Analysis
-
max time kernel
148s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 10:11
Static task
static1
Behavioral task
behavioral1
Sample
0dad0c6429468124a48228944011ab55_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0dad0c6429468124a48228944011ab55_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0dad0c6429468124a48228944011ab55_JaffaCakes118.exe
-
Size
7KB
-
MD5
0dad0c6429468124a48228944011ab55
-
SHA1
c0722e1c36fbc95eff262952a07a1fe38b38b40b
-
SHA256
5c49d33bebff5bc7bfa27b85a99065792fc8a2a663c495a59185a552d2f2ec32
-
SHA512
7c2675d36a6e5fe8cfdafef41a5da6c2ce8394d861576b4128f1607138e6e26f7df6ad4a228cfab2aedb593884ec22605781fc8c57715930c066f30d1e1e8465
-
SSDEEP
192:aS85Zl/9KzgoZk7jkWt9dyyYU/lYwEJiD:QB18zZMddyyYUdYwiA
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation 0dad0c6429468124a48228944011ab55_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msnmager = "C:\\Windows\\system32\\rundll32.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\ichcbc.dll,Set1" 0dad0c6429468124a48228944011ab55_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3192 wrote to memory of 4964 3192 0dad0c6429468124a48228944011ab55_JaffaCakes118.exe 83 PID 3192 wrote to memory of 4964 3192 0dad0c6429468124a48228944011ab55_JaffaCakes118.exe 83 PID 3192 wrote to memory of 4964 3192 0dad0c6429468124a48228944011ab55_JaffaCakes118.exe 83 PID 3192 wrote to memory of 1560 3192 0dad0c6429468124a48228944011ab55_JaffaCakes118.exe 84 PID 3192 wrote to memory of 1560 3192 0dad0c6429468124a48228944011ab55_JaffaCakes118.exe 84 PID 3192 wrote to memory of 1560 3192 0dad0c6429468124a48228944011ab55_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\0dad0c6429468124a48228944011ab55_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0dad0c6429468124a48228944011ab55_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\ichcbc.dll,Set12⤵PID:4964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\d.bat" "2⤵PID:1560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5bd6e2760d624d85ac35811959cac7d19
SHA1a6c0f5fc3821cf24cb69c68b64356a15fd96f32e
SHA256f78378c8080088d391fcf0db618d6214f206c8f5cc4b6b3588e6ca8ad5c442ad
SHA512ad3cae2fcc68fe33829c234b29ae592d253c0102a69038610ea015c5761e7ff8fe3beecd172d7e3b81e796a57d05b73b5791ae1702edded1c76a7a1337adfc7c
-
Filesize
9B
MD51f1f78ba0b98e90a846613acac01651c
SHA1d03c4441d921b02eea4737f72b4cf4639fb578e2
SHA2561ff7ed940bfcae7ede9379da47905c1dc7f6ea65a15260525d192a56883cdb95
SHA51253c5447a830a9a710dc82cc27dfc661de727f1d09c3ca803144246d8828aa333d112f47153432a0b2b9dbd15e2840d4cc7763d7524537298ebde2c00904ab7d8