Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 07:37
Static task
static1
Behavioral task
behavioral1
Sample
940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$_3_.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$_3_.exe
Resource
win10v2004-20240508-en
General
-
Target
940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe
-
Size
789KB
-
MD5
940607239cad3ea03adcf806f4657ad4
-
SHA1
59b5bf627d396dc517eb4cc5d7e681fe13c3d895
-
SHA256
b7778a4366f42ddbcef07dc270b03c7a0e4132c21156594348233590db2619e3
-
SHA512
297429abbb3864db2ad1a402d2e5f548a271868a1a8a7b8a5788e943939dd16a92ba47bdb9b5d1dd23029cf6d7eca989cbccb772107e842e82a976f37da69e58
-
SSDEEP
12288:ntobbXN42nHq+EgqfRAUEcB3gOE6DZlZUXavlXluE70pFdZigcyrG4EEu448y:nt8RHjEgYAw1hZlZTWQu7igcyKPEujj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation internal940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4384 internal940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1596 940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4632 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4384 internal940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe 4384 internal940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4384 internal940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe 4384 internal940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe 4384 internal940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1596 wrote to memory of 4384 1596 940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe 89 PID 1596 wrote to memory of 4384 1596 940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe 89 PID 1596 wrote to memory of 4384 1596 940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe 89 PID 4384 wrote to memory of 3456 4384 internal940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe 99 PID 4384 wrote to memory of 3456 4384 internal940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe 99 PID 4384 wrote to memory of 3456 4384 internal940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe 99 PID 3456 wrote to memory of 4632 3456 cmd.exe 101 PID 3456 wrote to memory of 4632 3456 cmd.exe 101 PID 3456 wrote to memory of 4632 3456 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\nsiF464.tmp\internal940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\nsiF464.tmp\internal940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe /baseInstaller='C:/Users/Admin/AppData/Local/Temp/940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe' /fallbackfolder='C:/Users/Admin/AppData/Local/Temp/nsiF464.tmp/fallbackfiles/'2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2264.bat" "C:\Users\Admin\AppData\Local\Temp\F3EFAB1027BC491BA8AD8B8E53A4E78D\""3⤵
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10004⤵
- Runs ping.exe
PID:4632
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4240 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵PID:2920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98B
MD58adda707dfabc3ab52751d4c0a1b8d2e
SHA103e35ed3e0c9a25d5a7a220ef1515b206a97d623
SHA25679acfd43e33c14abcb84a03ac12c8d8fd21c46aee17faeaf65aee91352f22b37
SHA5127aa963b239129e17cd21bba2117f435470b08d425a4adeeedc30abab6cd8e6e2198a49bcf49e4f0f50d02bd72d6cbda65acba33b977d469f4a401953757299a9
-
Filesize
98B
MD55aec2bc2788ac677a31cf1b1af803338
SHA1e97c642038277db59e2a7a68c4e798e1cc3ea88b
SHA25638a95a614507511e3623fbe215f1cfd753f29c668f55e80440f843f2108dd0ce
SHA512d4c627d274d08cbe9365a94b964ac0fd1660f4479fc2ad7f00a6dedbef024cf689366568e73cad3db4b24c1877bbee3bdb7dba2087fb6966b7e7ec263cebe949
-
Filesize
212B
MD5668767f1e0c7ff2b3960447e259e9f00
SHA132d8abf834cce72f5e845175a0af2513b00504d8
SHA256cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d
SHA512c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680
-
C:\Users\Admin\AppData\Local\Temp\F3EFAB1027BC491BA8AD8B8E53A4E78D\F3EFAB1027BC491BA8AD8B8E53A4E78D_LogFile.txt
Filesize9KB
MD5141cf1a10f210a9ea11616c601b1c854
SHA11958cde0abb573fd1735032603de0d65ee093ee0
SHA2568a140b3581e096e29527d610e3485937a126adc8ef03876e6798badcd67c4fcc
SHA5121fbd7a69dc2e5396fdc1cb06b515b2e0ae849e92cb3feaca3c1ff6a8f5f1763a84cda76a597b8462fec7fc815869ef496e360fe5717a0dd3e8fc45e068e34b7a
-
Filesize
111KB
MD54e87bc889f3532be424e78e8dbe1c489
SHA141fc8359e6824a68ec813ce5e988bd5800171e3e
SHA256b505988ed8ffc3c7381656ab03e8034ad0762066ac7c38dbb593cd1c769426d9
SHA5125cb50e55b8a62ee3c72d080982b03a93d432205bb0940ad422e9992aca5d3d3828dab23234f537692dd032757d49dee10261b2fc2ea86f3616dd9ac124e04f7a
-
Filesize
14KB
MD521010df9bc37daffcc0b5ae190381d85
SHA1a8ba022aafc1233894db29e40e569dfc8b280eb9
SHA2560ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16
SHA51295d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e
-
C:\Users\Admin\AppData\Local\Temp\nsiF464.tmp\internal940607239cad3ea03adcf806f4657ad4_JaffaCakes118.exe
Filesize1.8MB
MD59ab5db4bb5971035b4d287d64f9676b5
SHA133d17f016339572dd05c124d6243fffefd0cd039
SHA256f2126481c02d2a5af29e56023902a0897d05867c1caaf8079cf6e1f05dd9b209
SHA512d36262fdd4d8bd083d8537f0698c423240c9e42b2dc0048e2470d87411f295d6e3428587b76b0486875495d502f1f31f9edf3eb6fdb914f13421b7f29fa5f066
-
C:\Users\Admin\AppData\Local\Temp\nsiF464.tmp\internal940607239cad3ea03adcf806f4657ad4_JaffaCakes118_icon.ico
Filesize17KB
MD5055c2cb77fa2edc2802b7fd397b9c213
SHA1e6bf5af3427539bf609cfb8904b35803a06104d3
SHA25678d0ed2288334f341225acee3d6200d01bb0bb80b873c448ab151d0661817bf2
SHA5127dc2930b9ac4843cca0a073a9195ab0cfb684b29c13622d0f934fb4b4a45af0fbb3a033f6ba31216214a9cbc1966436c36dd065c44b014c5c2a03dfd0b005a65
-
C:\Users\Admin\AppData\Local\Temp\nsiF464.tmp\internal940607239cad3ea03adcf806f4657ad4_JaffaCakes118_splash.png
Filesize12KB
MD5fe272d040e82704707b19bfbf29d65ca
SHA1460de628ea63986a7e6390a1623d8ba32dc82aee
SHA2561cb036da61dc7b1ad62280681c724d74cbcc313d530a799728a4d38b4e2b1983
SHA5128a03f9f3ce7af53b2f119f9bd001ff3fd39f879de88723306e2a6c7e8cae679d2095be6d4520ea24035c86140ef01a178a0b2535674be5c39b8b2dde4d082b1b