Analysis
-
max time kernel
92s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 12:39
Static task
static1
Behavioral task
behavioral1
Sample
982f488745850d3a191d60f8449d6d04_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
982f488745850d3a191d60f8449d6d04_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
982f488745850d3a191d60f8449d6d04_JaffaCakes118.exe
-
Size
213KB
-
MD5
982f488745850d3a191d60f8449d6d04
-
SHA1
8fe55823e37c9342bc2d714594f677a4112d7a0f
-
SHA256
166cb41875d2c4fea20429d24267821ac4bf3b809cbb9690a66f7adfae11ac20
-
SHA512
34b6303d660e070bbb41810dff432d6f8ce3484686b0587ee0a3c66fcf0f7acaf7bf7c4226b0ffe8a0062b49849eb725f132f25dcd948749f3dd4c3b252785dd
-
SSDEEP
6144:SaGYO4z+gzbbUpdcmfffbYU+xp6uOkre6HrrJO5WyOyYjPKOLt:SPYZz+gzbWXjYUMLOkXHrrJO5WyOyAPX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation 982f488745850d3a191d60f8449d6d04_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation 1345d57.exe -
Executes dropped EXE 1 IoCs
pid Process 1104 1345d57.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4360 wrote to memory of 1104 4360 982f488745850d3a191d60f8449d6d04_JaffaCakes118.exe 84 PID 4360 wrote to memory of 1104 4360 982f488745850d3a191d60f8449d6d04_JaffaCakes118.exe 84 PID 4360 wrote to memory of 1104 4360 982f488745850d3a191d60f8449d6d04_JaffaCakes118.exe 84 PID 1104 wrote to memory of 4396 1104 1345d57.exe 92 PID 1104 wrote to memory of 4396 1104 1345d57.exe 92 PID 1104 wrote to memory of 4396 1104 1345d57.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\982f488745850d3a191d60f8449d6d04_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\982f488745850d3a191d60f8449d6d04_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\1345d57.exe"C:\Users\Admin\AppData\Local\Temp\1345d57.exe" "C:\Users\Admin\AppData\Local\Temp\982f488745850d3a191d60f8449d6d04_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\30687.bat" "C:\Users\Admin\AppData\Local\Temp\1345d57.exe""3⤵PID:4396
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD5e244200cef8349a3b1502a948437393e
SHA129bc312626dd2b0a223dc7168aa1de772195c931
SHA256337be3354a911f84e3f38dd44bdff52e93eb3bbe4c5e8cf9dd2ca5c0ad716499
SHA5126d8cf689a940f6c0aa22e643726d2a554bbbad0f3a5dbd630df2aac6b0977ecde17fdcd390ee3e05ef0e5f917ffba8e06cccf8616c07751cfe23f2bcb1c3a25b
-
Filesize
205B
MD5af942e21a17f04903c52cb28a9b89542
SHA1ebcfe47bad384564346db4141d26e3e68f9f984f
SHA256c62a90b84dac61f74122f6eaa01665155a18b28a68b799a963f8a877194f922d
SHA512790decec1485e8fc42c3ee09a3e871ee95fdf2bf2e5f15556de0a5b5db2106114d79206acf2dcf3e7c0dbe9df7b1298e0b3f7247a34d9d3bd9f296cc9b61211a