Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 15:17
Static task
static1
Behavioral task
behavioral1
Sample
07318e0f780396ca081a819416da696b_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
07318e0f780396ca081a819416da696b_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
07318e0f780396ca081a819416da696b_JaffaCakes118.exe
-
Size
261KB
-
MD5
07318e0f780396ca081a819416da696b
-
SHA1
a4faad74e9123890c8e1f4d8b0635cb7b4f27f9f
-
SHA256
c6659983a0f5ea9359c5166198ae672f52a999f19cf84da355cdb829a1bce03a
-
SHA512
ddab7e2a695aa65ad6c8caa3ba6883c44dcb194f9b51c955e7f5de72bd16bd358cd21d4ce59d4d9efb91b5eb38236916ac5a4477e1dbd247e400c8da2a60f17f
-
SSDEEP
6144:61c6Mr9tv4sDVsDtiY99SQDdaWUu8ioX5jF25JuWDtR:61cxht9DVssY9PdaVuzoJK
Malware Config
Signatures
-
Event Triggered Execution: AppCert DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppCert DLLs loaded into processes.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation 07318e0f780396ca081a819416da696b_JaffaCakes118.exe -
Loads dropped DLL 4 IoCs
pid Process 3440 07318e0f780396ca081a819416da696b_JaffaCakes118.exe 1788 Process not Found 2952 rundll32.exe 4632 cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Gameonce.dll 07318e0f780396ca081a819416da696b_JaffaCakes118.exe File created C:\Windows\system32\Gameonce64.dll 07318e0f780396ca081a819416da696b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3200 4632 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3440 07318e0f780396ca081a819416da696b_JaffaCakes118.exe 3440 07318e0f780396ca081a819416da696b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3440 wrote to memory of 2952 3440 07318e0f780396ca081a819416da696b_JaffaCakes118.exe 93 PID 3440 wrote to memory of 2952 3440 07318e0f780396ca081a819416da696b_JaffaCakes118.exe 93 PID 3440 wrote to memory of 4632 3440 07318e0f780396ca081a819416da696b_JaffaCakes118.exe 96 PID 3440 wrote to memory of 4632 3440 07318e0f780396ca081a819416da696b_JaffaCakes118.exe 96 PID 3440 wrote to memory of 4632 3440 07318e0f780396ca081a819416da696b_JaffaCakes118.exe 96 PID 4632 wrote to memory of 2364 4632 cmd.exe 101 PID 4632 wrote to memory of 2364 4632 cmd.exe 101 PID 4632 wrote to memory of 2364 4632 cmd.exe 101 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2364 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\07318e0f780396ca081a819416da696b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\07318e0f780396ca081a819416da696b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\system32\Gameonce64.dll",CreateProcessNotify2⤵
- Loads dropped DLL
PID:2952
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240620671.bat" "C:\Users\Admin\AppData\Local\Temp\07318e0f780396ca081a819416da696b_JaffaCakes118.exe""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SysWOW64\attrib.exeattrib -s -r -h"C:\Users\Admin\AppData\Local\Temp\07318e0f780396ca081a819416da696b_JaffaCakes118.exe"3⤵
- Views/modifies file attributes
PID:2364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 4243⤵
- Program crash
PID:3200
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3440 -ip 34401⤵PID:2904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4632 -ip 46321⤵PID:3952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97B
MD5d226a657b279c5fc0a892748230a56ff
SHA1fa7e4fb6d6de3c4769001cbfce0a00ba02ef28a5
SHA2569dae2767b8e3499d37418a75ddd04d457c7ec8d6c8f312ee109c95a8a97e7761
SHA51207d55ccf3b511c3be64f6dcd05cea3feaafb286196e5d7ba30016ab6d9c0d656fb7cde8eb1ce0ef28a41f1f3f00f0e29020c92479619fd43e4ed47b829f8bf2a
-
Filesize
87KB
MD522045dd8686f7f968e05649d4a6e78e7
SHA172eeb58cdf8912c6c95bcbc9bf2e449e8c642b51
SHA2561a165fe57c3d5bb9033d94992cfe2e1c8b2e97b3bd5be2eeb85d984de541c173
SHA5124ebe4b2c2aecdb71d044725dd1c1cc13aeda52dcb973d96a4513b3d5f71a5e401a471e5ac17e77f7610813c2eb7efbeba05a07ec9b84266473302ddddce006f5
-
Filesize
99KB
MD5e48bff63ea6663bf241fc915fb7f2546
SHA1fde9195c95116d87ba15b1739611ea494bea39b7
SHA25696a8028512e1299fe95af8dfce475f46c90fa6db751c28a679acbebac5a71484
SHA5123e9caaa4d06ee01a2dbc71e6ba422bc2cacbccb7ac30beaa61c86693dcb9b4af37a5aff6eed413bd21cd83b38dc350a12fd89831d0cb58d23b3d620a0d9f41a6