Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 23:13
Static task
static1
Behavioral task
behavioral1
Sample
7ae1900d594e89f2930a2237f24941a6_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
7ae1900d594e89f2930a2237f24941a6_JaffaCakes118.exe
-
Size
321KB
-
MD5
7ae1900d594e89f2930a2237f24941a6
-
SHA1
bd83fbb6b224640193bb7dcb66db2a586727e771
-
SHA256
66403c815d78c45f3e4306233821231ec99538f12982ec7d959c9708401432d3
-
SHA512
fe6302a497ed581c17327a02d12081a4064b2cc4e1254ff74b7f595a634a5b3ad0b68626d22a219a32d5aa372b22c40284c6101c070a2ee3c57b90f7b39dd311
-
SSDEEP
6144:6p5GHKqSccAXTIzUzWvxv7vV+G7zPoAz0Q54HeyJAud+V3Oj:6LGHKDccAX0AWvxzvV+zAz03HFB
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 7ae1900d594e89f2930a2237f24941a6_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2624 7ae1900d594e89f2930a2237f24941a6_jaffacakes118.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 7ae1900d594e89f2930a2237f24941a6_jaffacakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini 7ae1900d594e89f2930a2237f24941a6_jaffacakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly 7ae1900d594e89f2930a2237f24941a6_jaffacakes118.exe File created C:\Windows\assembly\Desktop.ini 7ae1900d594e89f2930a2237f24941a6_jaffacakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini 7ae1900d594e89f2930a2237f24941a6_jaffacakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 832 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2624 7ae1900d594e89f2930a2237f24941a6_jaffacakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 452 7ae1900d594e89f2930a2237f24941a6_JaffaCakes118.exe Token: SeDebugPrivilege 2624 7ae1900d594e89f2930a2237f24941a6_jaffacakes118.exe Token: 33 2624 7ae1900d594e89f2930a2237f24941a6_jaffacakes118.exe Token: SeIncBasePriorityPrivilege 2624 7ae1900d594e89f2930a2237f24941a6_jaffacakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2624 7ae1900d594e89f2930a2237f24941a6_jaffacakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 452 wrote to memory of 2624 452 7ae1900d594e89f2930a2237f24941a6_JaffaCakes118.exe 95 PID 452 wrote to memory of 2624 452 7ae1900d594e89f2930a2237f24941a6_JaffaCakes118.exe 95 PID 452 wrote to memory of 2624 452 7ae1900d594e89f2930a2237f24941a6_JaffaCakes118.exe 95 PID 452 wrote to memory of 4560 452 7ae1900d594e89f2930a2237f24941a6_JaffaCakes118.exe 96 PID 452 wrote to memory of 4560 452 7ae1900d594e89f2930a2237f24941a6_JaffaCakes118.exe 96 PID 452 wrote to memory of 4560 452 7ae1900d594e89f2930a2237f24941a6_JaffaCakes118.exe 96 PID 4560 wrote to memory of 832 4560 cmd.exe 98 PID 4560 wrote to memory of 832 4560 cmd.exe 98 PID 4560 wrote to memory of 832 4560 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ae1900d594e89f2930a2237f24941a6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7ae1900d594e89f2930a2237f24941a6_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\7ae1900d594e89f2930a2237f24941a6_jaffacakes118\7ae1900d594e89f2930a2237f24941a6_jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\7ae1900d594e89f2930a2237f24941a6_jaffacakes118\7ae1900d594e89f2930a2237f24941a6_jaffacakes118.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2624
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\7ae1900d594e89f2930a2237f24941a6_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:832
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1144
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:81⤵PID:2076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7ae1900d594e89f2930a2237f24941a6_jaffacakes118\7ae1900d594e89f2930a2237f24941a6_jaffacakes118.exe
Filesize321KB
MD57ae1900d594e89f2930a2237f24941a6
SHA1bd83fbb6b224640193bb7dcb66db2a586727e771
SHA25666403c815d78c45f3e4306233821231ec99538f12982ec7d959c9708401432d3
SHA512fe6302a497ed581c17327a02d12081a4064b2cc4e1254ff74b7f595a634a5b3ad0b68626d22a219a32d5aa372b22c40284c6101c070a2ee3c57b90f7b39dd311