Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 11:13
Static task
static1
Behavioral task
behavioral1
Sample
84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe
-
Size
9.1MB
-
MD5
84066d47170e1e02642690be0ca6acd4
-
SHA1
15d3b330c66c6bcf01e5b7574dc71b61ea2ca48f
-
SHA256
d6da9cd08fda82f36e277fcb9d98e1a0444d1cd3a3a71c6cf262e53213f7c1e1
-
SHA512
e386515f521cc63dd3561b260703e16cbe793315e9097e0eb23e8256dd40364da38007db1c2149ff4682d7df61c889f2de1c05821351fd8a1e87514ca70a0898
-
SSDEEP
196608:h0bDi3QWpZJdsYap39xyiSRQ6mUpUWiHoZyEAZ+FcAjoSZF:h0bW3QWDa0iSinUpUWiHowMcWoO
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 2404 7za.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4884 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4432 PING.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2404 7za.exe Token: 35 2404 7za.exe Token: SeSecurityPrivilege 2404 7za.exe Token: SeSecurityPrivilege 2404 7za.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1720 2232 84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe 90 PID 2232 wrote to memory of 1720 2232 84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe 90 PID 2232 wrote to memory of 1720 2232 84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe 90 PID 2232 wrote to memory of 4828 2232 84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe 92 PID 2232 wrote to memory of 4828 2232 84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe 92 PID 2232 wrote to memory of 4828 2232 84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe 92 PID 4828 wrote to memory of 3864 4828 wscript.exe 99 PID 4828 wrote to memory of 3864 4828 wscript.exe 99 PID 4828 wrote to memory of 3864 4828 wscript.exe 99 PID 4828 wrote to memory of 2404 4828 wscript.exe 120 PID 4828 wrote to memory of 2404 4828 wscript.exe 120 PID 4828 wrote to memory of 2404 4828 wscript.exe 120 PID 4828 wrote to memory of 116 4828 wscript.exe 105 PID 4828 wrote to memory of 116 4828 wscript.exe 105 PID 4828 wrote to memory of 116 4828 wscript.exe 105 PID 4828 wrote to memory of 1248 4828 wscript.exe 108 PID 4828 wrote to memory of 1248 4828 wscript.exe 108 PID 4828 wrote to memory of 1248 4828 wscript.exe 108 PID 4828 wrote to memory of 436 4828 wscript.exe 111 PID 4828 wrote to memory of 436 4828 wscript.exe 111 PID 4828 wrote to memory of 436 4828 wscript.exe 111 PID 4828 wrote to memory of 2444 4828 wscript.exe 113 PID 4828 wrote to memory of 2444 4828 wscript.exe 113 PID 4828 wrote to memory of 2444 4828 wscript.exe 113 PID 2444 wrote to memory of 4432 2444 cmd.exe 115 PID 2444 wrote to memory of 4432 2444 cmd.exe 115 PID 2444 wrote to memory of 4432 2444 cmd.exe 115 PID 4828 wrote to memory of 4884 4828 wscript.exe 116 PID 4828 wrote to memory of 4884 4828 wscript.exe 116 PID 4828 wrote to memory of 4884 4828 wscript.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\84066d47170e1e02642690be0ca6acd4_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\cmd.execmd /c echo hi2⤵PID:1720
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" C:\\ProgramData\\sdjbdosxmt.js2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c rd /S/Q C:\ProgramData\pozi653⤵PID:3864
-
-
C:\ProgramData\kbnjm\7za.exe"C:\ProgramData\kbnjm\7za.exe" e C:\ProgramData\cr95ng.zip -pvkd -y -oC:\ProgramData\pozi653⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move /Y "C:\ProgramData\pozi65" "C:\ProgramData\VkontakteDJ"3⤵PID:116
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Delete /TN VK_DJ /F3⤵PID:1248
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del /S/Q C:\ProgramData\cr95ng.zip3⤵PID:436
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 > nul3⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 14⤵
- Runs ping.exe
PID:4432
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN VKDJ /SC ONLOGON /TR "C:\ProgramData\VkontakteDJ\VKontakteDJ.exe /H" /F /DELAY 0001:00 /RL HIGHEST3⤵
- Creates scheduled task(s)
PID:4884
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3804,i,15140928051103392835,1612840580898364401,262144 --variations-seed-version --mojo-platform-channel-handle=4372 /prefetch:81⤵PID:3416
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:2404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD58909bd7fe908835145a9a0a749e1d110
SHA14b5ccdf348b9417073d0ceb3c33793b34fd3594d
SHA25687f4f79473aaa8538814f7c5dbeadc938e491d736a3d11cba747cb1fc91dc7b4
SHA512686dee7ef69c4bb1042c4056ddef3573ef0f1a1dd8af6695b128a4e4964cd2a88f83dcb1029d12b230f07e363603090cf5e113711bef39fe7da9ca456fb1bfd1
-
Filesize
490KB
MD5e127107063431e8186811bac98ad0b6e
SHA127a508f87621792f102ed1d97e7689801132c13f
SHA256c04672f2cdcba81fb8a6d9a0e47b3f28605e3b020c8dc37657f932c7d981dad9
SHA512c88edce031d5d73a4f443dc31e2d204f650f876ad2fa517d3e47581fa48cdc93afbb4941bdc6f0b44060d209d59406bd855feadf0b18de30f27c3d61580b0661
-
Filesize
4.4MB
MD5a8d9303da2f0e4fda184aa53971ced81
SHA14c324e086b8a18e7d8ff18097acfaaa8522fedc7
SHA256049e37f3d4ac9980a21a3b0833bc5a30183255df0cff0162a22b4206f959b707
SHA51252627edd2ca46a4edf9231e001ce09d07ff9bba698da93a9c80de4be186bd479b036763cc59992a40f23467901993b6f4804a7231d730b4e007f2ca14bb937c5
-
Filesize
722KB
MD543141e85e7c36e31b52b22ab94d5e574
SHA1cfd7079a9b268d84b856dc668edbb9ab9ef35312
SHA256ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d
SHA5129119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc
-
Filesize
4KB
MD532ebed61c8f61c18b2383cb9511588a6
SHA11ea5052c738780000cbf9f6409069c289573f4ab
SHA256a861e6d41cb838f1d90503b1d7858b26c81f43ef8beb5584a23345505dc82862
SHA512050018c531aefaf66b937011d10519d9b7176e66d03f15f1d053be36b8560f18be01fb0a307452c592c193cfb6e81cbea90707007cd32522f9d39a0c07f64c3d