Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 03:32
Static task
static1
Behavioral task
behavioral1
Sample
65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe
-
Size
783KB
-
MD5
65dccf8a8e79cdffd9503b7bb02a214b
-
SHA1
05e5f36b30eea224f854512cc51711c0dd946cf4
-
SHA256
4652853b89746a272a790d68dab0d9928479deaf47b6e637d1527be88581c684
-
SHA512
2d04b9bc4050afde8f219735916baf27a1d0cdf68aec8d9c7cea856bb50c7da308d4377ce8f2ec58bdff0e5342ebfe697cec1bbd5e9f1fcb72c2be5375ab6662
-
SSDEEP
12288:78gvKPTYu3Rt1EzCT0r42brU/kcKXIMq0VumwNn6ciC:70TNRtm9nrU/YXSms7i
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe -
Drops startup file 1 IoCs
Processes:
WScript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Protected.lnk WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Protected = "C:\\Users\\Admin\\AppData\\Roaming\\Protected.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exedescription pid process target process PID 1136 set thread context of 4688 1136 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.execmd.exedescription pid process target process PID 1136 wrote to memory of 2724 1136 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe cmd.exe PID 1136 wrote to memory of 2724 1136 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe cmd.exe PID 1136 wrote to memory of 2724 1136 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe cmd.exe PID 2724 wrote to memory of 1852 2724 cmd.exe reg.exe PID 2724 wrote to memory of 1852 2724 cmd.exe reg.exe PID 2724 wrote to memory of 1852 2724 cmd.exe reg.exe PID 1136 wrote to memory of 3924 1136 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe WScript.exe PID 1136 wrote to memory of 3924 1136 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe WScript.exe PID 1136 wrote to memory of 3924 1136 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe WScript.exe PID 1136 wrote to memory of 4688 1136 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe PID 1136 wrote to memory of 4688 1136 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe PID 1136 wrote to memory of 4688 1136 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe PID 1136 wrote to memory of 4688 1136 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe PID 1136 wrote to memory of 4688 1136 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe PID 1136 wrote to memory of 4688 1136 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe PID 1136 wrote to memory of 4688 1136 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe PID 1136 wrote to memory of 4688 1136 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe PID 1136 wrote to memory of 4688 1136 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Protected" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Protected.exe" /f & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Protected" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Protected.exe" /f3⤵
- Adds Run key to start application
PID:1852 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Protected.vbs"2⤵
- Drops startup file
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe"2⤵PID:4688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
486B
MD52587877cb2996938e84649661163fda6
SHA1b1006953effd236ab7be0b929a1e872555c37695
SHA256238414d41f9d60a68b00842373a3a0b98b65737bb8ae0d47dc5cf7b5e675c96c
SHA51287b618f3add9d4ef833bce46ae2c8eeb3dd2598445676b1dffddb1971020994dcd0a8ae7ea05d3d1cbbe312787d2df76d5cf300f6efd65faeffb70c574d96d03