Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 07:47
Static task
static1
Behavioral task
behavioral1
Sample
3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
3e6f710d5ae5cc28ea528b6c285b3a97
-
SHA1
d0887a05e2bc934506f7ab95148078abd1ebe602
-
SHA256
ecc1495235b5c7a3199f7e18441c3c5021427d817a80c3bdaa3190bbd8b2d432
-
SHA512
3d641450d33fbac9649e0ccd3d124d128db8610f57d234b27dcad0d31e12005c37d09b8abe1ee135cc36f3a77aefe597ed062854e5a17839b312582b6b91abd8
-
SSDEEP
12288:+Kbl0PnKIgr4N50rI7mbV28MqXB6E4q4oQS:+CUPgcNak0V28DgE49S
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3524 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Golf = "\\Golf\\Golf.exe" 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Golf = "C:\\Users\\Admin\\AppData\\Roaming\\Golf\\Golf.exe" 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3312 set thread context of 4120 3312 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 95 PID 3524 set thread context of 224 3524 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4384 PING.EXE -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3312 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe Token: SeDebugPrivilege 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe Token: SeDebugPrivilege 3524 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe Token: SeDebugPrivilege 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe Token: 33 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe Token: SeIncBasePriorityPrivilege 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 224 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 3312 wrote to memory of 4120 3312 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 95 PID 3312 wrote to memory of 4120 3312 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 95 PID 3312 wrote to memory of 4120 3312 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 95 PID 3312 wrote to memory of 4120 3312 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 95 PID 3312 wrote to memory of 4120 3312 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 95 PID 3312 wrote to memory of 4120 3312 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 95 PID 3312 wrote to memory of 4120 3312 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 95 PID 3312 wrote to memory of 4120 3312 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 95 PID 4120 wrote to memory of 3524 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 100 PID 4120 wrote to memory of 3524 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 100 PID 4120 wrote to memory of 3524 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 100 PID 4120 wrote to memory of 3120 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 101 PID 4120 wrote to memory of 3120 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 101 PID 4120 wrote to memory of 3120 4120 3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe 101 PID 3120 wrote to memory of 4384 3120 cmd.exe 103 PID 3120 wrote to memory of 4384 3120 cmd.exe 103 PID 3120 wrote to memory of 4384 3120 cmd.exe 103 PID 3524 wrote to memory of 224 3524 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 104 PID 3524 wrote to memory of 224 3524 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 104 PID 3524 wrote to memory of 224 3524 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 104 PID 3524 wrote to memory of 224 3524 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 104 PID 3524 wrote to memory of 224 3524 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 104 PID 3524 wrote to memory of 224 3524 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 104 PID 3524 wrote to memory of 224 3524 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 104 PID 3524 wrote to memory of 224 3524 3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:224
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10004⤵
- Runs ping.exe
PID:4384
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1032 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:3376
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe.log
Filesize1KB
MD513aebabe1d99d883b70bc62d943b9f89
SHA1a3d41415e9b28f8245d18dabf1f050e083c8aa87
SHA2564cc656f4c5c0fcd14b98a5069d7328fe5d94b617e5b042148964712d22d50463
SHA512eabc7340cb077872f97df766b02fe3b1145d344cfc9fa3911ff7b89811e124a0ded76edfa8a9d0d7c56cf93e4807ba13c99e352d9046cf22a0d9d1bdaa651c40
-
C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe
Filesize1.0MB
MD53e6f710d5ae5cc28ea528b6c285b3a97
SHA1d0887a05e2bc934506f7ab95148078abd1ebe602
SHA256ecc1495235b5c7a3199f7e18441c3c5021427d817a80c3bdaa3190bbd8b2d432
SHA5123d641450d33fbac9649e0ccd3d124d128db8610f57d234b27dcad0d31e12005c37d09b8abe1ee135cc36f3a77aefe597ed062854e5a17839b312582b6b91abd8
-
Filesize
44B
MD52c8643b9c679aa067e11a4d26c9a994f
SHA12afc9e72840070a36d131d82d0a40e02c875a2a9
SHA2560ff6b67298aa8c2fbe8a4c510894936d8cee1ecbe262f1341ddb88899ab2bed9
SHA5123f1602fabde743dc90afe030b758a2e0ceebd302e0e62e23b5bef24139cb3aa01cf7a0301de56e75290d5f675efa1b386bf09a3d59c686cc93521c16d995f685