Analysis
-
max time kernel
143s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 16:35
Static task
static1
Behavioral task
behavioral1
Sample
761bba5015a40ffca8cc32470481b29c_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
761bba5015a40ffca8cc32470481b29c_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$_3_.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$_3_.exe
Resource
win10v2004-20240508-en
General
-
Target
761bba5015a40ffca8cc32470481b29c_JaffaCakes118.exe
-
Size
789KB
-
MD5
761bba5015a40ffca8cc32470481b29c
-
SHA1
f4d5d28498dab9489e73066031120ad8128029ed
-
SHA256
9dadc8706de9b0cfb8bd1a30cc5d6d5d853e1e183497b1df760159f19c0fbf17
-
SHA512
e43720c3c591deccacbe7a57f1b2abc0f890d28580d48ab4e7d0c85fe77b5f4670106f58a45bd65af256f5db568e4bb7b6ac5f9ba8f3ba81aaf54ac6610d9ae4
-
SSDEEP
12288:ntobbXN42nHq+EgqfRAUEcB3gOE6DZlZUXavlXluE70pFdZigcyrG4EEu44VT:nt8RHjEgYAw1hZlZTWQu7igcyKPEujh
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation internal761bba5015a40ffca8cc32470481b29c_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1744 internal761bba5015a40ffca8cc32470481b29c_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1804 761bba5015a40ffca8cc32470481b29c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1744 internal761bba5015a40ffca8cc32470481b29c_JaffaCakes118.exe 1744 internal761bba5015a40ffca8cc32470481b29c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1744 internal761bba5015a40ffca8cc32470481b29c_JaffaCakes118.exe 1744 internal761bba5015a40ffca8cc32470481b29c_JaffaCakes118.exe 1744 internal761bba5015a40ffca8cc32470481b29c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1804 wrote to memory of 1744 1804 761bba5015a40ffca8cc32470481b29c_JaffaCakes118.exe 90 PID 1804 wrote to memory of 1744 1804 761bba5015a40ffca8cc32470481b29c_JaffaCakes118.exe 90 PID 1804 wrote to memory of 1744 1804 761bba5015a40ffca8cc32470481b29c_JaffaCakes118.exe 90 PID 1744 wrote to memory of 1068 1744 internal761bba5015a40ffca8cc32470481b29c_JaffaCakes118.exe 100 PID 1744 wrote to memory of 1068 1744 internal761bba5015a40ffca8cc32470481b29c_JaffaCakes118.exe 100 PID 1744 wrote to memory of 1068 1744 internal761bba5015a40ffca8cc32470481b29c_JaffaCakes118.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\761bba5015a40ffca8cc32470481b29c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\761bba5015a40ffca8cc32470481b29c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\nsnDA9.tmp\internal761bba5015a40ffca8cc32470481b29c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\nsnDA9.tmp\internal761bba5015a40ffca8cc32470481b29c_JaffaCakes118.exe /baseInstaller='C:/Users/Admin/AppData/Local/Temp/761bba5015a40ffca8cc32470481b29c_JaffaCakes118.exe' /fallbackfolder='C:/Users/Admin/AppData/Local/Temp/nsnDA9.tmp/fallbackfiles/'2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2250.bat" "C:\Users\Admin\AppData\Local\Temp\412B027DC5CA4E3B8B3D843143D5254D\""3⤵PID:1068
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4104 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:81⤵PID:1892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98B
MD53dee16e6c35febf9839d64a6ab8bf3e9
SHA1d7ff599683b8a83fd4e0bcaa460a8ac768cbaaf9
SHA256d5279c942c16f78a762cdef098680d11004b1dc674580a1e383aac323a205953
SHA51257d54613f3db87c2ea28821ca4a6835784863b003d9f2acd1a99096e566566bd23b6f3f71d90536f570a58ecaae4ed34d193af5b6509567c3e61dad6fd946261
-
Filesize
96B
MD53d6d962570190d12087d749d1ad56b68
SHA165fe7c7c093fe92dfac689064c3dd93f23401205
SHA256a677e1dccf5ac00439f0cf0de16a5641a4640afb487ee887a2c3b92010596046
SHA512653717e1314a52f590580a82bb17e62cea283cd8e424580b2820a318bb697bfa75d75b3e256db69a2350b0a2d32daa5bf2293e3342ec4da09f40233438301676
-
Filesize
212B
MD5668767f1e0c7ff2b3960447e259e9f00
SHA132d8abf834cce72f5e845175a0af2513b00504d8
SHA256cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d
SHA512c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680
-
C:\Users\Admin\AppData\Local\Temp\412B027DC5CA4E3B8B3D843143D5254D\412B027DC5CA4E3B8B3D843143D5254D_LogFile.txt
Filesize9KB
MD5f2c84a21f5accfd56e4490c55c333b8a
SHA150a25d524c2d32af7375dd5928f6f22da1516ac8
SHA256240eb4c5cc1fc797adef59016b593e13ab4713a0185f93bf225b302ab791b8af
SHA5122b6d53084748f85940770d6b02506bdcd86008af826ccfea00261810019538eca472435d925e828239784981926ee378940ff67b2ae301ad2af5554a0bcae1b3
-
Filesize
112KB
MD5bc380d9c8b46586a5565d90744d8f87c
SHA15f2b2312089e94a5bb991abe4b73bda270f1069d
SHA25653601a968848945129356c11fa45d57ebe27ae7bf3680bf2e96cad1b85293610
SHA5128dcd5af1fa3a51a688d19c0875faa9b9dbb8cc404ec67b28d6d3efaf2170a15fdcbfd325a7985a1a4c14830262ed1e6890383a601a1f4e728cfadae9af777604
-
Filesize
14KB
MD521010df9bc37daffcc0b5ae190381d85
SHA1a8ba022aafc1233894db29e40e569dfc8b280eb9
SHA2560ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16
SHA51295d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e
-
C:\Users\Admin\AppData\Local\Temp\nsnDA9.tmp\internal761bba5015a40ffca8cc32470481b29c_JaffaCakes118.exe
Filesize1.8MB
MD59ab5db4bb5971035b4d287d64f9676b5
SHA133d17f016339572dd05c124d6243fffefd0cd039
SHA256f2126481c02d2a5af29e56023902a0897d05867c1caaf8079cf6e1f05dd9b209
SHA512d36262fdd4d8bd083d8537f0698c423240c9e42b2dc0048e2470d87411f295d6e3428587b76b0486875495d502f1f31f9edf3eb6fdb914f13421b7f29fa5f066
-
C:\Users\Admin\AppData\Local\Temp\nsnDA9.tmp\internal761bba5015a40ffca8cc32470481b29c_JaffaCakes118_icon.ico
Filesize17KB
MD5055c2cb77fa2edc2802b7fd397b9c213
SHA1e6bf5af3427539bf609cfb8904b35803a06104d3
SHA25678d0ed2288334f341225acee3d6200d01bb0bb80b873c448ab151d0661817bf2
SHA5127dc2930b9ac4843cca0a073a9195ab0cfb684b29c13622d0f934fb4b4a45af0fbb3a033f6ba31216214a9cbc1966436c36dd065c44b014c5c2a03dfd0b005a65
-
C:\Users\Admin\AppData\Local\Temp\nsnDA9.tmp\internal761bba5015a40ffca8cc32470481b29c_JaffaCakes118_splash.png
Filesize12KB
MD5fe272d040e82704707b19bfbf29d65ca
SHA1460de628ea63986a7e6390a1623d8ba32dc82aee
SHA2561cb036da61dc7b1ad62280681c724d74cbcc313d530a799728a4d38b4e2b1983
SHA5128a03f9f3ce7af53b2f119f9bd001ff3fd39f879de88723306e2a6c7e8cae679d2095be6d4520ea24035c86140ef01a178a0b2535674be5c39b8b2dde4d082b1b