Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 11:30
Static task
static1
Behavioral task
behavioral1
Sample
a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe
-
Size
466KB
-
MD5
a97144af800ff333f4b8a0361d791087
-
SHA1
131cef8e8239477f295dfb84a70304d62652bd6b
-
SHA256
125273103d910e7aec35c4bf75fce7fb0d000eee31b9b5409119f38069dbb722
-
SHA512
ca61bfb7da94969720f2c54ba5c6b16b151405777612f0c78a17f885e668e8bcb69b45ff35c3fcc07a3bde7911d5956ab5f13640a1a806092803eea0b6cb07bb
-
SSDEEP
6144:BWylDcksxWe65bf67rHzZ8Ees9gbCKbGHOOJ3Vd6QBOT+VTJQQCklKAmAAcOGRwj:0yGksh8bfUrH2osCKi7kQBOTrE5F9wfL
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Control Panel\International\Geo\Nation a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 772 PEVerify.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe = "C:\\Users\\Admin\\AppData\\Roaming\\flash player\\flashplayer.exe" a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe = "\\flash player\\flashplayer.exe" a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5032 set thread context of 3960 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 86 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe File opened for modification C:\Windows\assembly a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5\Blob = 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 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5\Blob = 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 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\742C3192E607E424EB4549542BE1BBC53E6174E2 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\742C3192E607E424EB4549542BE1BBC53E6174E2\Blob = 5c0000000100000004000000000400007e0000000100000008000000000010c51e92d201620000000100000020000000e7685634efacf69ace939a6b255b7b4fabef42935b50a265acb5cb6027e44e7009000000010000002a000000302806082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030119000000010000001000000091161b894b117ecdc257628db460cc04030000000100000014000000742c3192e607e424eb4549542be1bbc53e6174e21d000000010000001000000027b3517667331ce2c1e74002b5ff2298140000000100000014000000e27f7bd877d5df9e0a3f9eb4cb0e2ea9efdb69770b000000010000004600000056006500720069005300690067006e00200043006c006100730073002000330020005000750062006c006900630020005000720069006d00610072007900200043004100000004000000010000001000000010fc635df6263e0df325be5f79cd67670f0000000100000010000000d7c63be0837dbabf881d4fbf5f986ad853000000010000002400000030223020060a2b0601040182375e010130123010060a2b0601040182373c0101030200c07a000000010000000e000000300c060a2b0601040182375e010268000000010000000800000000003db65bd9d5012000000001000000400200003082023c308201a5021070bae41d10d92934b638ca7b03ccbabf300d06092a864886f70d0101020500305f310b300906035504061302555331173015060355040a130e566572695369676e2c20496e632e31373035060355040b132e436c6173732033205075626c6963205072696d6172792043657274696669636174696f6e20417574686f72697479301e170d3936303132393030303030305a170d3238303830313233353935395a305f310b300906035504061302555331173015060355040a130e566572695369676e2c20496e632e31373035060355040b132e436c6173732033205075626c6963205072696d6172792043657274696669636174696f6e20417574686f7269747930819f300d06092a864886f70d010101050003818d0030818902818100c95c599ef21b8a0114b410df0440dbe357af6a45408f840c0bd133d9d911cfee02581f25f72aa84405aaec031f787f9e93b99a00aa237dd6ac85a26345c77227ccf44cc67571d239ef4f42f075df0a90c68e206f980ff8ac235f702936a4c986e7b19a20cb53a585e73dbe7d9afe244533dc7615ed0fa271644c652e816845a70203010001300d06092a864886f70d010102050003818100bb4c122bcf2c26004f1413dda6fbfc0a11848cf3281c67922f7cb6c5fadff0e895bc1d8f6c2ca851cc73d8a4c053f04ed626c076015781925e21f1d1b1ffe7d02158cd6917e3441c9c194439895cdc9c000f568d0299eda290454ce4bb10a43df032030ef1cef8e8c9518ce6629fe69fc07db7729cc9363a6b9f4ea8ff640d64 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 772 PEVerify.exe 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 772 PEVerify.exe 772 PEVerify.exe 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 772 PEVerify.exe 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 772 PEVerify.exe 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 772 PEVerify.exe 772 PEVerify.exe 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 772 PEVerify.exe 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 772 PEVerify.exe 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 772 PEVerify.exe 772 PEVerify.exe 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 772 PEVerify.exe 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 772 PEVerify.exe 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 772 PEVerify.exe 772 PEVerify.exe 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 772 PEVerify.exe 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 772 PEVerify.exe 772 PEVerify.exe 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 772 PEVerify.exe 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 772 PEVerify.exe 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe Token: SeDebugPrivilege 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe Token: SeDebugPrivilege 772 PEVerify.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 5032 wrote to memory of 3960 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 86 PID 5032 wrote to memory of 3960 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 86 PID 5032 wrote to memory of 3960 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 86 PID 5032 wrote to memory of 3960 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 86 PID 5032 wrote to memory of 3960 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 86 PID 5032 wrote to memory of 3960 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 86 PID 5032 wrote to memory of 3960 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 86 PID 5032 wrote to memory of 3960 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 86 PID 5032 wrote to memory of 2956 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 87 PID 5032 wrote to memory of 2956 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 87 PID 5032 wrote to memory of 2956 5032 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 87 PID 2956 wrote to memory of 772 2956 cmd.exe 89 PID 2956 wrote to memory of 772 2956 cmd.exe 89 PID 2956 wrote to memory of 772 2956 cmd.exe 89 PID 3960 wrote to memory of 5032 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 82 PID 3960 wrote to memory of 5032 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 82 PID 3960 wrote to memory of 5032 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 82 PID 3960 wrote to memory of 5032 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 82 PID 3960 wrote to memory of 5032 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 82 PID 3960 wrote to memory of 5032 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 82 PID 3960 wrote to memory of 5032 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 82 PID 3960 wrote to memory of 5032 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 82 PID 3960 wrote to memory of 5032 3960 a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3960
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Roaming\PEVerify.exe" "C:\Users\Admin\AppData\Local\Temp\a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Roaming\PEVerify.exe"C:\Users\Admin\AppData\Roaming\PEVerify.exe" "C:\Users\Admin\AppData\Local\Temp\a97144af800ff333f4b8a0361d791087_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381B
MD51e4a89b11eae0fcf8bb5fdd5ec3b6f61
SHA14260284ce14278c397aaf6f389c1609b0ab0ce51
SHA2564bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df
SHA5128c290919e456a80d87dd6d243e4713945432b9a2bc158bfa5b81ae9fed1a8dd693da51914fa4014c5b8596e36186a9c891741c3b9011958c7ac240b7d818f815
-
Filesize
4B
MD5ac52c626afc10d4075708ac4c778ddfc
SHA1a5882a0c4a35ea01edb5ab5385d552cac5e4d677
SHA25604db56ea3df5beb6ea813aa0dc0f653b27ee8bcc02b08a0fa15880b1bebcf4f9
SHA512eab9b5581ffb1da29033ccfb54da56b0f2474f49356a7d75677584ede7b42dc6e8ca982e3b8164250f814ea36135de57c62f5885e2dbfd20066da317a8b3d979
-
Filesize
59B
MD5903bc0b85fb3242bd00462af69a6b34e
SHA120d8d42695d74cae9a05d04978ef79e015fc887c
SHA256e9d122b170c38b2fe8dc1855b347d00cce07c7718d23516ffa9e1a637c6fcb89
SHA5121ed4e6622cf36b361b10446377db746d45d26ce2c89d7ab13451107040d9cb7982cad2a810d23d737d49364c5b762ccfa54c74e6481c5cab70c509c618d119fb
-
Filesize
53KB
MD56c93f0cc87ec29681dc4c92eed621884
SHA195c432cabca506dc9ce77d2eb36a820a9c706b2e
SHA256f7a659e450b6f82939e4e48436abff93788bdd41b0a4b34d25d72f24a3e24d1b
SHA512dde8fa67890bdc07deb86b6e10b9cf773ac6bb3f0315de19cc67df2a6443d88d40e2a932a13e357c7d311863a495a88c20b2a034ba0a7862fe76893bf9c6427d