Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe
-
Size
132KB
-
MD5
0e607cc6c389e4e06066a2a2d5bcb0ee
-
SHA1
9634eb6900f7fbdb2af389edc26127ce1f91b37b
-
SHA256
6c375eb497a389313ca6a9d86600e24b03e9e3f4c1b2cbb94f90c927106dabd9
-
SHA512
ac2cc064429c4691d8f15c8e3bc5a17c66e8614d99885b15320039773a04b9d3d2177242159b317ba3c7ed319f4eb9f2711a05241df1ffc498c306dea5bcf72d
-
SSDEEP
768:Le3DeC08mMlc101WORuBtVK3J5hKTUbF6VyE6MBHYd/90XMQpPDch6J94znByfTa:C3DJmEzbuBHW08GO6J9onkS2l42qS8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1628 winlogon.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Windows\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Windows\\winlogon.exe" winlogon.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\winlogon.exe 0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe File created C:\Windows\winlogon.exe winlogon.exe File created C:\Windows\winlogon.exe 0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe 1628 winlogon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4600 0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe 4600 0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe 1628 winlogon.exe 1628 winlogon.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4600 wrote to memory of 1628 4600 0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe 80 PID 4600 wrote to memory of 1628 4600 0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe 80 PID 4600 wrote to memory of 1628 4600 0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\winlogon.exe"C:\Windows\winlogon.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD50e607cc6c389e4e06066a2a2d5bcb0ee
SHA19634eb6900f7fbdb2af389edc26127ce1f91b37b
SHA2566c375eb497a389313ca6a9d86600e24b03e9e3f4c1b2cbb94f90c927106dabd9
SHA512ac2cc064429c4691d8f15c8e3bc5a17c66e8614d99885b15320039773a04b9d3d2177242159b317ba3c7ed319f4eb9f2711a05241df1ffc498c306dea5bcf72d