Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:50
Static task
static1
Behavioral task
behavioral1
Sample
68c087f1601ab51088558b5a8f643a84_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
68c087f1601ab51088558b5a8f643a84_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
68c087f1601ab51088558b5a8f643a84_JaffaCakes118.exe
-
Size
1.6MB
-
MD5
68c087f1601ab51088558b5a8f643a84
-
SHA1
95014992739f47066c6699d28f2e98473a72b070
-
SHA256
613f3b76cd41db829f79178b642d4ad2572f1e7f1942681f3b44b81c7877872c
-
SHA512
4a5e107837492df8eeca5e250712194f54b67fb917bdcd4f150ffe0f72aa174ed5c4d848f1008acc5253bf8936ee5d5bf591b55e8635bffdbc26f5b4a1926f91
-
SSDEEP
49152:nZgu8rAi+3USz3h1/XBkThdTlpSuxQxN9dT4S9W:nGIjR1Oh0Ty
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
68c087f1601ab51088558b5a8f643a84_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 68c087f1601ab51088558b5a8f643a84_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
68c087f1601ab51088558b5a8f643a84_JaffaCakes118.exepid process 1372 68c087f1601ab51088558b5a8f643a84_JaffaCakes118.exe 1372 68c087f1601ab51088558b5a8f643a84_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
68c087f1601ab51088558b5a8f643a84_JaffaCakes118.exepid process 1372 68c087f1601ab51088558b5a8f643a84_JaffaCakes118.exe 1372 68c087f1601ab51088558b5a8f643a84_JaffaCakes118.exe 1372 68c087f1601ab51088558b5a8f643a84_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
68c087f1601ab51088558b5a8f643a84_JaffaCakes118.execmd.exedescription pid process target process PID 1372 wrote to memory of 2160 1372 68c087f1601ab51088558b5a8f643a84_JaffaCakes118.exe cmd.exe PID 1372 wrote to memory of 2160 1372 68c087f1601ab51088558b5a8f643a84_JaffaCakes118.exe cmd.exe PID 1372 wrote to memory of 2160 1372 68c087f1601ab51088558b5a8f643a84_JaffaCakes118.exe cmd.exe PID 2160 wrote to memory of 1712 2160 cmd.exe PING.EXE PID 2160 wrote to memory of 1712 2160 cmd.exe PING.EXE PID 2160 wrote to memory of 1712 2160 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\68c087f1601ab51088558b5a8f643a84_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\68c087f1601ab51088558b5a8f643a84_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\27003.bat" "C:\Users\Admin\AppData\Local\Temp\85F8A131FC4348479AEEF145A837E29E\""2⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:1712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5668767f1e0c7ff2b3960447e259e9f00
SHA132d8abf834cce72f5e845175a0af2513b00504d8
SHA256cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d
SHA512c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680
-
C:\Users\Admin\AppData\Local\Temp\85F8A131FC4348479AEEF145A837E29E\85F8A131FC4348479AEEF145A837E29E_LogFile.txt
Filesize2KB
MD51e27d3ff8419a860c99019136160a83b
SHA176ce7071c73201b81502d1b5bc58c59a79e57239
SHA256a6ba2ca2884d247bec6e7c78322ed988ada2200f62e73dbbc554ff019c05c71a
SHA51201262dd39b4584a00fbed53912ffe91ca840db9e70f60472759b263d3aabeff649edac42714e4ddc89b604ec10905db1fd5e81f1258427e34d4095930842db3d
-
C:\Users\Admin\AppData\Local\Temp\85F8A131FC4348479AEEF145A837E29E\85F8A131FC4348479AEEF145A837E29E_LogFile.txt
Filesize9KB
MD570181288ca5eff776abfc6cb1f2a75ef
SHA1584c2916935889b7775bb5b63bab2033adb3afa3
SHA256b2716865f74ac59ebed7a5012c2edb291a555078915b4292dad355d69e7d9f0b
SHA51216ece902b6e5881587ef02d8db0b8fb0292787b5b1af3708d49fa583b42d2887f24072c6072fd9df241f00e0d29af32952eeb0e86f23f552eaf3fc9ded8cfa63
-
Filesize
106KB
MD5145c6ed45beb4a4da6eacfbe137c0acf
SHA10759b3169d56128038dfa9e7e03e0a76d449cb26
SHA2562dca081a868dbb782fa15415aa50c4fd083242b87da2ef7bbfba00e8e6db18b7
SHA5121441e093c60d1062a1bbfc78ce23d6493f46649577bcf391868e3547394b0766d32b88f4a6d0d88e7d8026aef153769918e8fc5fa3a2a309c22ce22330af948d