Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 01:53
Static task
static1
Behavioral task
behavioral1
Sample
b13278b22966a77e73ba4e2d7b21c663_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
b13278b22966a77e73ba4e2d7b21c663_JaffaCakes118.exe
-
Size
320KB
-
MD5
b13278b22966a77e73ba4e2d7b21c663
-
SHA1
a698b00e96fc5695f30ce86f2cffafdc801627b0
-
SHA256
95dd9969858c4190c605a39044ab1f42d42266dbf8881ee6ef5ef9ab072efc86
-
SHA512
9e2420d8f0271a5f6adc02942d0160f10edcfe84080b4c482ea87f21086fbd828b2dfa24f100ab517750b487830968931dd023490566eb5f4148696efc0a7be2
-
SSDEEP
6144:OZ5GHKqSccAXTIzUzWvxv7vV+G7zPoAz0Q54HeyJAud+V3Oj:ObGHKDccAX0AWvxzvV+zAz03HFB
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation b13278b22966a77e73ba4e2d7b21c663_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2360 b13278b22966a77e73ba4e2d7b21c663_jaffacakes118.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Windows\assembly\Desktop.ini b13278b22966a77e73ba4e2d7b21c663_jaffacakes118.exe File created C:\Windows\assembly\Desktop.ini b13278b22966a77e73ba4e2d7b21c663_jaffacakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly b13278b22966a77e73ba4e2d7b21c663_jaffacakes118.exe File created C:\Windows\assembly\Desktop.ini b13278b22966a77e73ba4e2d7b21c663_jaffacakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini b13278b22966a77e73ba4e2d7b21c663_jaffacakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3320 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2360 b13278b22966a77e73ba4e2d7b21c663_jaffacakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4888 b13278b22966a77e73ba4e2d7b21c663_JaffaCakes118.exe Token: SeDebugPrivilege 2360 b13278b22966a77e73ba4e2d7b21c663_jaffacakes118.exe Token: 33 2360 b13278b22966a77e73ba4e2d7b21c663_jaffacakes118.exe Token: SeIncBasePriorityPrivilege 2360 b13278b22966a77e73ba4e2d7b21c663_jaffacakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2360 b13278b22966a77e73ba4e2d7b21c663_jaffacakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4888 wrote to memory of 2360 4888 b13278b22966a77e73ba4e2d7b21c663_JaffaCakes118.exe 87 PID 4888 wrote to memory of 2360 4888 b13278b22966a77e73ba4e2d7b21c663_JaffaCakes118.exe 87 PID 4888 wrote to memory of 2360 4888 b13278b22966a77e73ba4e2d7b21c663_JaffaCakes118.exe 87 PID 4888 wrote to memory of 4544 4888 b13278b22966a77e73ba4e2d7b21c663_JaffaCakes118.exe 88 PID 4888 wrote to memory of 4544 4888 b13278b22966a77e73ba4e2d7b21c663_JaffaCakes118.exe 88 PID 4888 wrote to memory of 4544 4888 b13278b22966a77e73ba4e2d7b21c663_JaffaCakes118.exe 88 PID 4544 wrote to memory of 3320 4544 cmd.exe 90 PID 4544 wrote to memory of 3320 4544 cmd.exe 90 PID 4544 wrote to memory of 3320 4544 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\b13278b22966a77e73ba4e2d7b21c663_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b13278b22966a77e73ba4e2d7b21c663_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\b13278b22966a77e73ba4e2d7b21c663_jaffacakes118\b13278b22966a77e73ba4e2d7b21c663_jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\b13278b22966a77e73ba4e2d7b21c663_jaffacakes118\b13278b22966a77e73ba4e2d7b21c663_jaffacakes118.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2360
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\b13278b22966a77e73ba4e2d7b21c663_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:3320
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\b13278b22966a77e73ba4e2d7b21c663_jaffacakes118\b13278b22966a77e73ba4e2d7b21c663_jaffacakes118.exe
Filesize320KB
MD5b13278b22966a77e73ba4e2d7b21c663
SHA1a698b00e96fc5695f30ce86f2cffafdc801627b0
SHA25695dd9969858c4190c605a39044ab1f42d42266dbf8881ee6ef5ef9ab072efc86
SHA5129e2420d8f0271a5f6adc02942d0160f10edcfe84080b4c482ea87f21086fbd828b2dfa24f100ab517750b487830968931dd023490566eb5f4148696efc0a7be2