Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 22:21
Static task
static1
Behavioral task
behavioral1
Sample
61191bb2e24ce7056718e200c64f5def_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
61191bb2e24ce7056718e200c64f5def_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
61191bb2e24ce7056718e200c64f5def_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
61191bb2e24ce7056718e200c64f5def
-
SHA1
cf0d4086e81895d41871aa6f3c0c31b57c4341a1
-
SHA256
002010c87ae6d925cf42a913b5c4d4ed12c6c3f22b8aa0779176ca31b9a47bbd
-
SHA512
4fa1363e8e2450776155af43db1cfdd674088958fa32b957984a31d12636c83927dfee746b130821037f4f75f7f2b080fde041ac9cabe627cd62ee7ee6783a16
-
SSDEEP
24576:vTfEWQMHi9jzdDnAqjtNqwbZjJsCqD/wXNXYLmYmHfAlOFpe8Qk+Th/Dxsnoi:bcW4f/qwlvpYLm5Al98uTBlsnoi
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation 61191bb2e24ce7056718e200c64f5def_JaffaCakes118.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Executes dropped EXE 2 IoCs
pid Process 1820 61191bb2e24ce7056718e200c64f5def_JaffaCakes118.tmp 1512 DiskScan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4508 1512 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1820 61191bb2e24ce7056718e200c64f5def_JaffaCakes118.tmp 1820 61191bb2e24ce7056718e200c64f5def_JaffaCakes118.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1820 61191bb2e24ce7056718e200c64f5def_JaffaCakes118.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 528 wrote to memory of 1820 528 61191bb2e24ce7056718e200c64f5def_JaffaCakes118.exe 83 PID 528 wrote to memory of 1820 528 61191bb2e24ce7056718e200c64f5def_JaffaCakes118.exe 83 PID 528 wrote to memory of 1820 528 61191bb2e24ce7056718e200c64f5def_JaffaCakes118.exe 83 PID 1820 wrote to memory of 1512 1820 61191bb2e24ce7056718e200c64f5def_JaffaCakes118.tmp 85 PID 1820 wrote to memory of 1512 1820 61191bb2e24ce7056718e200c64f5def_JaffaCakes118.tmp 85 PID 1820 wrote to memory of 1512 1820 61191bb2e24ce7056718e200c64f5def_JaffaCakes118.tmp 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\61191bb2e24ce7056718e200c64f5def_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\61191bb2e24ce7056718e200c64f5def_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Local\Temp\is-5I6H2.tmp\61191bb2e24ce7056718e200c64f5def_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-5I6H2.tmp\61191bb2e24ce7056718e200c64f5def_JaffaCakes118.tmp" /SL5="$70068,1254394,809984,C:\Users\Admin\AppData\Local\Temp\61191bb2e24ce7056718e200c64f5def_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\DiskProtect190001\DiskScan.exe"C:\Users\Admin\AppData\Local\Temp\DiskProtect190001\DiskScan.exe"3⤵
- Executes dropped EXE
PID:1512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1512 -s 9844⤵
- Program crash
PID:4508
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1512 -ip 15121⤵PID:828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5881355d510438c7582d046921b0d5a89
SHA17927af74c76885b3fcc46e491823e98330404762
SHA256cec5f50b86f45a8b284a3b6da41bfcd549dbad58ec64eabf81edf85fd9de89cb
SHA512a509d3ea6e28b2f98fd3badfbc789fc2034bab6ad0660ebda3654311c4624129a349dea91562a3870c944b3d7051c82af359a76524679a84b872a14657373d0e
-
Filesize
2.5MB
MD5b791cce5df067cdb8b8a8eae20d3c8f4
SHA19558d6e5de346d2e444ac869e885d101dcf94b83
SHA256c4905f1105c0d90fa77d346c8b088ac6a1a18326c0d356f24fee45ef6484955e
SHA512fada58d582d51406728cf6018110e0f8acef09b9f55fcb22252660524b98f33b7695c4f0cd3e4bfa6b47c4e82d7a335665a3be86f6ea3218ea30ffa7c025444f