Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 10:46
Static task
static1
Behavioral task
behavioral1
Sample
807b6499b9404ccddccbb1a9759ba0d1_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
807b6499b9404ccddccbb1a9759ba0d1_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
807b6499b9404ccddccbb1a9759ba0d1_JaffaCakes118.exe
-
Size
3.7MB
-
MD5
807b6499b9404ccddccbb1a9759ba0d1
-
SHA1
54ba6485b9b8d07f0f56a8f80ae675f8780690d3
-
SHA256
8a5124074d1ca7c2b367e7933f4414c533b9d6a0a2efac7451ba16c1d6edcda3
-
SHA512
ddc22db85a6e3a762cadef255748ab2a2eda8442871784647e59d2bd6d1c9a3ced2a55cb6303c4789c81d7f8d40b5235474059dae3d6e02deabc7fae84c0c998
-
SSDEEP
98304:QezcG8SpcFWzuRU7rLteil6ENje140DX/9JEk:dnrpjCRU7FXd0j8k
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 807b6499b9404ccddccbb1a9759ba0d1_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 2 IoCs
pid Process 3032 reg.exe 4840 reg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2476 wrote to memory of 116 2476 807b6499b9404ccddccbb1a9759ba0d1_JaffaCakes118.exe 82 PID 2476 wrote to memory of 116 2476 807b6499b9404ccddccbb1a9759ba0d1_JaffaCakes118.exe 82 PID 2476 wrote to memory of 116 2476 807b6499b9404ccddccbb1a9759ba0d1_JaffaCakes118.exe 82 PID 116 wrote to memory of 1420 116 cmd.exe 85 PID 116 wrote to memory of 1420 116 cmd.exe 85 PID 116 wrote to memory of 1420 116 cmd.exe 85 PID 116 wrote to memory of 532 116 cmd.exe 86 PID 116 wrote to memory of 532 116 cmd.exe 86 PID 116 wrote to memory of 532 116 cmd.exe 86 PID 116 wrote to memory of 1396 116 cmd.exe 87 PID 116 wrote to memory of 1396 116 cmd.exe 87 PID 116 wrote to memory of 1396 116 cmd.exe 87 PID 116 wrote to memory of 3696 116 cmd.exe 88 PID 116 wrote to memory of 3696 116 cmd.exe 88 PID 116 wrote to memory of 3696 116 cmd.exe 88 PID 116 wrote to memory of 992 116 cmd.exe 89 PID 116 wrote to memory of 992 116 cmd.exe 89 PID 116 wrote to memory of 992 116 cmd.exe 89 PID 116 wrote to memory of 4856 116 cmd.exe 90 PID 116 wrote to memory of 4856 116 cmd.exe 90 PID 116 wrote to memory of 4856 116 cmd.exe 90 PID 2476 wrote to memory of 4952 2476 807b6499b9404ccddccbb1a9759ba0d1_JaffaCakes118.exe 91 PID 2476 wrote to memory of 4952 2476 807b6499b9404ccddccbb1a9759ba0d1_JaffaCakes118.exe 91 PID 2476 wrote to memory of 4952 2476 807b6499b9404ccddccbb1a9759ba0d1_JaffaCakes118.exe 91 PID 4952 wrote to memory of 4840 4952 cmd.exe 94 PID 4952 wrote to memory of 4840 4952 cmd.exe 94 PID 4952 wrote to memory of 4840 4952 cmd.exe 94 PID 4952 wrote to memory of 964 4952 cmd.exe 95 PID 4952 wrote to memory of 964 4952 cmd.exe 95 PID 4952 wrote to memory of 964 4952 cmd.exe 95 PID 964 wrote to memory of 724 964 cmd.exe 96 PID 964 wrote to memory of 724 964 cmd.exe 96 PID 964 wrote to memory of 724 964 cmd.exe 96 PID 4952 wrote to memory of 3252 4952 cmd.exe 98 PID 4952 wrote to memory of 3252 4952 cmd.exe 98 PID 4952 wrote to memory of 3252 4952 cmd.exe 98 PID 4952 wrote to memory of 3112 4952 cmd.exe 99 PID 4952 wrote to memory of 3112 4952 cmd.exe 99 PID 4952 wrote to memory of 3112 4952 cmd.exe 99 PID 4952 wrote to memory of 2232 4952 cmd.exe 100 PID 4952 wrote to memory of 2232 4952 cmd.exe 100 PID 4952 wrote to memory of 2232 4952 cmd.exe 100 PID 4952 wrote to memory of 2072 4952 cmd.exe 101 PID 4952 wrote to memory of 2072 4952 cmd.exe 101 PID 4952 wrote to memory of 2072 4952 cmd.exe 101 PID 4952 wrote to memory of 2304 4952 cmd.exe 102 PID 4952 wrote to memory of 2304 4952 cmd.exe 102 PID 4952 wrote to memory of 2304 4952 cmd.exe 102 PID 4952 wrote to memory of 1840 4952 cmd.exe 103 PID 4952 wrote to memory of 1840 4952 cmd.exe 103 PID 4952 wrote to memory of 1840 4952 cmd.exe 103 PID 4952 wrote to memory of 4464 4952 cmd.exe 104 PID 4952 wrote to memory of 4464 4952 cmd.exe 104 PID 4952 wrote to memory of 4464 4952 cmd.exe 104 PID 4952 wrote to memory of 656 4952 cmd.exe 105 PID 4952 wrote to memory of 656 4952 cmd.exe 105 PID 4952 wrote to memory of 656 4952 cmd.exe 105 PID 4952 wrote to memory of 3168 4952 cmd.exe 106 PID 4952 wrote to memory of 3168 4952 cmd.exe 106 PID 4952 wrote to memory of 3168 4952 cmd.exe 106 PID 4952 wrote to memory of 2664 4952 cmd.exe 107 PID 4952 wrote to memory of 2664 4952 cmd.exe 107 PID 4952 wrote to memory of 2664 4952 cmd.exe 107 PID 4952 wrote to memory of 1896 4952 cmd.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\807b6499b9404ccddccbb1a9759ba0d1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\807b6499b9404ccddccbb1a9759ba0d1_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\83212808-6419-48EC-8C75-1F3B050415EB\setup.cmd" "2⤵
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\reg.exeREG QUERY HKEY_CURRENT_USER\Console\%SystemRoot%_system32_cmd.exe3⤵PID:1420
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Console\%SystemRoot%_system32_cmd.exe /f3⤵PID:532
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Console\%SystemRoot%_system32_cmd.exe /v FontFamily /t REG_DWORD /d 54 /f3⤵PID:1396
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Console\%SystemRoot%_system32_cmd.exe /v FontSize /t REG_DWORD /d 917504 /f3⤵PID:3696
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Console\%SystemRoot%_system32_cmd.exe /v FontWeight /t REG_DWORD /d 400 /f3⤵PID:992
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Console\%SystemRoot%_system32_cmd.exe /v FaceName /t REG_SZ /d "Lucida Console" /f3⤵PID:4856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\83212808-6419-48EC-8C75-1F3B050415EB\cleanup.cmd" "2⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\reg.exeREG DELETE HKCU\Console\%SystemRoot%_system32_cmd.exe /f3⤵
- Modifies registry key
PID:4840
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY "HKCU\Control Panel\International" /v sLanguage 2>nul"3⤵
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\reg.exeREG QUERY "HKCU\Control Panel\International" /v sLanguage4⤵PID:724
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" VER "3⤵PID:3252
-
-
C:\Windows\SysWOW64\find.exeFIND "5.1"3⤵PID:3112
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" VER "3⤵PID:2232
-
-
C:\Windows\SysWOW64\find.exeFIND "5.2"3⤵PID:2072
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" VER "3⤵PID:2304
-
-
C:\Windows\SysWOW64\find.exeFIND "6.0"3⤵PID:1840
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" VER "3⤵PID:4464
-
-
C:\Windows\SysWOW64\find.exeFIND "6.1"3⤵PID:656
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" VER "3⤵PID:3168
-
-
C:\Windows\SysWOW64\find.exeFIND "6.2"3⤵PID:2664
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" VER "3⤵PID:1896
-
-
C:\Windows\SysWOW64\find.exeFIND "6.3"3⤵PID:2776
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" VER "3⤵PID:2700
-
-
C:\Windows\SysWOW64\find.exeFIND "10.0"3⤵PID:4188
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY HKLM\SYSTEM\CurrentControlSet\Enum\Root\ACRONISDEVICES3⤵
- Modifies registry key
PID:3032
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD5cfea5a4065aa9483e14d63bbd4c61567
SHA101e0964400900604ac5a92554f233e6b318b4c36
SHA25618b32008c32ef6d047b73cc0e25be6e5684963656466e8d3cb12e4fb78ea53c1
SHA5127f351da8f947cfc645e8ea7915373a195e52a3d12c6c939f61fb674c5313ef0eb1aa80b263ba1a03779c7a1e6d3a6d7fd238c486f182412861b60ae2fed90b15
-
Filesize
799B
MD50a04ebe80aeb379206b3ad563138ffbb
SHA19ad6abc7fce8df4ff39082b73714331e14efd836
SHA2569634aeb664eb242f497c8abe8779e39094ce07391be986fccf76f1595ee95cf6
SHA51220d96b576799c935b821bc094b2af1f03fc23261f2bb6c0053b1445c18be6d20ede98004c1cf1464fd6cb37a3d0ca5330ee8d6d493470cf1c3f5083a2a22c024