Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 02:29
Behavioral task
behavioral1
Sample
61c07b94aa1b119e673c69838173ec9b_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
61c07b94aa1b119e673c69838173ec9b_JaffaCakes118.exe
-
Size
2.0MB
-
MD5
61c07b94aa1b119e673c69838173ec9b
-
SHA1
fff5dc6b40eedc988c615538c1bf2b03bb187680
-
SHA256
daeabb4f77670f7b24e89bf05e25bd5d17c5679fb6f3fa5baee1ba2d27ae9220
-
SHA512
f3758568f3706bf9c89e74669b472f1853a5d0694af4e2bb466154f1a9ba0ce75b0ad1a0b9cb3c0a60a81b96a758e4a4c80e1f60d93982ee98d13ff7b3f1f988
-
SSDEEP
49152:cUwT0VCJYbHkap4puMVV+cNOQTkcUK77ny+A+hAC/PjyOiPmYa/imLQbf:0WK+HfVUxOQTkRKXdA+JzyOYmFVQbf
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine 61c07b94aa1b119e673c69838173ec9b_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine 61c07b94aa1b119e673c69838173ec9b_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4908-0-0x0000000000400000-0x0000000000956000-memory.dmp upx behavioral2/memory/4908-89-0x0000000000400000-0x0000000000956000-memory.dmp upx behavioral2/memory/4908-90-0x0000000000400000-0x0000000000956000-memory.dmp upx behavioral2/memory/4908-91-0x0000000000400000-0x0000000000956000-memory.dmp upx behavioral2/memory/4908-92-0x0000000000400000-0x0000000000956000-memory.dmp upx behavioral2/memory/4908-93-0x0000000000400000-0x0000000000956000-memory.dmp upx behavioral2/memory/4908-94-0x0000000000400000-0x0000000000956000-memory.dmp upx behavioral2/memory/4908-95-0x0000000000400000-0x0000000000956000-memory.dmp upx behavioral2/memory/4908-96-0x0000000000400000-0x0000000000956000-memory.dmp upx behavioral2/memory/4908-97-0x0000000000400000-0x0000000000956000-memory.dmp upx behavioral2/memory/4908-98-0x0000000000400000-0x0000000000956000-memory.dmp upx behavioral2/memory/4908-99-0x0000000000400000-0x0000000000956000-memory.dmp upx behavioral2/memory/4908-100-0x0000000000400000-0x0000000000956000-memory.dmp upx behavioral2/memory/4908-101-0x0000000000400000-0x0000000000956000-memory.dmp upx behavioral2/memory/4908-102-0x0000000000400000-0x0000000000956000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 61c07b94aa1b119e673c69838173ec9b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1396 1972 WerFault.exe 97 -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\FalconBetaAccount 61c07b94aa1b119e673c69838173ec9b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\FalconBetaAccount\remote_access_client_id = "3054566362" 61c07b94aa1b119e673c69838173ec9b_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4908 61c07b94aa1b119e673c69838173ec9b_JaffaCakes118.exe 4908 61c07b94aa1b119e673c69838173ec9b_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 4908 61c07b94aa1b119e673c69838173ec9b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4908 wrote to memory of 1972 4908 61c07b94aa1b119e673c69838173ec9b_JaffaCakes118.exe 97 PID 4908 wrote to memory of 1972 4908 61c07b94aa1b119e673c69838173ec9b_JaffaCakes118.exe 97 PID 4908 wrote to memory of 1972 4908 61c07b94aa1b119e673c69838173ec9b_JaffaCakes118.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\61c07b94aa1b119e673c69838173ec9b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\61c07b94aa1b119e673c69838173ec9b_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\HYDE2C0.tmp.1716258567\HTA\index.hta?utorrent" "C:\Users\Admin\AppData\Local\Temp\61c07b94aa1b119e673c69838173ec9b_JaffaCakes118.exe" /LOG "C:\Users\Admin\AppData\Local\Temp\HYDE2C0.tmp.1716258567\index.hta.log" /PID "4908" /CID "SupoKnjBHxLZtOWq" /VERSION "111850052" /BUCKET "0" /SSB "2" /COUNTRY "US" /OS "10.0" /BROWSERS "\"C:\Program Files\Mozilla Firefox\firefox.exe\",\"C:\Program Files\Google\Chrome\Application\chrome.exe\",C:\Program Files\Internet Explorer\iexplore.exe,\"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe\"" /ARCHITECTURE "64" /LANG "en" /USERNAME "Admin" /SID "S-1-5-21-1181767204-2009306918-3718769404-1000" /CLIENT "utorrent"2⤵PID:1972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 14203⤵
- Program crash
PID:1396
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1972 -ip 19721⤵PID:3228
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3980,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=4488 /prefetch:81⤵PID:4792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD544d122c9473107fc36412de81418c84a
SHA1a0072c789a9cd50ba561683c69af8602927cf4a8
SHA2567c7279daebd88f6a34246603db9c0ecf9bbfa35ef820edd3278e5bc53f9e7680
SHA512b4294b80edc0566744dd98a5ab3e2ac64a4ce4851192d5610ee13f12dc24947f51b7d5b5629f7bff6004d74e5a2b728913cda1b3386cf878ab7fb365490d8067
-
Filesize
522B
MD576903930c0ade2285f1ab1bf54be660d
SHA10fdd5990ca58cf6c49985ffd2075baa09cd728ce
SHA25661acd6e7405fad348433f8de4b12ed97b42caccbcf28fe0e4ba4b4a5d2ea707e
SHA512c66c7f9f488a0ac58fc1b7c6560edb4bc6df71a3504c2567ac54f4f89aee40a7073865e67e508baf4e055555bbc2f461d5b558a427ab6ac602b9fe0b1f9f8c71
-
Filesize
743KB
MD5b95e97108189f7babf89539f08186890
SHA1bf8e669ff37c68d86eafd239bd82684b0bce00a0
SHA25652bd756b898a3e7dd1c0ec8d3ef76db5f68b9fc5953ca61c493df01eec61ca12
SHA512cca151213d0062d529d267f31af39236527399b96b019f0c6a68b68bfbcb0bbd7fa747ad24b8d7db9c900e08ed47cfbe79fdd88e1ff97e0ab7eafc5fe228c649
-
Filesize
337KB
MD578b4d4390bff0f011ebd271c9bebeec5
SHA112f0f137a8173be5791187a583256894d68bea26
SHA2562f2edf2bd12ae6c6553042c30cb73b967e9066babad5f18f5ff054e708ffd19c
SHA512a83f8133f26fca263070b278879582268d5bc02a4bad5028f5c80517c069bdc9915b21bcdea31f4f81df04ab891e9b5858109d80e2e4421812af64ae1c12a67b
-
Filesize
1005B
MD52a65c76b51a2c15eebeefa662d511af9
SHA13c5f93d39fdd573e43c7a451836d425bc1b07a5d
SHA25631fc706ae4bd5093aecb6a0b7f9d3b686feb284076b1122aaff978779612dc06
SHA51285b012dca5bbdbdd929de859ae41ed817c7f1e02eae70aaaf687f9ba381f696fa7751e3f2262d48c14f49c9090f106a6bb9652962d38bb7fab93214a2466e8ed
-
Filesize
5KB
MD536f8dbcbdeed01079dcd0abdf481ffd7
SHA1354d8fa00c37255d15a07a8b93f99ec2821ed1a2
SHA2568d41b55c7626eccd4369418e4d0a1cfc2c7ca56b6424ac7b04e50ebc883837c9
SHA5123a9ace6ed03f59599739bba74271aac5f4bdd589cbc2727285dd26fe390c8febebd9915c0d72e809e09c47f3d6ec12709acbd99c69796672775f5c0159c4a4d1
-
Filesize
99KB
MD58a94d780401556cceabf35058bbd4b5a
SHA119ee91b1629f4ccf0fca1f664405a1eee9dacc5a
SHA256086a7e44de35a235bc258bf1107e22a7dc27932cb4d7e3ebcd1f368acc000caa
SHA512b02fdc9b46f6fa8424660f462bb290c60c0635ad5cb9fa1b386a55d85d4368d06ae5611d355f8dc0db76477c2e332b0501e70cbbba77c45aa027e1cac59ca182
-
Filesize
7KB
MD53d70934d3a3c1d94e880562b84b64b94
SHA1d4d10ccbea8cd7dc9bccbd307836ef08f1772567
SHA256bb0a32b98425b094426da6ce102a82a79ab77aafb0d4145be7279bf905c4b2de
SHA512080523a70d653d4a1355763d04a8af2583782d14e622545c502851d5edb9994797501b7e5b7b1628c188df4b8b67f92e775c55d467e6b3b7265213cd71d3eb7f
-
Filesize
170B
MD514c4865c8303c8b70f38f25a9a1dba9a
SHA1d5ed8ed0a5bffafbe37633ff4fcffe1fca08a6f5
SHA25691256ed34d4c50d3f49ecba86f95cb16f47a760d600f9e24b239430fe1fabfc2
SHA51288b33dd933189073ecb4f8c9eef14ecc8f9c138787365b0bfebf88a65a4cc0ee4896cc1466a517cc18c0e4d1ae0317b717376648b6aaa5b76c2724d44fa3980e