Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 11:34
Static task
static1
Behavioral task
behavioral1
Sample
8a585fae8ce037911b384c79d03efbcc_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8a585fae8ce037911b384c79d03efbcc_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
8a585fae8ce037911b384c79d03efbcc_JaffaCakes118.exe
-
Size
4.5MB
-
MD5
8a585fae8ce037911b384c79d03efbcc
-
SHA1
e293e9940d3879342f523c966b1acad3a20296e7
-
SHA256
812fa50afce9826249fde767b4fb069af897a24d7dd1260734cb0701f18af70f
-
SHA512
b4824bfd0e118de4fcaafe387bcd9afd0a5937d10eedbaae6cfb87bcb2c1fd4b07bd51e40e397da8d72ca0654e8273079d32e7d4a89d7a4fee2b591389fc4a5e
-
SSDEEP
98304:c7RAUTOZw7WS/CYc87Q8Y14o9tOGsazRid1fOla9ZZg:clXOSCgpYSv6sd1fYeLg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 8a585fae8ce037911b384c79d03efbcc_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1492 setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1492 setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4628 wrote to memory of 1492 4628 8a585fae8ce037911b384c79d03efbcc_JaffaCakes118.exe 83 PID 4628 wrote to memory of 1492 4628 8a585fae8ce037911b384c79d03efbcc_JaffaCakes118.exe 83 PID 4628 wrote to memory of 1492 4628 8a585fae8ce037911b384c79d03efbcc_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a585fae8ce037911b384c79d03efbcc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8a585fae8ce037911b384c79d03efbcc_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\sfx\setup.exe"C:\Users\Admin\AppData\Local\Temp\sfx\setup.exe" C:\Users\Admin\AppData\Local\Temp\8a585fae8ce037911b384c79d03efbcc_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166B
MD543f03d7d2466e113167b004d6cfa0a3e
SHA16d2847dbb44751f271bddb4659d129d865d36cb3
SHA2567827dcc93dce979e9b714957a33f3b4af200d6f6b69d448daa7946608e94a00a
SHA512de93eec05a9412a26fa39af6199f56a6904c5cca5e35adadc3a805733833157bdb8b4b386b7002a790e2b62fc80611805c57c6ef12c5c9557916414b28bd4ae1
-
Filesize
316KB
MD5ae45842f81848f8e4bcef000f825569a
SHA1cf8624d594ea770d6a000b5c8b36c3c9e5059b52
SHA256c9f5872499c4478d6f034baf15933e1217bd2ad01eb6c57d2e05b5a44cac174a
SHA512f54c67b5c1b923ef4376db40ccb05c455dd958233f2db94730aecd484a0daca301be0b5eadf94f639b3a086b2de6c21140efc4c01fcb5f66fab0d020e350ec3d