Analysis
-
max time kernel
98s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 08:49
Static task
static1
Behavioral task
behavioral1
Sample
a4b46a2d2668ca96d4bd05d3f6caa702_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a4b46a2d2668ca96d4bd05d3f6caa702_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
a4b46a2d2668ca96d4bd05d3f6caa702_JaffaCakes118.exe
-
Size
370KB
-
MD5
a4b46a2d2668ca96d4bd05d3f6caa702
-
SHA1
55823d20faa81c636e94c31bb4b2cbacac1b87f5
-
SHA256
184866a48db2531dfcce10c98fad84235e1364601edc50f20c64a1163cc5fd1e
-
SHA512
02c06d2353f660b4ca2c12bccc16d2a0ce0639cb92638b09dc0b0dcd9ab098a87959054fad0652d232ff197292f331943cb514f92c095ab5770db3e7b3000713
-
SSDEEP
6144:40mlfM4a0g33ofNpLt23hUsHBYEnjBU9VaoeYQrz3462TAmd9exwxLQrrX7UZgKx:6Cd0g3YvE3vGEijQvojd97LuX7UZgK1v
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation a4b46a2d2668ca96d4bd05d3f6caa702_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2328 upx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2328 2460 a4b46a2d2668ca96d4bd05d3f6caa702_JaffaCakes118.exe 86 PID 2460 wrote to memory of 2328 2460 a4b46a2d2668ca96d4bd05d3f6caa702_JaffaCakes118.exe 86 PID 2460 wrote to memory of 2328 2460 a4b46a2d2668ca96d4bd05d3f6caa702_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4b46a2d2668ca96d4bd05d3f6caa702_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a4b46a2d2668ca96d4bd05d3f6caa702_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\upx.exe"C:\Users\Admin\AppData\Local\Temp\upx.exe"2⤵
- Executes dropped EXE
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154KB
MD5b96c7f33413cb6b2959fea36ce570709
SHA1950ffdfc78f8cad72e7e808dd2cb383a0e2b69d6
SHA256f38f14f5c443a044d1d83703347ba473560aa70f74ac82ba6331769b57b4103a
SHA512cb474f3cd261fc9bc181eedcaf7469fd45065ff92a2b7611dd1c006b8e8dd4d5b4548250b84936ff41a728ae505ea5b2e84c160385d7ab3a8de782b6531cd4ae
-
Filesize
187KB
MD5612df6b774ec53d6db34e4edbc1bc16f
SHA18d153f2041e4ef4c6ee02534f6f673ca9583ee95
SHA2565148fc6bcef562729e57195fae858e73e2203c4b8f797005c2174662f5908946
SHA512f3f98c82324271dac371ceb5aaed8e089f78bef505af404378c5922897d5b1e717a7751e405c71e5bdb345d7b19646475b33350fd8ad7f8da8cb777cb95512fd