Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 13:06
Static task
static1
Behavioral task
behavioral1
Sample
0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe
-
Size
170KB
-
MD5
0e2f6a22fb2c1ee834e3bb94a17fd98e
-
SHA1
17963e95dc4076646a867ced2923b83b3f4d9391
-
SHA256
e0e9b2c08708db4d612eab542b25d89fa9c96737278650b25799c72b394754af
-
SHA512
442326bf359037f1433fb391eefdfc048ab46ed3f19109cd8d5318b0e9d43f09bed055cbf28704b92cce7c76b721b62f6bc50546ed3577235428ba8de68e26a3
-
SSDEEP
3072:+yyL6e5KJOUM8GXLimIm+lLUntmwRYHPesOZUI5upr6rxE:+rWe8oiGUir5tm
Malware Config
Extracted
tofsee
64.20.54.234
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
Processes:
aldymb.exealdymb.exepid process 2652 aldymb.exe 2868 aldymb.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\aldymb.exe\" /r" 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exealdymb.exealdymb.exedescription pid process target process PID 1340 set thread context of 1148 1340 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe PID 2652 set thread context of 2868 2652 aldymb.exe aldymb.exe PID 2868 set thread context of 2156 2868 aldymb.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 364 2156 WerFault.exe svchost.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exealdymb.exealdymb.exedescription pid process target process PID 1340 wrote to memory of 1148 1340 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe PID 1340 wrote to memory of 1148 1340 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe PID 1340 wrote to memory of 1148 1340 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe PID 1340 wrote to memory of 1148 1340 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe PID 1340 wrote to memory of 1148 1340 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe PID 1340 wrote to memory of 1148 1340 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe PID 1340 wrote to memory of 1148 1340 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe PID 1340 wrote to memory of 1148 1340 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe PID 1148 wrote to memory of 2652 1148 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe aldymb.exe PID 1148 wrote to memory of 2652 1148 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe aldymb.exe PID 1148 wrote to memory of 2652 1148 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe aldymb.exe PID 2652 wrote to memory of 2868 2652 aldymb.exe aldymb.exe PID 2652 wrote to memory of 2868 2652 aldymb.exe aldymb.exe PID 2652 wrote to memory of 2868 2652 aldymb.exe aldymb.exe PID 2652 wrote to memory of 2868 2652 aldymb.exe aldymb.exe PID 2652 wrote to memory of 2868 2652 aldymb.exe aldymb.exe PID 2652 wrote to memory of 2868 2652 aldymb.exe aldymb.exe PID 2652 wrote to memory of 2868 2652 aldymb.exe aldymb.exe PID 2652 wrote to memory of 2868 2652 aldymb.exe aldymb.exe PID 2868 wrote to memory of 2156 2868 aldymb.exe svchost.exe PID 2868 wrote to memory of 2156 2868 aldymb.exe svchost.exe PID 2868 wrote to memory of 2156 2868 aldymb.exe svchost.exe PID 2868 wrote to memory of 2156 2868 aldymb.exe svchost.exe PID 2868 wrote to memory of 2156 2868 aldymb.exe svchost.exe PID 1148 wrote to memory of 3956 1148 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe cmd.exe PID 1148 wrote to memory of 3956 1148 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe cmd.exe PID 1148 wrote to memory of 3956 1148 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\aldymb.exe"C:\Users\Admin\aldymb.exe" /r3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\aldymb.exe"C:\Users\Admin\aldymb.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:2156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 3206⤵
- Program crash
PID:364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4167.bat" "3⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2156 -ip 21561⤵PID:1240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD50f1b739d6ddd0c30b87289281bf22b9f
SHA1263b16cafcf98e33fd6b280398a98a274162bf2f
SHA256c0dfc6e415eb41d361a9a3f3406b8739486af27558de225f9b7ff121ae21b0bb
SHA51223d168dc8a712030cbf08226198dd1952b20342835f0cb4f9f214613efb01d70185facf17aeeca40fecc7c289459fac50dd0a9fdb63b9512ba13101d8d6fe850
-
Filesize
170KB
MD50e2f6a22fb2c1ee834e3bb94a17fd98e
SHA117963e95dc4076646a867ced2923b83b3f4d9391
SHA256e0e9b2c08708db4d612eab542b25d89fa9c96737278650b25799c72b394754af
SHA512442326bf359037f1433fb391eefdfc048ab46ed3f19109cd8d5318b0e9d43f09bed055cbf28704b92cce7c76b721b62f6bc50546ed3577235428ba8de68e26a3