Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 07:31
Static task
static1
Behavioral task
behavioral1
Sample
667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe
-
Size
570KB
-
MD5
667af01c1421aee7b032c625cad95eeb
-
SHA1
68a8a8be1102d23eeb0a93d4b043a6d6b621d418
-
SHA256
696602a7bf7c108371fb7d5f0ec69c4be3ab47fc8b3120638e86482cf7c32550
-
SHA512
39170e4cad305ef9016fcd369e1838d5daa683c0eb41174c209af7c22f3fb8d7dbc7435dc4be7c21348ed5d1191b2d12e816f24026345e5b87785c74ce9c3a27
-
SSDEEP
12288:aVwH8ne+eAECn2cI49JfR6suE4/aY0kkGkkSi:eU8e+dn2cLfR6sd6F
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe -
Unexpected DNS network traffic destination 64 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 161.97.219.84 Destination IP 204.11.56.48 Destination IP 204.11.56.48 Destination IP 161.97.219.84 Destination IP 63.231.92.27 Destination IP 204.11.56.48 Destination IP 204.11.56.48 Destination IP 204.11.56.48 Destination IP 217.160.70.42 Destination IP 217.160.70.42 Destination IP 161.97.219.84 Destination IP 217.160.70.42 Destination IP 217.160.70.42 Destination IP 217.160.70.42 Destination IP 161.97.219.84 Destination IP 161.97.219.84 Destination IP 204.11.56.48 Destination IP 161.97.219.84 Destination IP 217.160.70.42 Destination IP 161.97.219.84 Destination IP 217.160.70.42 Destination IP 204.11.56.48 Destination IP 161.97.219.84 Destination IP 161.97.219.84 Destination IP 161.97.219.84 Destination IP 204.11.56.48 Destination IP 161.97.219.84 Destination IP 161.97.219.84 Destination IP 217.160.70.42 Destination IP 204.11.56.48 Destination IP 161.97.219.84 Destination IP 217.160.70.42 Destination IP 217.160.70.42 Destination IP 161.97.219.84 Destination IP 161.97.219.84 Destination IP 161.97.219.84 Destination IP 217.160.70.42 Destination IP 217.160.70.42 Destination IP 204.11.56.48 Destination IP 161.97.219.84 Destination IP 204.11.56.48 Destination IP 161.97.219.84 Destination IP 204.11.56.48 Destination IP 217.160.70.42 Destination IP 161.97.219.84 Destination IP 204.11.56.48 Destination IP 161.97.219.84 Destination IP 161.97.219.84 Destination IP 161.97.219.84 Destination IP 217.160.70.42 Destination IP 161.97.219.84 Destination IP 217.160.70.42 Destination IP 204.11.56.48 Destination IP 63.231.92.27 Destination IP 204.11.56.48 Destination IP 217.160.70.42 Destination IP 217.160.70.42 Destination IP 217.160.70.42 Destination IP 204.11.56.48 Destination IP 217.160.70.42 Destination IP 204.11.56.48 Destination IP 204.11.56.48 Destination IP 161.97.219.84 Destination IP 217.160.70.42 -
Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "0" explorer.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "0" explorer.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\Main\TabProcGrowth = "0" explorer.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 4136 explorer.exe 4136 explorer.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 816 wrote to memory of 4136 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 97 PID 816 wrote to memory of 4136 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 97 PID 816 wrote to memory of 4136 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 97 PID 816 wrote to memory of 4136 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 97 PID 816 wrote to memory of 4136 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 97 PID 816 wrote to memory of 4136 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 97 PID 816 wrote to memory of 4136 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 97 PID 816 wrote to memory of 4136 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 97 PID 816 wrote to memory of 4136 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 97 PID 816 wrote to memory of 4136 816 667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\667af01c1421aee7b032c625cad95eeb_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\system32\explorer.exe"2⤵
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:4136
-