Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
08e397a4503f2ea0d6037ea7475c64bf_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
08e397a4503f2ea0d6037ea7475c64bf_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
08e397a4503f2ea0d6037ea7475c64bf_JaffaCakes118.exe
-
Size
617KB
-
MD5
08e397a4503f2ea0d6037ea7475c64bf
-
SHA1
3d3f974942425ddab23ab0e93ed91a1cdcca6cf2
-
SHA256
5322ae7296547bfaff7f945141d5dc3d5a41afb6bf72d21cb4463751f47de42b
-
SHA512
9bbd47ef06e02a55d4f16bc57c5be7f6f6a3243cb7bd1cc8e354dff7c335fb24b84765c692e858384857909e97dc05c5558237f9e52ed30a998eb4b2e595e071
-
SSDEEP
12288:LxoaMfX7yjDV2X9s0OHEH8ciRMebS8iKqhqtXqi1mhCopEmZ0i46/:2pVH8hRMebSMq2wCo+mZl
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 08e397a4503f2ea0d6037ea7475c64bf_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1152 Decrypted.exe 820 Decrypted.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vnet = "C:\\dropped.exe" Decrypted.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1152 set thread context of 820 1152 Decrypted.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 552 08e397a4503f2ea0d6037ea7475c64bf_JaffaCakes118.exe 1152 Decrypted.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 552 wrote to memory of 1152 552 08e397a4503f2ea0d6037ea7475c64bf_JaffaCakes118.exe 82 PID 552 wrote to memory of 1152 552 08e397a4503f2ea0d6037ea7475c64bf_JaffaCakes118.exe 82 PID 552 wrote to memory of 1152 552 08e397a4503f2ea0d6037ea7475c64bf_JaffaCakes118.exe 82 PID 1152 wrote to memory of 820 1152 Decrypted.exe 88 PID 1152 wrote to memory of 820 1152 Decrypted.exe 88 PID 1152 wrote to memory of 820 1152 Decrypted.exe 88 PID 1152 wrote to memory of 820 1152 Decrypted.exe 88 PID 1152 wrote to memory of 820 1152 Decrypted.exe 88 PID 1152 wrote to memory of 820 1152 Decrypted.exe 88 PID 1152 wrote to memory of 820 1152 Decrypted.exe 88 PID 1152 wrote to memory of 820 1152 Decrypted.exe 88 PID 1152 wrote to memory of 820 1152 Decrypted.exe 88 PID 1152 wrote to memory of 820 1152 Decrypted.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\08e397a4503f2ea0d6037ea7475c64bf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\08e397a4503f2ea0d6037ea7475c64bf_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\Decrypted.exe"C:\Users\Admin\AppData\Local\Temp\Decrypted.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\Decrypted.exe"C:\Users\Admin\AppData\Local\Temp\Decrypted.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:820
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
552KB
MD57625cc848d2b62a20ec974b30fd9a92a
SHA1eee10d9e41ba95ef080b2525bcf2d252c435f383
SHA2563636e29a43bef07a844ef29866879df8accfd25676323381e1652cbae2e10a52
SHA5129c952e44e4886ad18c95951e56de4f8d3af78c1858d1d75c171b38deb1b485be829ff853994b6f4531ec1fe6678e46582f8590bb255e46375bc1718358ee2bf9