Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 13:46
Static task
static1
Behavioral task
behavioral1
Sample
068b80e5db838244c82891366e8f1559_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
068b80e5db838244c82891366e8f1559_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
068b80e5db838244c82891366e8f1559_JaffaCakes118.exe
-
Size
32KB
-
MD5
068b80e5db838244c82891366e8f1559
-
SHA1
fd68783d656bd51ac6cf9f17018818a68f51044a
-
SHA256
2f3044f95aa02cab05ae8f65a130ec07bd91fb128bbe2765b3d590a87835e208
-
SHA512
efa03461bc51858261004717a193d67ac89174f5f2f8b12ec75bde87ffa0ec7f99bfce11de97ab9958fd552794675f3c7a30c94ac8b6840b2d488c1d2c47f397
-
SSDEEP
384:XcrwKZurWZKuYAWwhJ64XNLYtKi/TE+kOjk0Un1pDhHugvdukDGSne74:XxewJk649LYKr+Un1ugvE+Be7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation 068b80e5db838244c82891366e8f1559_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2472 tasklist.exe 4528 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4528 tasklist.exe Token: SeDebugPrivilege 2472 tasklist.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3008 068b80e5db838244c82891366e8f1559_JaffaCakes118.exe 3008 068b80e5db838244c82891366e8f1559_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3008 wrote to memory of 3224 3008 068b80e5db838244c82891366e8f1559_JaffaCakes118.exe 96 PID 3008 wrote to memory of 3224 3008 068b80e5db838244c82891366e8f1559_JaffaCakes118.exe 96 PID 3008 wrote to memory of 3224 3008 068b80e5db838244c82891366e8f1559_JaffaCakes118.exe 96 PID 3008 wrote to memory of 2412 3008 068b80e5db838244c82891366e8f1559_JaffaCakes118.exe 98 PID 3008 wrote to memory of 2412 3008 068b80e5db838244c82891366e8f1559_JaffaCakes118.exe 98 PID 3008 wrote to memory of 2412 3008 068b80e5db838244c82891366e8f1559_JaffaCakes118.exe 98 PID 3224 wrote to memory of 2472 3224 cmd.exe 100 PID 3224 wrote to memory of 2472 3224 cmd.exe 100 PID 3224 wrote to memory of 2472 3224 cmd.exe 100 PID 2412 wrote to memory of 4528 2412 cmd.exe 101 PID 2412 wrote to memory of 4528 2412 cmd.exe 101 PID 2412 wrote to memory of 4528 2412 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\068b80e5db838244c82891366e8f1559_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\068b80e5db838244c82891366e8f1559_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 068b80e5db838244c82891366e8f1559_JaffaCakes118.com2⤵
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 068b80e5db838244c82891366e8f1559_JaffaCakes118.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-