Analysis
-
max time kernel
141s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 23:23
Static task
static1
Behavioral task
behavioral1
Sample
48881f9f6d605bd8afbc9c54fe267511_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
48881f9f6d605bd8afbc9c54fe267511_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$_3_.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$_3_.exe
Resource
win10v2004-20240508-en
General
-
Target
48881f9f6d605bd8afbc9c54fe267511_JaffaCakes118.exe
-
Size
789KB
-
MD5
48881f9f6d605bd8afbc9c54fe267511
-
SHA1
f77f719736577af8f82a742716fc1ff856f37ee3
-
SHA256
4f0dbc194d79df6349075e392471ffe8c73676f3b5653b1fef011f97292f0e7c
-
SHA512
0d813da9f669190bc8d7f2a537e770731fa4eb2ac416c1c3d9dca35991d892c8caaead1f5ebace939f36ee774d4c6d5738d918908336f18751fb0492fb058161
-
SSDEEP
12288:itobbXN42nHq+EgqfRAUEcB3gOE6DZlZUXavlXluE70pFdZigcyrG4EEu44na:it8RHjEgYAw1hZlZTWQu7igcyKPEuja
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation internal48881f9f6d605bd8afbc9c54fe267511_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3628 internal48881f9f6d605bd8afbc9c54fe267511_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 964 48881f9f6d605bd8afbc9c54fe267511_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3628 internal48881f9f6d605bd8afbc9c54fe267511_JaffaCakes118.exe 3628 internal48881f9f6d605bd8afbc9c54fe267511_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3628 internal48881f9f6d605bd8afbc9c54fe267511_JaffaCakes118.exe 3628 internal48881f9f6d605bd8afbc9c54fe267511_JaffaCakes118.exe 3628 internal48881f9f6d605bd8afbc9c54fe267511_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 964 wrote to memory of 3628 964 48881f9f6d605bd8afbc9c54fe267511_JaffaCakes118.exe 83 PID 964 wrote to memory of 3628 964 48881f9f6d605bd8afbc9c54fe267511_JaffaCakes118.exe 83 PID 964 wrote to memory of 3628 964 48881f9f6d605bd8afbc9c54fe267511_JaffaCakes118.exe 83 PID 3628 wrote to memory of 1056 3628 internal48881f9f6d605bd8afbc9c54fe267511_JaffaCakes118.exe 98 PID 3628 wrote to memory of 1056 3628 internal48881f9f6d605bd8afbc9c54fe267511_JaffaCakes118.exe 98 PID 3628 wrote to memory of 1056 3628 internal48881f9f6d605bd8afbc9c54fe267511_JaffaCakes118.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\48881f9f6d605bd8afbc9c54fe267511_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\48881f9f6d605bd8afbc9c54fe267511_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\nsi42A8.tmp\internal48881f9f6d605bd8afbc9c54fe267511_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\nsi42A8.tmp\internal48881f9f6d605bd8afbc9c54fe267511_JaffaCakes118.exe /baseInstaller='C:/Users/Admin/AppData/Local/Temp/48881f9f6d605bd8afbc9c54fe267511_JaffaCakes118.exe' /fallbackfolder='C:/Users/Admin/AppData/Local/Temp/nsi42A8.tmp/fallbackfiles/'2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\12094.bat" "C:\Users\Admin\AppData\Local\Temp\29E4DBEA3BA845468B9D6D5BB85B930C\""3⤵PID:1056
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98B
MD55ffcefe4c828bc08ca001e38e74ce811
SHA137aa361d58e3b6988a156acdbea99feb754a84af
SHA256c04ef8a459c1f24fbeee51230647e96b03adf3810c156f8e84af58d92d54e74c
SHA512fc706b8106f699268253ba8bd023f5f0eba6955cda4ad2b338d418b8802ea55aff6ed92bc6656086734b3d61d6d07bcdf001f28924f8a0b8d12e10e2b3983759
-
Filesize
212B
MD5668767f1e0c7ff2b3960447e259e9f00
SHA132d8abf834cce72f5e845175a0af2513b00504d8
SHA256cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d
SHA512c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680
-
C:\Users\Admin\AppData\Local\Temp\29E4DBEA3BA845468B9D6D5BB85B930C\29E4DBEA3BA845468B9D6D5BB85B930C_LogFile.txt
Filesize10KB
MD56123b1b2c4b7adcd9fab15cd99b1ced9
SHA16386a61c459f02820569b0f802084a14d350324f
SHA25666d8717879666d726b77e08e46756d5b4dbdfa2c61933e4491356dacb6ffe466
SHA5128584f0b142298f6edec20c0c584008bea7eaa29968ad7f1edb9e59ec01dc8750ef9cbb4ca8efe316d1122b553b7422d85758ab27733076d28cf2fd638768e179
-
Filesize
109KB
MD5655790e060b3f8391abc941757abc9cc
SHA1c24b52f64e0af319ea90766443cd1f8828233e19
SHA256e86110b255163b9f3678f5bd7dd65b2248145178840cc554d3c00a9c3f3cd8f8
SHA51212c8d660a6ea7ffd35125df0e1b70027cfe6c8a210889aaa196629373f3c0a1f2344ee9dd62a0385da1f5511652679d8cc2867b08a197f5153954f6e0bd56874
-
Filesize
14KB
MD521010df9bc37daffcc0b5ae190381d85
SHA1a8ba022aafc1233894db29e40e569dfc8b280eb9
SHA2560ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16
SHA51295d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e
-
C:\Users\Admin\AppData\Local\Temp\nsi42A8.tmp\internal48881f9f6d605bd8afbc9c54fe267511_JaffaCakes118.exe
Filesize1.8MB
MD59ab5db4bb5971035b4d287d64f9676b5
SHA133d17f016339572dd05c124d6243fffefd0cd039
SHA256f2126481c02d2a5af29e56023902a0897d05867c1caaf8079cf6e1f05dd9b209
SHA512d36262fdd4d8bd083d8537f0698c423240c9e42b2dc0048e2470d87411f295d6e3428587b76b0486875495d502f1f31f9edf3eb6fdb914f13421b7f29fa5f066
-
C:\Users\Admin\AppData\Local\Temp\nsi42A8.tmp\internal48881f9f6d605bd8afbc9c54fe267511_JaffaCakes118_icon.ico
Filesize17KB
MD5055c2cb77fa2edc2802b7fd397b9c213
SHA1e6bf5af3427539bf609cfb8904b35803a06104d3
SHA25678d0ed2288334f341225acee3d6200d01bb0bb80b873c448ab151d0661817bf2
SHA5127dc2930b9ac4843cca0a073a9195ab0cfb684b29c13622d0f934fb4b4a45af0fbb3a033f6ba31216214a9cbc1966436c36dd065c44b014c5c2a03dfd0b005a65
-
C:\Users\Admin\AppData\Local\Temp\nsi42A8.tmp\internal48881f9f6d605bd8afbc9c54fe267511_JaffaCakes118_splash.png
Filesize12KB
MD5fe272d040e82704707b19bfbf29d65ca
SHA1460de628ea63986a7e6390a1623d8ba32dc82aee
SHA2561cb036da61dc7b1ad62280681c724d74cbcc313d530a799728a4d38b4e2b1983
SHA5128a03f9f3ce7af53b2f119f9bd001ff3fd39f879de88723306e2a6c7e8cae679d2095be6d4520ea24035c86140ef01a178a0b2535674be5c39b8b2dde4d082b1b