Analysis
-
max time kernel
134s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 07:44
Static task
static1
Behavioral task
behavioral1
Sample
97842576fb0f5ecf86e9dfc9808e61d6_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
97842576fb0f5ecf86e9dfc9808e61d6_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
97842576fb0f5ecf86e9dfc9808e61d6_JaffaCakes118.exe
-
Size
749KB
-
MD5
97842576fb0f5ecf86e9dfc9808e61d6
-
SHA1
6457e35b9ee041c29a9d103fd0cb94b855725d27
-
SHA256
3edd81056650abd40791b4cee4f0e0f98d5070b6b105f3ca227d8e14bb08b872
-
SHA512
4c9ef8dbb5ad868876f0444ace625eb3c725e15e747c565ee4af2d55bbb041c29a9163c9e345675554d49fe76cd21c00ff0f463498e0a4c83607dc4aa2ec90fd
-
SSDEEP
12288:7xmIJQvPkitEqZR3prMIEgzra+9tG/c/OMlUnXHY5BcPsVHxtdI3x9Eca5wpJ:tmoO8itEqfZAMfG/yJliX4/KCHxtOh9b
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 97842576fb0f5ecf86e9dfc9808e61d6_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 452 SmartInstaller.exe -
Loads dropped DLL 1 IoCs
pid Process 452 SmartInstaller.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SmartInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz SmartInstaller.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 452 SmartInstaller.exe 452 SmartInstaller.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1388 wrote to memory of 452 1388 97842576fb0f5ecf86e9dfc9808e61d6_JaffaCakes118.exe 85 PID 1388 wrote to memory of 452 1388 97842576fb0f5ecf86e9dfc9808e61d6_JaffaCakes118.exe 85 PID 1388 wrote to memory of 452 1388 97842576fb0f5ecf86e9dfc9808e61d6_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\97842576fb0f5ecf86e9dfc9808e61d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\97842576fb0f5ecf86e9dfc9808e61d6_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\PartyPokerSetup.exe_Installer\SmartInstaller.exe"C:\Users\Admin\AppData\Local\Temp\PartyPokerSetup.exe_Installer\SmartInstaller.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
580KB
MD5195f6514f753158636b14056e3fd61e5
SHA11b372e1bc2b2996a901404aee9b15cdf973b4eb2
SHA25667e9c4bafd88d7edf3d04ca82fe269f4f48cf0104d9f1881a7d79f2bbe4e52b2
SHA51217707429d54c49263a8664e8b6ed4c17ac9bf6aa6b1ce0031b615bf06a615debe2cbfa9e332bf7916597edff1e60767bc8c00479628a5541cf5520a50bff341b
-
Filesize
1KB
MD50b55abb265f90f61f644abfc76417ec7
SHA1728fc05ea70437fbfc3d11e177876c9466f8fc66
SHA2563d59f087b04ebe9fb6725c0e77a2b12406c59cd156aabac05aabc640c5fb2cde
SHA512b26db14569b0c39fb81e94848b2420afcb1a3f63a1782c5330055e1f491f557eb545e54326d6001ca4a610cc1455aae53b3787a1843107f75ccdb6116888a0fd
-
Filesize
42KB
MD5c69ca4baca44013a798209b92e645b05
SHA16fb6a166cfec33de61a58ef36a6b98895859df42
SHA256ddc63e8a537c45ce0746dccb7c8d3d29355d1d345b7cb8d3a7e31b465faa0659
SHA5122ccf43dd679a5100baca7bbf814af17f3bfe968f554fd25c9ff708b5b39c1824d879bfd82248ed95e757c4786af783194dfa3c29efa5f0e71b1fa32ab347e515
-
Filesize
137KB
MD5f18e8de5c4a92e57be51422672ab5b55
SHA14c7af13fe6af1e59d6c1877c912915caed777321
SHA256b411d6673206dc21e15f02f48ed2716f167a5b566f8089bf5f58d5d685f2e7e6
SHA5122b07d624310301994ec4f5945b80acc3eac8db14cfaf10c38e90c96465c1b58c5d13c020dafbb192db87441916a10d937321b2a7980891f083b56fb0fedb47e7
-
Filesize
838KB
MD5b6702f8d8d0589bbc01d75038904c01c
SHA1b7a823d26afa8d25d3d52304324131e6d3c925eb
SHA256fd50fd155cc91778f39baa0df6b61a523f04f7427abe9dd917c1a36e4c12e4f3
SHA512d463c5aee25b3a59bb76b5d395b873e1f361521c572258e730ed6422ce057c5fe5d686d9e0598cf34ec550e60cabeee8b4ec377cb4238b29cb4a6a0a562ba728
-
Filesize
4KB
MD5083238bcb02cbb355e18ae00472c27fb
SHA13ccf25d8d8ee4457bf82f06c5f6c85b08353d5e5
SHA256fd0eb064667146487eab58065e11fbd40def88265dbff6a8d4c9fc52635be732
SHA512dec94b4dab8d31f0ccc7e198dc9d5806a337ed37945f1d66274003cce18998176c803980cd54e8a50038a8f38ed3432f906610476b24da51bc86a41c738dfa2d
-
Filesize
82B
MD5b40264cf92216dc57f8ff6810e3ba2d8
SHA173e4b0ee8f5ccd00d8915dd3727b19a1d8b93bc6
SHA2564696b924934ba7b9c725f208d635288c1a03cfb6afd7a90ff2da87fa5cdec70a
SHA5122c1be6657355ef7f5081eec8a88701683148f0540fc26744492fc66bbb99b6c79d448fb3e16752d3815f35797265ecce9039d4b8b19117e79be161ca4738d795
-
Filesize
52KB
MD54965107d112666d3835308a831a29274
SHA150439b99ce525ecb74c554e1dc43ddb39481dfa4
SHA256105280995cd5746078d67b8651dfe4ad2abcd532d7ad528d3100c535b0b538af
SHA51238fa8f0eeadd75bf212eaab458833cfd3445d00f3d77f1f8a86b7c3ba99376231c8b3fc3cfdff6f02f2ca9c90956c76f9055717712d35a7ca7b30172a0010b59