Analysis
-
max time kernel
133s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 21:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9948f0a4cbda060203118bac76a7d57d_JaffaCakes118.exe
Resource
win7-20240508-en
windows7-x64
8 signatures
150 seconds
General
-
Target
9948f0a4cbda060203118bac76a7d57d_JaffaCakes118.exe
-
Size
378KB
-
MD5
9948f0a4cbda060203118bac76a7d57d
-
SHA1
54ab234810c4acf4dbef61d42d7e65b141290910
-
SHA256
57d1724758713e07ca5a52847e3ba07090f2b814d7528c9e0bfc952c460b0f9a
-
SHA512
7222a9f65fb41aa9b7b2c198d668222399d43c5c21ddc50d01ae56b507da8cfa2b29a82af05c43554821ad86e40c083c587c98b9008cef701bea92df8d12a0d4
-
SSDEEP
6144:ImrfwmHouuIzknonHKDl1qzoN7xpPlQgeZl3gObVfeZejOFjTS91PDAf:ImrfZHouugKDgoNNpdfsl3gOIpjTeDAf
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 9948f0a4cbda060203118bac76a7d57d_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 iplogger.org 6 iplogger.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2908 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2908 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1924 wrote to memory of 544 1924 9948f0a4cbda060203118bac76a7d57d_JaffaCakes118.exe 84 PID 1924 wrote to memory of 544 1924 9948f0a4cbda060203118bac76a7d57d_JaffaCakes118.exe 84 PID 1924 wrote to memory of 544 1924 9948f0a4cbda060203118bac76a7d57d_JaffaCakes118.exe 84 PID 544 wrote to memory of 2908 544 cmd.exe 86 PID 544 wrote to memory of 2908 544 cmd.exe 86 PID 544 wrote to memory of 2908 544 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\9948f0a4cbda060203118bac76a7d57d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9948f0a4cbda060203118bac76a7d57d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "9948f0a4cbda060203118bac76a7d57d_JaffaCakes118.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\9948f0a4cbda060203118bac76a7d57d_JaffaCakes118.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "9948f0a4cbda060203118bac76a7d57d_JaffaCakes118.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-