Analysis
-
max time kernel
147s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 04:36
Static task
static1
Behavioral task
behavioral1
Sample
7457f8093e70201177324a864177c0a0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7457f8093e70201177324a864177c0a0_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
7457f8093e70201177324a864177c0a0_JaffaCakes118.exe
-
Size
556KB
-
MD5
7457f8093e70201177324a864177c0a0
-
SHA1
6a2f85277ef38212be308b7ccf76903dff624984
-
SHA256
a6d3232aeb2e3c6005036fb2777a3ce55cabf39ab8af66c09676852eae567193
-
SHA512
73c387564059f6190c83283ba6ed7b662f337bb4bcd32046a72f8f0e77ca07281f6b25c404e1dafb38ce6cfa40aa009cae6f284aa0b1712b7b10e7b102fae17a
-
SSDEEP
6144:iiUDqX0CehPi+joO/zHWR8Hnk4sJL7JW35ZZu/qQj7/KX9327RALTVeuKnK6Zh:iA1e0m5U8Hn+uiqQj7/KX9GNQEuKnz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7457f8093e70201177324a864177c0a0_JaffaCakes118.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 7457f8093e70201177324a864177c0a0_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 1 IoCs
Processes:
RemD.exepid process 1596 RemD.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7457f8093e70201177324a864177c0a0_JaffaCakes118.exeRemD.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hgfgihdgjyf = "\"C:\\Users\\Admin\\AppData\\Roaming\\RemD\\RemD.exe\"" 7457f8093e70201177324a864177c0a0_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hgfgihdgjyf = "\"C:\\Users\\Admin\\AppData\\Roaming\\RemD\\RemD.exe\"" RemD.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
RemD.exedescription pid process target process PID 1596 set thread context of 4872 1596 RemD.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
7457f8093e70201177324a864177c0a0_JaffaCakes118.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings 7457f8093e70201177324a864177c0a0_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
7457f8093e70201177324a864177c0a0_JaffaCakes118.exeRemD.exepid process 4704 7457f8093e70201177324a864177c0a0_JaffaCakes118.exe 1596 RemD.exe 1596 RemD.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
7457f8093e70201177324a864177c0a0_JaffaCakes118.exeWScript.execmd.exeRemD.exedescription pid process target process PID 4704 wrote to memory of 1576 4704 7457f8093e70201177324a864177c0a0_JaffaCakes118.exe WScript.exe PID 4704 wrote to memory of 1576 4704 7457f8093e70201177324a864177c0a0_JaffaCakes118.exe WScript.exe PID 4704 wrote to memory of 1576 4704 7457f8093e70201177324a864177c0a0_JaffaCakes118.exe WScript.exe PID 1576 wrote to memory of 2624 1576 WScript.exe cmd.exe PID 1576 wrote to memory of 2624 1576 WScript.exe cmd.exe PID 1576 wrote to memory of 2624 1576 WScript.exe cmd.exe PID 2624 wrote to memory of 1596 2624 cmd.exe RemD.exe PID 2624 wrote to memory of 1596 2624 cmd.exe RemD.exe PID 2624 wrote to memory of 1596 2624 cmd.exe RemD.exe PID 1596 wrote to memory of 4872 1596 RemD.exe svchost.exe PID 1596 wrote to memory of 4872 1596 RemD.exe svchost.exe PID 1596 wrote to memory of 4872 1596 RemD.exe svchost.exe PID 1596 wrote to memory of 4872 1596 RemD.exe svchost.exe PID 1596 wrote to memory of 4872 1596 RemD.exe svchost.exe PID 1596 wrote to memory of 4872 1596 RemD.exe svchost.exe PID 1596 wrote to memory of 4872 1596 RemD.exe svchost.exe PID 1596 wrote to memory of 4872 1596 RemD.exe svchost.exe PID 1596 wrote to memory of 4872 1596 RemD.exe svchost.exe PID 1596 wrote to memory of 4872 1596 RemD.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7457f8093e70201177324a864177c0a0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7457f8093e70201177324a864177c0a0_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\RemD\RemD.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Roaming\RemD\RemD.exeC:\Users\Admin\AppData\Roaming\RemD\RemD.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe5⤵PID:4872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
410B
MD5991cad69a8a5ac8e22281a335b88e2b3
SHA158568a006ade6e2ca7fa25673b036bcefa303a7d
SHA25695d975c5b36f23f9121390f8f4a1373b1cbb8045765e1c9fa68e114e2f592d60
SHA512298dc73384bf23e913f9a92e83040d84171ef86630652f82f73367fec9e6c61eb8a6055afe03d997870e529e4e88c0f9571b6da8ca934311afdbb67aca3132ba
-
Filesize
556KB
MD57457f8093e70201177324a864177c0a0
SHA16a2f85277ef38212be308b7ccf76903dff624984
SHA256a6d3232aeb2e3c6005036fb2777a3ce55cabf39ab8af66c09676852eae567193
SHA51273c387564059f6190c83283ba6ed7b662f337bb4bcd32046a72f8f0e77ca07281f6b25c404e1dafb38ce6cfa40aa009cae6f284aa0b1712b7b10e7b102fae17a
-
Filesize
79B
MD54fb26fdaadb0e163fc5c4536383147f2
SHA12715cb32b125e8a8accb93ed0873cf6a6a93cbb8
SHA256f41845028f9226a641cf8cf864e170246990db2450b551a5fa585d120acb7eb3
SHA512491faf5564fa21ceaf715097919d5c44bbaf6975d41888f49d119f2380b2287cc7fe9f0629ca18782616aef2def63301fdecc1c5e67f0d0b705d153e8c94a44a