Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
0a36c6911437807f24d464b1f4085324_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
0a36c6911437807f24d464b1f4085324_JaffaCakes118.exe
-
Size
575KB
-
MD5
0a36c6911437807f24d464b1f4085324
-
SHA1
d42664daa33a971be67d62305d838c76cda46be7
-
SHA256
0930b43b4c8cbf2f305ec5084825f04f704917608752355f6c55aa4c49feca1e
-
SHA512
1532b08abe648bcba77ed55b2e53a53c757d6c829d3d8ca199d381149c908a7f3517bae92f63000253712a7ad6db1d649ee25cded79dec96d732efc99ea46839
-
SSDEEP
12288:iojC8CgjVPJFa23+eJbssMVDh2Q3XoSQr+lYs:/j9JbkVgkoWt
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
birrakorca
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" REG.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 0a36c6911437807f24d464b1f4085324_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4448 .exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 whatismyip.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 936 REG.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe 4448 .exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4448 .exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4448 .exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4448 .exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4116 wrote to memory of 4448 4116 0a36c6911437807f24d464b1f4085324_JaffaCakes118.exe 80 PID 4116 wrote to memory of 4448 4116 0a36c6911437807f24d464b1f4085324_JaffaCakes118.exe 80 PID 4448 wrote to memory of 936 4448 .exe 81 PID 4448 wrote to memory of 936 4448 .exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a36c6911437807f24d464b1f4085324_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0a36c6911437807f24d464b1f4085324_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\.exe"C:\Users\Admin\AppData\Local\Temp\.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SYSTEM32\REG.exeREG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:936
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190KB
MD500c73fca73915d27b58658f627211adf
SHA1b361293e26448b3285447a0d2383ff45a1423a7b
SHA2567d014cc657150d451642355b8c64005f6d7c5a346a8a691d6230c98205ca139a
SHA5124bec091669cf3d12130115de42ecc3923c0e6a1994b22374975dc691fc04f0ee54911e762154e4fa1ca4850c988e62364f62e35e3383cc0366e561c65aa29c5c