Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 00:21
Static task
static1
Behavioral task
behavioral1
Sample
0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe
-
Size
155KB
-
MD5
0b7c9f69a94b45d3ba41ec21747d5257
-
SHA1
09f42eb50a34500f6cc3cde6a18dce0883707986
-
SHA256
d60db77657efe6a3dd701bf72bc16dfb56306bc1b0d508a549aca0d8f36338c1
-
SHA512
af3eadc5c49b43048ac9195f98001ded443463d337dade79e7ea90ca0623955aa1aed23b0f45e7964b7797cc63bf95aa31025930443ad2d87e8e7e2c891d6aa3
-
SSDEEP
3072:Nnj9jtfU+INndIc0JHmHkCAZfViVUdR2ckgAWTjlohOg6sZQGfPUMAlXzsl:NjbeinU3Cf34ck/WTjCkgvfgB
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Control Panel\International\Geo\Nation Release.exe -
Executes dropped EXE 3 IoCs
pid Process 4976 Release.exe 1708 Adobe_Update.exe 4388 Java Update.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\Java Update.exe" Java Update.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini Adobe_Update.exe File opened for modification C:\Windows\assembly\Desktop.ini Adobe_Update.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly Adobe_Update.exe File created C:\Windows\assembly\Desktop.ini Adobe_Update.exe File opened for modification C:\Windows\assembly\Desktop.ini Adobe_Update.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4388 Java Update.exe Token: SeDebugPrivilege 1708 Adobe_Update.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1708 Adobe_Update.exe 1708 Adobe_Update.exe 4388 Java Update.exe 4388 Java Update.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 224 wrote to memory of 4976 224 0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe 83 PID 224 wrote to memory of 4976 224 0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe 83 PID 224 wrote to memory of 4976 224 0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe 83 PID 4976 wrote to memory of 1708 4976 Release.exe 84 PID 4976 wrote to memory of 1708 4976 Release.exe 84 PID 224 wrote to memory of 4388 224 0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe 85 PID 224 wrote to memory of 4388 224 0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe 85 PID 1708 wrote to memory of 1148 1708 Adobe_Update.exe 93 PID 1708 wrote to memory of 1148 1708 Adobe_Update.exe 93 PID 1148 wrote to memory of 3680 1148 csc.exe 95 PID 1148 wrote to memory of 3680 1148 csc.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Release.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Release.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Adobe_Update.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Adobe_Update.exe"3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5bcyvync.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6552.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC6551.tmp"5⤵PID:3680
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Java Update.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Java Update.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD59ec858d4f7d290ccd2c9cf89b19bf075
SHA1bbbb32f29a397556890de580d29fb1a19407f310
SHA256fe74ebe828464ec37d11cfa8d4d3b5a3f7b31a5b64a2a7c611858866b77a5067
SHA5127581699b29794f0c1c60d98385ce1cf0ca863dddafe8a2c588e007310ff05ae55d1cd3d24db0fd4bdaff40a2d1c5a6243ca250e2f3fc8e130726cd5b6b77ae9f
-
Filesize
53KB
MD5e80f959c5fa918eeb106b87ac88f3b1b
SHA1b31cb37cdd9ea70af01437e3ed4398fef421a232
SHA2568e2e1357b6dc472c1beaa9358cbfa21be653b3d171e9b4bf086c15dcca9c3df8
SHA512061236fae2212451ed45cf6019d51145bbb2259167f0d3e5a1560e1224d0020c5e4561c3482ff6df3d6c9c9ce9f793c1d60a97b40da4702bf44414fd45e268d6
-
Filesize
20KB
MD5e3761cbb4338919e74a783ccba9df608
SHA1c834f300e52b3623fc21196baa9c066594f0eb5a
SHA2568151fc1655de34870408efc61ae0794f0fc0263f82649d2de78c527da249d87f
SHA512850bdb16b42dad3259c6213ceb0fa888c023209429c254deb138a563b50d2adbe3b0b7ead9a9d48cc89c93a9ee1c9a46dab9255bde4796293611d214763b1001
-
Filesize
149KB
MD5eaa7bc60632fe839d29d9264b76ec2e9
SHA19817f6f99631d76836ce56b253dacc1ecfb2d049
SHA25663a28d42281c22c3ef912805a4d2f398752e065729fcc4e57a283378d7b832dc
SHA5124eb39c2ab73cb86ac21e5c782f1ce874f245d127caf42abcb5e0a312e8794c168fe1ef24bd1af7ff3a39a88f6052c8a1f9bbd76b247d228eda4b8636e4d506ed
-
Filesize
7KB
MD5890ead2e9641fb4d552b70f5cba861e1
SHA1a136cf74a7e7bc431084758063ef26fedd2d8346
SHA25660fee88b19f44b00cbc6d3e4e41eefb53621aa838c79ce429d13d73fc02fefc6
SHA512ac4fea6d72d83ffea6cf30ff1996bd2f3ee35ae7d48a780932f426e4c5acc7e931123cdc83c509faf15e298994eaac35dc17ac2f1cf7ccccc7ba142608e9aa73
-
Filesize
7KB
MD50d35116485e8fb0a458d49989e61197b
SHA1970c8a8111815f7d7631d7e3e73609eb2563e128
SHA256f5cc940e3e835faa99285a66f0787546ee33175b01769251467d54db0409de15
SHA512416e761e70db41a640a7ee22995c4ccea8f4a29131b58171ee4aa74d1937e312a5215796a44dc7778fe9371201c29597cebc2c8b556ba60271a57a4868d7d49b
-
Filesize
6KB
MD5056de44ff02c983d6915228cfcd970fc
SHA1b41793853c18f620a95dc19e91739fb77f975615
SHA2569495302ed6e44d73bf4d59d01598e878e97c621cff83042c27b461726c645971
SHA5127b18a8c2cee6979a8fef5324c0dcf254e89a3883a05dcec3eba10f589b87d1f5086e7427b2d96e4ba60bf97f313a0d8250ae1d27d9e1fe1e8b62fed74937ff9c
-
Filesize
43KB
MD5fb2f21dd9cf648dc34f8e8f3f3a71b4f
SHA174ae0d969bf3eae2812cac75406e194818c6af8e
SHA25667b0fe6149bdafc95ec8eb1f74d96f29d49f4a90f8f2df19ad60da69e8e3b8af
SHA512a61b41967976b319096aa5220b317ff2c2d9bd20e759b793c22453925b68435bb2ee793032b5c32813ac102165ef5cbb39e142d27fb340f1c3b0e9a5d4299a67
-
Filesize
1KB
MD59bc8486a528fd737e6e69f206b8d9144
SHA1466d1e3df6e8b4f1ca0723e36566343201bf603e
SHA25628439cf868495aafebb1cced6ddb4ea131f1227807b94111e70eb6936a1b1858
SHA5129b8eb759e6ff1472efa8282e1335f6b84a107d57740d7dd80e9cc50f17ff92e5e5c82ce8255bc6236e0d3c556fed389c4a260a1605114421bb1771872c311424
-
Filesize
39KB
MD523a76cc9317bc2d7757e89d7197a893e
SHA10372ee4a8404bdb8ba6cba344448b0754b98c2ce
SHA256db6c8cfa63aa4d909eb60e8ed30235b56508e3bfab2cfa3e93ddd62c94179022
SHA51268fac7a9ecb8acd44107d0b2ecc0077b7f5185ac5a2ccd0e3e319b4dce36b9b9a53b33b1b8ded02427b4cbee5c28ebaa969849122ca13f41a77f72478282bb41
-
Filesize
598B
MD5e9ce0f07e696734eb75aeb332adba571
SHA13c57218bd2d3767b302d13ba96129d17bbd948c6
SHA2562c07028d5294264d83eac943112e07cb4be59fbeedb0e2134e171fde97d831ed
SHA512bd162d4228bc89c30727599c798beb7a5616d09edf69bb8dc2d36fb243921ce0a74eafe4b1acea3ad87c6be5c122a4a01139bca1455e3b9baa49e2c1481263c4
-
Filesize
652B
MD593bd3640acd1a9a68042a6b68e5d2674
SHA157f087bc6ef4264599bacbf5ffd622620daf16ef
SHA256e63e8f3abeae752698f61775eeabd1d87cb747b0927a5cc77f21dc031559296c
SHA512f34c0432460a55896cd7a3ba9b07c7502b51978fcb0e5cb2078c84a892bff253a4619f10814a92cf93dcc6aaadea61ce4a0fa40e166e4102fac75785c1bb07b9