Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 00:50
Static task
static1
Behavioral task
behavioral1
Sample
5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe
-
Size
887KB
-
MD5
5254548426fabd56ac93ac853a416d42
-
SHA1
9bef9b9c3ae82c8ab195e6ac025b9af3f10ef338
-
SHA256
0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349
-
SHA512
f8f5301ce64a1c29fc46c606fe0137ffe00a358069eb3f52f8361079ea18cec0301d9c472dabce117f702e74a17cbd63321c111094e063a2d2e3cec092af13f1
-
SSDEEP
24576:AZEwvy6JFxYi2FS7O36LDHL1thNGkVtG:AZp9FL719Uke
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2832 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Instalapp = "C:\\Users\\Admin\\AppData\\Roaming\\Temp\\instalapp.exe" 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Instalapp = "\\Temp\\instalapp.exe" 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 212 set thread context of 1256 212 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 96 PID 2832 set thread context of 4744 2832 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1352 PING.EXE -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 212 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe Token: SeDebugPrivilege 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe Token: SeDebugPrivilege 2832 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe Token: SeDebugPrivilege 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe Token: 33 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe Token: SeIncBasePriorityPrivilege 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4744 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 212 wrote to memory of 1256 212 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 96 PID 212 wrote to memory of 1256 212 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 96 PID 212 wrote to memory of 1256 212 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 96 PID 212 wrote to memory of 1256 212 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 96 PID 212 wrote to memory of 1256 212 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 96 PID 212 wrote to memory of 1256 212 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 96 PID 212 wrote to memory of 1256 212 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 96 PID 212 wrote to memory of 1256 212 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 96 PID 1256 wrote to memory of 2832 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 98 PID 1256 wrote to memory of 2832 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 98 PID 1256 wrote to memory of 2832 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 98 PID 1256 wrote to memory of 1184 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 99 PID 1256 wrote to memory of 1184 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 99 PID 1256 wrote to memory of 1184 1256 5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe 99 PID 1184 wrote to memory of 1352 1184 cmd.exe 101 PID 1184 wrote to memory of 1352 1184 cmd.exe 101 PID 1184 wrote to memory of 1352 1184 cmd.exe 101 PID 2832 wrote to memory of 4744 2832 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 104 PID 2832 wrote to memory of 4744 2832 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 104 PID 2832 wrote to memory of 4744 2832 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 104 PID 2832 wrote to memory of 4744 2832 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 104 PID 2832 wrote to memory of 4744 2832 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 104 PID 2832 wrote to memory of 4744 2832 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 104 PID 2832 wrote to memory of 4744 2832 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 104 PID 2832 wrote to memory of 4744 2832 5254548426fabd56ac93ac853a416d42_jaffacakes118.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\5254548426fabd56ac93ac853a416d42_jaffacakes118\5254548426fabd56ac93ac853a416d42_jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\5254548426fabd56ac93ac853a416d42_jaffacakes118\5254548426fabd56ac93ac853a416d42_jaffacakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\5254548426fabd56ac93ac853a416d42_jaffacakes118\5254548426fabd56ac93ac853a416d42_jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\5254548426fabd56ac93ac853a416d42_jaffacakes118\5254548426fabd56ac93ac853a416d42_jaffacakes118.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4744
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\5254548426fabd56ac93ac853a416d42_JaffaCakes118.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10004⤵
- Runs ping.exe
PID:1352
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\5254548426fabd56ac93ac853a416d42_jaffacakes118.exe.log
Filesize1KB
MD511eacbaf9bddbe05b02b6dc4cd9872ea
SHA16e57b21f23521bb174ff36b6e5c8d14924914e9e
SHA25608e026372f53d74354b848cb6ef85b59a0612d67dd993fb77def1fa5355391f1
SHA51299c057a53a0d69b093e359104dda834967e4132f76192e80e79512f465e6fca41325865eec92bca0f11ff4f00c98c185d2d183e56edee964377ea9d4a234961c
-
C:\Users\Admin\AppData\Local\Temp\5254548426fabd56ac93ac853a416d42_jaffacakes118\5254548426fabd56ac93ac853a416d42_jaffacakes118.exe
Filesize887KB
MD55254548426fabd56ac93ac853a416d42
SHA19bef9b9c3ae82c8ab195e6ac025b9af3f10ef338
SHA2560e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349
SHA512f8f5301ce64a1c29fc46c606fe0137ffe00a358069eb3f52f8361079ea18cec0301d9c472dabce117f702e74a17cbd63321c111094e063a2d2e3cec092af13f1
-
Filesize
49B
MD542c7e3072ea14780c47bb52763cb6d29
SHA16dbbd5a8bd2db9f2dc6f0afc3f9e2dc2fbd9d158
SHA2568ff7fb349820cc31e2d4e14fc5c9dae6ef3b844e827d5b5e0b258bd30c1530f0
SHA5127a803a34b257d0be2c7c057bee2502ac8f744c8cc9a2205949445349b91a394f0aa23489bff49558207524ddd0cac7559ad94a23926bbac58df0e3ec5c791b1e