Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 11:04
Static task
static1
Behavioral task
behavioral1
Sample
0dd470c6f38a028c3e868f43d7c98601_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0dd470c6f38a028c3e868f43d7c98601_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0dd470c6f38a028c3e868f43d7c98601_JaffaCakes118.exe
-
Size
697KB
-
MD5
0dd470c6f38a028c3e868f43d7c98601
-
SHA1
e8626b3559ca5ba98b9222645d39aed65ce20a9e
-
SHA256
8645f1bea94d8d6f2f176eb7a3f85a4efe6a61c685f2593d5abf90496fcc789e
-
SHA512
c90eb664d7558c519c1120204d2beeda68d2b87bab8c2d50420ed9500c9aef986ec80b9fc340d6bfdbe5409b89aa1f15279e683c69b3a85cb70c5082ca851d95
-
SSDEEP
12288:onAtofebZ2gup38/Lny+t1tWvIGRSE3HpmxG:oBfQ/28TyMtWDSBxG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\International\Geo\Nation 0dd470c6f38a028c3e868f43d7c98601_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 5012 Searcher_GM-MOD.exe 2044 SinoniaLoader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 1076 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000_Classes\Local Settings rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1512 0dd470c6f38a028c3e868f43d7c98601_JaffaCakes118.exe Token: SeDebugPrivilege 1076 taskkill.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1512 0dd470c6f38a028c3e868f43d7c98601_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1512 wrote to memory of 5012 1512 0dd470c6f38a028c3e868f43d7c98601_JaffaCakes118.exe 84 PID 1512 wrote to memory of 5012 1512 0dd470c6f38a028c3e868f43d7c98601_JaffaCakes118.exe 84 PID 1512 wrote to memory of 5012 1512 0dd470c6f38a028c3e868f43d7c98601_JaffaCakes118.exe 84 PID 1512 wrote to memory of 2044 1512 0dd470c6f38a028c3e868f43d7c98601_JaffaCakes118.exe 85 PID 1512 wrote to memory of 2044 1512 0dd470c6f38a028c3e868f43d7c98601_JaffaCakes118.exe 85 PID 1512 wrote to memory of 2044 1512 0dd470c6f38a028c3e868f43d7c98601_JaffaCakes118.exe 85 PID 2044 wrote to memory of 1076 2044 SinoniaLoader.exe 86 PID 2044 wrote to memory of 1076 2044 SinoniaLoader.exe 86 PID 2044 wrote to memory of 1076 2044 SinoniaLoader.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\0dd470c6f38a028c3e868f43d7c98601_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0dd470c6f38a028c3e868f43d7c98601_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\Searcher_GM-MOD.exe"C:\Users\Admin\AppData\Local\Temp\Searcher_GM-MOD.exe"2⤵
- Executes dropped EXE
PID:5012
-
-
C:\Users\Admin\AppData\Local\Temp\SinoniaLoader.exe"C:\Users\Admin\AppData\Local\Temp\SinoniaLoader.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f /im gbpsv.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1076
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\FirewallControlPanel.dll,ShowWarningDialog "C:\Users\Admin\AppData\Local\Temp\0dd470c6f38a028c3e868f43d7c98601_JaffaCakes118.exe"1⤵
- Modifies registry class
PID:3120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
612KB
MD57c20baf6618de98abaa9f02aba052e65
SHA1219a40030343dddefee4409d419ded6330f565a1
SHA2562d730895e7357af2baaf7c17c0c4ff3c3813afce98c546500565f750cc3773b0
SHA512592e272ab515d3e0ef300de46b6090fabd02833c6c6e5a41671478f99c8388cec99a6651361c0edb9ab49d1f5c154e75d321010a3b335b1fa5cd2d39d0b84e14
-
Filesize
41KB
MD519a80e157bcd70fc3487737ddac75f3a
SHA14d41d4e43dc542c7d707f3340aebe4842fada731
SHA25669c535c09928c62460a0787f91380c0116bf7a7d45b96806dab621cc3286c1c9
SHA51222ee04c95d3a4b8d713028b96d1ae8d9eb91b1428943f6912b9157eceb546bd8d3a7fef8282d982bd3e11fca50bd6c326ebc99c6afdec72b336cd6a8c4c10186