Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 12:16
Static task
static1
Behavioral task
behavioral1
Sample
a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe
-
Size
757KB
-
MD5
a0a31dd15e1039fc801a7fdb480ef91a
-
SHA1
426062eb6e6bca63258d3dbce674a5547ee1d507
-
SHA256
8f6b47ef4407cf14719e43ff46ff4a090269a7570509852a2366ed756f3b0aaf
-
SHA512
006d53ea10c55b846f7dd8d5f470c0e1bd3c7d991fe7588dc4939aeb5bea663209cb1e879ede6804017f80327edca3792c4a72d46e94f4a662c2d8cb8d4554d6
-
SSDEEP
12288:+BZl1vvNQSnTlBZl1vvNQSnTKvIT7XPa5xLaggSH1Lx0tMcqgcwwwlasqJX:W1vvNQQTz1vvNQQTKvea5xLagVH1LCqb
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 5068 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Informations = "\\Informations\\Calme.exe" a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Informations = "C:\\Users\\Admin\\AppData\\Roaming\\Informations\\Calme.exe" a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5100 set thread context of 1916 5100 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 85 PID 5068 set thread context of 4756 5068 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1280 PING.EXE -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 5100 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe Token: SeDebugPrivilege 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe Token: SeDebugPrivilege 5068 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe Token: SeDebugPrivilege 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe Token: 33 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe Token: SeIncBasePriorityPrivilege 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4756 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 5100 wrote to memory of 1916 5100 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 85 PID 5100 wrote to memory of 1916 5100 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 85 PID 5100 wrote to memory of 1916 5100 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 85 PID 5100 wrote to memory of 1916 5100 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 85 PID 5100 wrote to memory of 1916 5100 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 85 PID 5100 wrote to memory of 1916 5100 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 85 PID 5100 wrote to memory of 1916 5100 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 85 PID 5100 wrote to memory of 1916 5100 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 85 PID 1916 wrote to memory of 5068 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 88 PID 1916 wrote to memory of 5068 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 88 PID 1916 wrote to memory of 5068 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 88 PID 1916 wrote to memory of 2416 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 89 PID 1916 wrote to memory of 2416 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 89 PID 1916 wrote to memory of 2416 1916 a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe 89 PID 2416 wrote to memory of 1280 2416 cmd.exe 91 PID 2416 wrote to memory of 1280 2416 cmd.exe 91 PID 2416 wrote to memory of 1280 2416 cmd.exe 91 PID 5068 wrote to memory of 4756 5068 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 92 PID 5068 wrote to memory of 4756 5068 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 92 PID 5068 wrote to memory of 4756 5068 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 92 PID 5068 wrote to memory of 4756 5068 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 92 PID 5068 wrote to memory of 4756 5068 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 92 PID 5068 wrote to memory of 4756 5068 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 92 PID 5068 wrote to memory of 4756 5068 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 92 PID 5068 wrote to memory of 4756 5068 a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118\a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118\a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118\a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118\a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4756
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10004⤵
- Runs ping.exe
PID:1280
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\a0a31dd15e1039fc801a7fdb480ef91a_JaffaCakes118.exe.log
Filesize1KB
MD56809c316af59007886ea5b3420fbef95
SHA14fef6d9eb76cab011863151e59bf624dcb659446
SHA2568e1e00a80229ba89bc9cfcdcc8123f78ce780c983138f1b95cae9112df095105
SHA512d67c763a8c8bd45f8af6c1d83b55433777803ca1fa9fe379055d38d93ce3b057ef622df87dc3f5466783fe7c394416307205775809b39ed33fd92fe0af4cdee0
-
C:\Users\Admin\AppData\Local\Temp\a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118\a0a31dd15e1039fc801a7fdb480ef91a_jaffacakes118.exe
Filesize757KB
MD5a0a31dd15e1039fc801a7fdb480ef91a
SHA1426062eb6e6bca63258d3dbce674a5547ee1d507
SHA2568f6b47ef4407cf14719e43ff46ff4a090269a7570509852a2366ed756f3b0aaf
SHA512006d53ea10c55b846f7dd8d5f470c0e1bd3c7d991fe7588dc4939aeb5bea663209cb1e879ede6804017f80327edca3792c4a72d46e94f4a662c2d8cb8d4554d6
-
Filesize
53B
MD5ec32a9268b5de1a8bbd76a3dd4ddafe6
SHA1557f48e15512c4ab101b2fb3d5969a4f55619ff8
SHA256eed9db28f7ea2573691ff175d7dfe777e090fdc37b009c79427f43cd3db0ea29
SHA5128770b81c675801d75625d0d04976159b2a33ca253b67c7fdd5fd72c1c8d179325ce0dd07cf196b54bdaaa6f93b8c32ea454662cd32ec94b9c479e25741415cf2