Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 02:15
Behavioral task
behavioral1
Sample
ac8f768b63004260638874c10310c45e_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
ac8f768b63004260638874c10310c45e_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
ac8f768b63004260638874c10310c45e
-
SHA1
e2c442b858e005df4f8d035917910e3067c96eaa
-
SHA256
7a5f9d785dc88812cc7ac5295cb614a9961d610c93cf6f844c1ed7f2d1132e7b
-
SHA512
2dedd6b9c4a1264080c391d362df0576a52650f8ded3a37f73b94d52c07681eb0db539a17968674f88272a190c35662b324fec9d60f681905aaa2feed323d283
-
SSDEEP
49152:hSG8F6PjVeeV6Az1q/0kOkfQ+dDlIpGX2Kt+qTEQq0Gkv5eT4L7:hSG8F6PjVJ8u0XOkf5dDlWGXf+qAQq0f
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Control Panel\International\Geo\Nation ac8f768b63004260638874c10310c45e_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1784 luwenltkjx.exe 1060 luwenltkjx.tmp -
resource yara_rule behavioral2/memory/3800-0-0x0000000000FD0000-0x00000000011FA000-memory.dmp upx behavioral2/memory/3800-7-0x0000000000FD0000-0x00000000011FA000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 11 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\XiGuaPhoto\unins000.dat luwenltkjx.tmp File created C:\Program Files (x86)\XiGuaPhoto\is-82C37.tmp luwenltkjx.tmp File created C:\Program Files (x86)\XiGuaPhoto\is-RT67A.tmp luwenltkjx.tmp File created C:\Program Files (x86)\XiGuaPhoto\is-5PMIG.tmp luwenltkjx.tmp File created C:\Program Files (x86)\XiGuaPhoto\unins000.dat luwenltkjx.tmp File created C:\Program Files (x86)\XiGuaPhoto\is-RFVF8.tmp luwenltkjx.tmp File created C:\Program Files (x86)\XiGuaPhoto\is-NVABA.tmp luwenltkjx.tmp File created C:\Program Files (x86)\XiGuaPhoto\is-4158U.tmp luwenltkjx.tmp File opened for modification C:\Program Files (x86)\XiGuaPhoto\WICLoader.dll luwenltkjx.tmp File opened for modification C:\Program Files (x86)\XiGuaPhoto\webp.dll luwenltkjx.tmp File opened for modification C:\Program Files (x86)\XiGuaPhoto\XGViewer.exe luwenltkjx.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3800 ac8f768b63004260638874c10310c45e_JaffaCakes118.exe 3800 ac8f768b63004260638874c10310c45e_JaffaCakes118.exe 3800 ac8f768b63004260638874c10310c45e_JaffaCakes118.exe 3800 ac8f768b63004260638874c10310c45e_JaffaCakes118.exe 1060 luwenltkjx.tmp 1060 luwenltkjx.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1060 luwenltkjx.tmp -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3800 wrote to memory of 708 3800 ac8f768b63004260638874c10310c45e_JaffaCakes118.exe 86 PID 3800 wrote to memory of 708 3800 ac8f768b63004260638874c10310c45e_JaffaCakes118.exe 86 PID 3800 wrote to memory of 708 3800 ac8f768b63004260638874c10310c45e_JaffaCakes118.exe 86 PID 708 wrote to memory of 1784 708 cmd.exe 89 PID 708 wrote to memory of 1784 708 cmd.exe 89 PID 708 wrote to memory of 1784 708 cmd.exe 89 PID 1784 wrote to memory of 1060 1784 luwenltkjx.exe 90 PID 1784 wrote to memory of 1060 1784 luwenltkjx.exe 90 PID 1784 wrote to memory of 1060 1784 luwenltkjx.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac8f768b63004260638874c10310c45e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ac8f768b63004260638874c10310c45e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\luwenltkjx.exe" /VERYSILENT2⤵
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Users\Admin\AppData\Local\Temp\luwenltkjx.exe"C:\Users\Admin\AppData\Local\Temp\luwenltkjx.exe" /VERYSILENT3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\is-2FEDG.tmp\luwenltkjx.tmp"C:\Users\Admin\AppData\Local\Temp\is-2FEDG.tmp\luwenltkjx.tmp" /SL5="$A020A,548300,54272,C:\Users\Admin\AppData\Local\Temp\luwenltkjx.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1060
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
900KB
MD5f8b110dc2063d3b29502aa7042d26122
SHA11a0fd3db79eadc1ce714f6267d476ddbec0f5e79
SHA256e8730b0bf8f94cbb8babbfefb32cef8e8d19ec823f28c33a7d48c78589710762
SHA512f3125d3f575aff68105ebb3eadbce30547d34e12237d8ebbc555c6fe12bcc0a5ea85a38e26f2900d70af70ec07efde3b8cd65dc0fdada637496531245ea5052f
-
Filesize
834KB
MD5e25719cce0f09a6a9469f9938c5bbc0d
SHA112ee46b8b074ae8005f3049ec2c17da63d3db8c3
SHA256f860e5c669593498501214479f6964c619942b3a1e783b2368e7212f941d60fb
SHA5128034b89797006f31092e04cbb0229b1d3d776a959e1be8c36f564f0cb21714dc5519c90abb944f5be49a77c31b98987aa1a38a1618a7d963a1c4f8217db42b1c