Analysis
-
max time kernel
132s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 04:11
Static task
static1
Behavioral task
behavioral1
Sample
0c775c3c8b4b980a0d1e0bd80da8f358_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0c775c3c8b4b980a0d1e0bd80da8f358_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0c775c3c8b4b980a0d1e0bd80da8f358_JaffaCakes118.exe
-
Size
14KB
-
MD5
0c775c3c8b4b980a0d1e0bd80da8f358
-
SHA1
03d26de2a0076067fd215bf5a2934380fb30ef3d
-
SHA256
a0be0dfd4fbd858015f8f6719eeb5fca7319724c47e2dfa0648c19169ffe5219
-
SHA512
df73b600257d8053c9b857385b8881bc90b56c6aeb750e48dca915aa4c2eecae3cae95118ea39b8dba5c32c8a33051236f8b9c717e04a607b80ef4ca9bfbd21c
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhR0p6KoF:hDXWipuE+K3/SSHgx4QVF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0c775c3c8b4b980a0d1e0bd80da8f358_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation DEM3A3A.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation DEM9049.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation DEME687.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation DEM3D14.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation DEM9371.exe -
Executes dropped EXE 6 IoCs
pid Process 3848 DEM3A3A.exe 812 DEM9049.exe 2496 DEME687.exe 3112 DEM3D14.exe 4328 DEM9371.exe 3852 DEME990.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2680 wrote to memory of 3848 2680 0c775c3c8b4b980a0d1e0bd80da8f358_JaffaCakes118.exe 81 PID 2680 wrote to memory of 3848 2680 0c775c3c8b4b980a0d1e0bd80da8f358_JaffaCakes118.exe 81 PID 2680 wrote to memory of 3848 2680 0c775c3c8b4b980a0d1e0bd80da8f358_JaffaCakes118.exe 81 PID 3848 wrote to memory of 812 3848 DEM3A3A.exe 85 PID 3848 wrote to memory of 812 3848 DEM3A3A.exe 85 PID 3848 wrote to memory of 812 3848 DEM3A3A.exe 85 PID 812 wrote to memory of 2496 812 DEM9049.exe 92 PID 812 wrote to memory of 2496 812 DEM9049.exe 92 PID 812 wrote to memory of 2496 812 DEM9049.exe 92 PID 2496 wrote to memory of 3112 2496 DEME687.exe 94 PID 2496 wrote to memory of 3112 2496 DEME687.exe 94 PID 2496 wrote to memory of 3112 2496 DEME687.exe 94 PID 3112 wrote to memory of 4328 3112 DEM3D14.exe 96 PID 3112 wrote to memory of 4328 3112 DEM3D14.exe 96 PID 3112 wrote to memory of 4328 3112 DEM3D14.exe 96 PID 4328 wrote to memory of 3852 4328 DEM9371.exe 98 PID 4328 wrote to memory of 3852 4328 DEM9371.exe 98 PID 4328 wrote to memory of 3852 4328 DEM9371.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c775c3c8b4b980a0d1e0bd80da8f358_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0c775c3c8b4b980a0d1e0bd80da8f358_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\DEM3A3A.exe"C:\Users\Admin\AppData\Local\Temp\DEM3A3A.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\DEM9049.exe"C:\Users\Admin\AppData\Local\Temp\DEM9049.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Local\Temp\DEME687.exe"C:\Users\Admin\AppData\Local\Temp\DEME687.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\DEM3D14.exe"C:\Users\Admin\AppData\Local\Temp\DEM3D14.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\DEM9371.exe"C:\Users\Admin\AppData\Local\Temp\DEM9371.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\DEME990.exe"C:\Users\Admin\AppData\Local\Temp\DEME990.exe"7⤵
- Executes dropped EXE
PID:3852
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD50a00c3685cb931adeeb405f281e8fd33
SHA17d7c1664539b0631e4c6641b66eebf8e35fef3e9
SHA256af04cdc4a673c43a4c3c7901718949e9a342b5e3e8b7efe3be0db7807af60cdc
SHA512f6c9a0fc34dffbce63e06f8694652dc4052c06843c3621c11d5b1ab36dcf23e27c79d04abcff4d7c675ccb837da737ad16e889048ae801c48c53074ce82e7b84
-
Filesize
14KB
MD5f071690faf726f76016c501a25b1d7c0
SHA1f55e05ff4a9d0d6b4cacb3f86faefa15893942a5
SHA25683540366921de161dd5f66d4aaa115430955e17a514384b45323309d0f6262aa
SHA512bd802879b345ac3cbb6b0853250d3f42f6f48b72217477fe680fb6451552eb2755aafeaeaadbdb7a751cdcba37bc79a6ee6b05b455c2c5e16601eeb2208eb202
-
Filesize
14KB
MD5b3214dcfa4f402367faa17bca09a419e
SHA100cfed2aad13753a04de80dab24e61cae43b6a97
SHA256bf41679dfc8ee10577c3fcef51fc60fe4b1c901679c1bac2290053fa2b3882e5
SHA51280f3a7fd9fa8121186c2e1367914596c7995b4f564c6479dcf1756c41365bc0d90ede4425d86e9369e0309536018889702dd9e8474e76b3635cceb965d0c5250
-
Filesize
14KB
MD54f4016a93e83f2d8ad8c90e815ec082b
SHA103419a3ddc3b89bf60510610d725834656da1592
SHA256bdc8e5b112d8bbbfbf2e477d23d5a42059c9102e194c2d6f257b06b07e45994e
SHA5124fb05cd9e2ca73548464f0883f6222821baef363b2f34e25e712a8cb17a5fea0508f0ce7f5ee90c5c7c164002c492316ab5e02037a5427378358f188808cdd2d
-
Filesize
14KB
MD572a0d3ed82fe9dc37919581d5e19a0f8
SHA1aa29dbd820e667145c76d05f72a44452e9db9bf7
SHA2564474c17dae9293a4f71ff306780774c090f9351a93ec38cf4cbe3bbde9d198a1
SHA5122523dd2136b5fd99579d54c307755d77146c4f254297499e7c0d98db62a3a6a90396546fd4877f14aa34fd48dbc8c2303ef81f25754170887a379b2cf1e81265
-
Filesize
14KB
MD5ee9f7938ebe008ebdda3407057410b93
SHA10c6a8828c9a10516111a58f47b30dfc6d25f32da
SHA256856d7b63f132dfff60d0ecaca7804ec8cff321db5e96125a6e28250a7856799a
SHA5124538792eadb08d1a332fa3248198911b6b6dee2e2bd64bb410b6dbd195519cc215513731ea8d334ddc88296b19e77a11b0842392978dae3f07f1fbb1031dcf4c