Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 15:59
Static task
static1
Behavioral task
behavioral1
Sample
078540aae55d331d7df9a90c577d13d4_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
078540aae55d331d7df9a90c577d13d4_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
078540aae55d331d7df9a90c577d13d4_JaffaCakes118.exe
-
Size
114KB
-
MD5
078540aae55d331d7df9a90c577d13d4
-
SHA1
9b6a072a76000af1feec402cb3936430a62de44d
-
SHA256
d84e5ce07c118f596579b199f906cbc889b87ac02f73ea80cfee2aef4eeeca0c
-
SHA512
3a710ef228413b13e9d7568eca65c338b33d9dc702ffa270317a10dc81c2149718e2fa7cdb9edcc54f7b0ba1aadd2e3c0452c52a7082ed039abc03172635e8d1
-
SSDEEP
1536:sSmg5Tf9u8/DtO6PMMy7k+EMvOEZznJiuWpqDGx0bC1PWot3Cvc9hcsu:s7gZfY05HFR+ZrDJiuWwc0bCJ3Z9ab
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 078540aae55d331d7df9a90c577d13d4_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1416 EL.EXE 2368 x0nE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3328 2368 WerFault.exe 83 2060 2368 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4596 wrote to memory of 1416 4596 078540aae55d331d7df9a90c577d13d4_JaffaCakes118.exe 82 PID 4596 wrote to memory of 1416 4596 078540aae55d331d7df9a90c577d13d4_JaffaCakes118.exe 82 PID 4596 wrote to memory of 1416 4596 078540aae55d331d7df9a90c577d13d4_JaffaCakes118.exe 82 PID 4596 wrote to memory of 2368 4596 078540aae55d331d7df9a90c577d13d4_JaffaCakes118.exe 83 PID 4596 wrote to memory of 2368 4596 078540aae55d331d7df9a90c577d13d4_JaffaCakes118.exe 83 PID 4596 wrote to memory of 2368 4596 078540aae55d331d7df9a90c577d13d4_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\078540aae55d331d7df9a90c577d13d4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\078540aae55d331d7df9a90c577d13d4_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\EL.EXE"C:\Users\Admin\AppData\Local\Temp\EL.EXE"2⤵
- Executes dropped EXE
PID:1416
-
-
C:\Users\Admin\AppData\Local\Temp\x0nE.exe"C:\Users\Admin\AppData\Local\Temp\x0nE.exe"2⤵
- Executes dropped EXE
PID:2368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 2723⤵
- Program crash
PID:3328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 3003⤵
- Program crash
PID:2060
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2368 -ip 23681⤵PID:1104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2368 -ip 23681⤵PID:1452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD53dffac1a5aa8a2fda29ed341dd11323d
SHA1ca561a0f917ad334c7c0a88cf76fa7cf89e7e17c
SHA256f8996cd7ddedb7e8a136f6d99f5fdfa9c2904a248d70136e05a4e702630d64ff
SHA512a45eb89aa432e6299affa3b70ad40794b46077e4b3e97644bfac3a3a29de67e7fc20d97521aebb7f690b598be60985a9ee554b32bdc205d59ce1091ec159ee8f
-
Filesize
79KB
MD51ec7a82515b1380b87d0abf49aadc04d
SHA19cd193178ae7f0eb04b28e9ddcd536cf612d205f
SHA25629f1036874b242ac136030ab0f5777eff721b42783a4a08e0c8a608bd4f67039
SHA5123b8d340d55c24a17d6c97a7f0b9297856dc574e93e751eca516f3480d929c51e18865467c1d214a48c64bbf982e5e269e68eb70d7c0d9bcbf67049bf6be69ed9