Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe
-
Size
112KB
-
MD5
0a7007f5802841664a2c589d2a4e9bce
-
SHA1
b0a611f22be148ad804382b2063929b619172beb
-
SHA256
4b48ad96581de0d0baf722dacaa8a1d60d06f83fd7ad8e2af121a2b4b1350f1c
-
SHA512
c665dee4a5bc6e7633a32d70e8782d687817861a85d974668e891c4198a518a6edf034685b3fb77a10501fb034988cc2a0112d4afd5d733f2dea40857f506121
-
SSDEEP
1536:LPqKgbwDeVyAUHwGvVJrYJeyxWxVhkITI5ywWFfB8lBTxe5P1PJ:9gbwDKyLwGvTrYkg6BJR6ns5PFJ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation jusched.exe -
Executes dropped EXE 3 IoCs
pid Process 2344 jusched.exe 3712 jusched.exe 3192 jusched.exe -
Unexpected DNS network traffic destination 10 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 178.162.181.106 Destination IP 178.162.181.106 Destination IP 178.162.181.106 Destination IP 178.162.181.106 Destination IP 178.162.181.106 Destination IP 178.162.181.106 Destination IP 178.162.181.106 Destination IP 178.162.181.106 Destination IP 178.162.181.106 Destination IP 178.162.181.106 -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1264 set thread context of 4676 1264 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe 81 PID 4676 set thread context of 1136 4676 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe 82 PID 2344 set thread context of 3712 2344 jusched.exe 84 PID 3712 set thread context of 3192 3712 jusched.exe 86 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe File created C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Fonts\EKLScq.com 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1136 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe 1136 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe 3192 jusched.exe 3192 jusched.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1264 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe 2344 jusched.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1264 wrote to memory of 4676 1264 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe 81 PID 1264 wrote to memory of 4676 1264 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe 81 PID 1264 wrote to memory of 4676 1264 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe 81 PID 1264 wrote to memory of 4676 1264 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe 81 PID 1264 wrote to memory of 4676 1264 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe 81 PID 1264 wrote to memory of 4676 1264 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe 81 PID 1264 wrote to memory of 4676 1264 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe 81 PID 1264 wrote to memory of 4676 1264 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe 81 PID 4676 wrote to memory of 1136 4676 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe 82 PID 4676 wrote to memory of 1136 4676 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe 82 PID 4676 wrote to memory of 1136 4676 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe 82 PID 4676 wrote to memory of 1136 4676 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe 82 PID 4676 wrote to memory of 1136 4676 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe 82 PID 4676 wrote to memory of 1136 4676 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe 82 PID 4676 wrote to memory of 1136 4676 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe 82 PID 4676 wrote to memory of 1136 4676 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe 82 PID 1136 wrote to memory of 2344 1136 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe 83 PID 1136 wrote to memory of 2344 1136 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe 83 PID 1136 wrote to memory of 2344 1136 0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe 83 PID 2344 wrote to memory of 3712 2344 jusched.exe 84 PID 2344 wrote to memory of 3712 2344 jusched.exe 84 PID 2344 wrote to memory of 3712 2344 jusched.exe 84 PID 2344 wrote to memory of 3712 2344 jusched.exe 84 PID 2344 wrote to memory of 3712 2344 jusched.exe 84 PID 2344 wrote to memory of 3712 2344 jusched.exe 84 PID 2344 wrote to memory of 3712 2344 jusched.exe 84 PID 2344 wrote to memory of 3712 2344 jusched.exe 84 PID 3712 wrote to memory of 3192 3712 jusched.exe 86 PID 3712 wrote to memory of 3192 3712 jusched.exe 86 PID 3712 wrote to memory of 3192 3712 jusched.exe 86 PID 3712 wrote to memory of 3192 3712 jusched.exe 86 PID 3712 wrote to memory of 3192 3712 jusched.exe 86 PID 3712 wrote to memory of 3192 3712 jusched.exe 86 PID 3712 wrote to memory of 3192 3712 jusched.exe 86 PID 3712 wrote to memory of 3192 3712 jusched.exe 86 PID 3192 wrote to memory of 3232 3192 jusched.exe 87 PID 3192 wrote to memory of 3232 3192 jusched.exe 87 PID 3192 wrote to memory of 3232 3192 jusched.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe3⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe" DEL:C:\Users\Admin\AppData\Local\Temp\0a7007f5802841664a2c589d2a4e9bce_JaffaCakes118.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Program Files (x86)\Common Files\Java\Java Update\jusched .exe"C:\Program Files (x86)\Common Files\Java\Java Update\jusched .exe" "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"7⤵PID:3232
-
-
-
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD54ff2ea67633246e984b67dbb274be04c
SHA189e6eeb08f2436686a45abca94574cd6a42caffb
SHA2562886f66d8190ee5b1e8d59aa4548ba4acbfe5dde702a55e6b0910429e1bdfd14
SHA512be58753c9252c9969197ac562dc8f759d6819fe82e8824d669ff290a77cf94690c470930690fbfec5f7986e4896a2184c45e488a95c7fcf7009662ad9a4e839c