Analysis
-
max time kernel
92s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 23:22
Static task
static1
Behavioral task
behavioral1
Sample
abf7e26171a76f84b7548c70e4211c7b_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
abf7e26171a76f84b7548c70e4211c7b_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
abf7e26171a76f84b7548c70e4211c7b
-
SHA1
ffd622d897d936d5abf2bde3ad9ffad669987ceb
-
SHA256
7f4312f898a352dd0e9c96b3f019807e2359d079b6c8cb0921e67709614bac7b
-
SHA512
0667bf7a70c2094fd5cb376de9a17a5dd66cfce32084276ea10011d80260a73f2ccf0ad3c0f8e35754fed09d9d3aaddd053cebad1581ae77db8c35c1cc3887e1
-
SSDEEP
49152:7cW4fJo1uk6WT2IT6kv/NOgEg9Yj9d+AGx5RsSwm:7X4xLk9T2G6E/Wd+lVsSwm
Malware Config
Extracted
socelars
http://www.createinfo.pw/
http://www.allinfo.pw/
Signatures
-
resource yara_rule behavioral2/files/0x000700000002341d-16.dat upx behavioral2/memory/3336-24-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral2/memory/3336-26-0x0000000000400000-0x0000000000541000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\International\Geo\Nation abf7e26171a76f84b7548c70e4211c7b_JaffaCakes118.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Executes dropped EXE 2 IoCs
pid Process 5068 abf7e26171a76f84b7548c70e4211c7b_JaffaCakes118.tmp 3336 DiskScan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4776 3336 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5068 abf7e26171a76f84b7548c70e4211c7b_JaffaCakes118.tmp 5068 abf7e26171a76f84b7548c70e4211c7b_JaffaCakes118.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5068 abf7e26171a76f84b7548c70e4211c7b_JaffaCakes118.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3440 wrote to memory of 5068 3440 abf7e26171a76f84b7548c70e4211c7b_JaffaCakes118.exe 82 PID 3440 wrote to memory of 5068 3440 abf7e26171a76f84b7548c70e4211c7b_JaffaCakes118.exe 82 PID 3440 wrote to memory of 5068 3440 abf7e26171a76f84b7548c70e4211c7b_JaffaCakes118.exe 82 PID 5068 wrote to memory of 3336 5068 abf7e26171a76f84b7548c70e4211c7b_JaffaCakes118.tmp 85 PID 5068 wrote to memory of 3336 5068 abf7e26171a76f84b7548c70e4211c7b_JaffaCakes118.tmp 85 PID 5068 wrote to memory of 3336 5068 abf7e26171a76f84b7548c70e4211c7b_JaffaCakes118.tmp 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\abf7e26171a76f84b7548c70e4211c7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\abf7e26171a76f84b7548c70e4211c7b_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\is-ELJKO.tmp\abf7e26171a76f84b7548c70e4211c7b_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-ELJKO.tmp\abf7e26171a76f84b7548c70e4211c7b_JaffaCakes118.tmp" /SL5="$401DE,1302781,816640,C:\Users\Admin\AppData\Local\Temp\abf7e26171a76f84b7548c70e4211c7b_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\pdfreader2010\DiskScan.exe"C:\Users\Admin\AppData\Local\Temp\pdfreader2010\DiskScan.exe"3⤵
- Executes dropped EXE
PID:3336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3336 -s 11924⤵
- Program crash
PID:4776
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3336 -ip 33361⤵PID:4888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5066108c4b0102357ebdaf3791ba38fe8
SHA159e9e8043232169c0554e350c233433b0bc4c83c
SHA256a720dd6efcd1910ea490c0095ff0efa36eb5228712e61294eeb4b3072715c035
SHA512a2bb074f042d7214536083dfe341da9dafe1d170cf52e9c0f4ff0041f959d4a28cc6be9cb0e5ec3adf63188d658332b7440d6b5ac8e02af2801e7f34a04acad2
-
Filesize
569KB
MD5eab34089ba89eb30bab4d46d0d1d7c63
SHA1676f13707c42ff4b0324ae9854096729f7541d0f
SHA25613f90329010f340108f283ae7c832b5c51e32d4ddfd48657f8a9961b1b09ed78
SHA512c47ac4760e1950575d2f5012b2bfd029cbf1d670f9e075f2b2faa18a129785957342d3bef0f3120e37c4610a221f489aef705b8e647da0861d678278e77bff6e