Analysis
-
max time kernel
143s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 06:56
Static task
static1
Behavioral task
behavioral1
Sample
03d3695d1d54572e95669e88832e36ba_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
03d3695d1d54572e95669e88832e36ba_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
03d3695d1d54572e95669e88832e36ba_JaffaCakes118.exe
-
Size
12KB
-
MD5
03d3695d1d54572e95669e88832e36ba
-
SHA1
66a0b53b8df1743b73b0dfb31895e0d64cd32c21
-
SHA256
81db08f47d33516ca7da4de905e8dfd71dd570f41d53da2af998af87b92b8390
-
SHA512
db0f77ddd91f967fcccce01c58f537b2d6cde00918f26ca98691b77e24e569e8c613022ad361c9e3d8d8c5a473ec6e347a36f37212bb94683fcc0d42ff42a4fd
-
SSDEEP
96:yMVX/DE+pS21HAdZxtwCKbzKj/K2pJc0gPzOt20aM2b:NPYeHwCCKbzKTK2pJ3cOtYMu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\International\Geo\Nation 03d3695d1d54572e95669e88832e36ba_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings 03d3695d1d54572e95669e88832e36ba_JaffaCakes118.exe -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 3252 NOTEPAD.EXE 760 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4068 03d3695d1d54572e95669e88832e36ba_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4068 wrote to memory of 3252 4068 03d3695d1d54572e95669e88832e36ba_JaffaCakes118.exe 92 PID 4068 wrote to memory of 3252 4068 03d3695d1d54572e95669e88832e36ba_JaffaCakes118.exe 92 PID 4068 wrote to memory of 3252 4068 03d3695d1d54572e95669e88832e36ba_JaffaCakes118.exe 92 PID 4068 wrote to memory of 760 4068 03d3695d1d54572e95669e88832e36ba_JaffaCakes118.exe 93 PID 4068 wrote to memory of 760 4068 03d3695d1d54572e95669e88832e36ba_JaffaCakes118.exe 93 PID 4068 wrote to memory of 760 4068 03d3695d1d54572e95669e88832e36ba_JaffaCakes118.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\03d3695d1d54572e95669e88832e36ba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\03d3695d1d54572e95669e88832e36ba_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\sfsd.txt2⤵
- Opens file in notepad (likely ransom note)
PID:3252
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\sdsdsd.txt2⤵
- Opens file in notepad (likely ransom note)
PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1820,i,10925946972013221578,8820669985803190952,262144 --variations-seed-version --mojo-platform-channel-handle=4084 /prefetch:81⤵PID:2040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31B
MD5b8d3805f924d5fae70c2dd3790f1bd46
SHA10a050bab93cf23a3a7c167fb8325f82e92bbf963
SHA256d57712faeefb71809c6b9802a02bd39d31ec6954511c616d5153982b8ef1d41f
SHA51234dbe67a8ab1dd1f3196aeceb059288299e0448a637d90f85ade67f9478b5aa10d7911e171c095ce0251569ced5c268bdcd80a464dfa442c43d51217be4957ef
-
Filesize
19B
MD561c32087c35124aec22ad014fde8448b
SHA17adcf46dd9f4958301e8859051910d0432cd0353
SHA2566bb368325e9deac47b0ce311752f1bad1db0d230c518aac8c6f21fc289a5eab4
SHA512a4c062ff2a646c0e361f9b9ac9519f16d72a84446bb4f8f262c247ae2a542d906f45fde8be5f78d8a796dd0ee4b55d3896d1b51b28fe3a205bc79ff07b181aeb