Users\Admin\AppData\Local\Temp\$_3_.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\15914.bat" "C:\Users\Admin\AppData\Local\Temp\7279DF54A02941F1892F7C5A00C85C30\""2⤵PID:4416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98B
MD51eb3c2d2512607d010fde5786e2037bb
SHA114c938406caf8239f7d65ff87f8a033afbcd70e7
SHA2569d1948e879c95bb0dc7fca09317c56085a5cdf9043ab412e2a065d7e0b42c626
SHA512148a3d89c8377f8b179d91bbda719d990b75f69e24f357d59d25360d3d6d80d50e430eac255e49c442de3ff6ffd78a3e70e8462232161ce431272d4d34f9ddd6
-
Filesize
98B
MD56e39c65881983aa9c90ff9e180d17d04
SHA1190a80f024d5387e52910f2a6797b64b7300b5d9
SHA256959153707cd3df2e402529cc139e7f75c1fe62af06bf30be00be362e03785273
SHA5120f56189b775b9775a1e20412fc115e9d059aff5b8359a5bc45407881e3862247bca8291fb489454e239cf7c3b51316c169267111df8ef59cc02166c98d1613b2
-
Filesize
212B
MD5668767f1e0c7ff2b3960447e259e9f00
SHA132d8abf834cce72f5e845175a0af2513b00504d8
SHA256cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d
SHA512c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680
-
C:\Users\Admin\AppData\Local\Temp\7279DF54A02941F1892F7C5A00C85C30\7279DF54A02941F1892F7C5A00C85C30_LogFile.txt
Filesize2KB
MD573a2a2ae8644905d0fc0e3507ece5b7c
SHA1bba2f0206cc16d8ced1455b6e96f53aca099e328
SHA2560ca9a2a9d6a9b51e6e87f26d2595ba3cd6b660877e3b240f4713e1c0d2298e17
SHA5127defaf9e8fe4ab5e9c698bece010e916dc60d0d0601a10905d66bdd232f8f98caaf16fe1c6aedbdd3133389440fdd935f23557c4bda0950580e1b82a7505c18d
-
C:\Users\Admin\AppData\Local\Temp\7279DF54A02941F1892F7C5A00C85C30\7279DF54A02941F1892F7C5A00C85C30_LogFile.txt
Filesize3KB
MD5145836bab93b519b0f08891401a8d2d2
SHA1bd2b8fc523f66aa7d1f1fb69c7418590f139e826
SHA256ddf7a89bbb2f8e45bc73b1ea477d2bdafaeafafbba58a4965d4f4eac9550f0e1
SHA5126db6482022b2f405a8d516c68f6e2ac306a8b9b476404d773579cb1c34fee51ab0bc3741e364e8e40de387c731d77c775fcc355367a399496bce443013c61d40
-
C:\Users\Admin\AppData\Local\Temp\7279DF54A02941F1892F7C5A00C85C30\7279DF54A02941F1892F7C5A00C85C30_LogFile.txt
Filesize5KB
MD5a64f5c3ce2cb2461f367b5f37019b218
SHA100bd27aa5aee7ba9c8e9aab6347ffa0c793c757f
SHA2562bcd9d000a7c60648f119f2442a4e5def8fb80e8fdab23fce0648d73c618c8ea
SHA512f266b7a10968ca744b9755b0e38e95308ecf88e259847674829606af2caa00670d468618e95e7b18b5856090e81ca866a690ff0e4b26ea83f6e657f4b9f41dd4
-
Filesize
26KB
MD5190ef6fcdd164d695451d869293fc119
SHA17c62adbccd52806829d91e4426db10878da3ca2e
SHA25664680576c6342e7046e15e81b3c73decd74a0c9731e3bf157dd668772c8be17d
SHA512897d2ca823cc730bf2213bace6c4eb4cd908c66db96bf73e65ee335ed2ed75cafce42c23f5dc44c5bf47f8549a4fe9b8ada0e6b59d564a8c31e88d1a73d3504d