Analysis
-
max time kernel
150s -
max time network
83s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2024 18:29
Behavioral task
behavioral1
Sample
12fa601e1afdc16b2a2b187fbdd123fd_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
12fa601e1afdc16b2a2b187fbdd123fd_JaffaCakes118.exe
-
Size
535KB
-
MD5
12fa601e1afdc16b2a2b187fbdd123fd
-
SHA1
4d0dc330c85aa3a5a9f0d25ef603bf371a010cb3
-
SHA256
281bebebebb58c2b7427630794e7fc89e55e20befe5c161cd13d08e938c02c8a
-
SHA512
bbac40f7309db38bea9e883e4c2e7d7c8da719eea158e42ec952e8015ca26fa8feb30602cfcca4c14aef7617d5fabb74b7f69f8141eb53f00096f49407d781a9
-
SSDEEP
12288:cdBNKTCqqwXCcdgTw9+MvA+BisqYpxHte1oS2Q:cLjQC+bs0YOQ
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
12fa601e1afdc16b2a2b187fbdd123fd_JaffaCakes118.exemuxek.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 12fa601e1afdc16b2a2b187fbdd123fd_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation muxek.exe -
Executes dropped EXE 2 IoCs
Processes:
muxek.exewuybp.exepid process 1148 muxek.exe 4500 wuybp.exe -
Processes:
resource yara_rule behavioral2/memory/2508-0-0x0000000000400000-0x000000000048B000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\muxek.exe upx behavioral2/memory/1148-11-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/2508-14-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/1148-17-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/1148-26-0x0000000000400000-0x000000000048B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
wuybp.exepid process 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe 4500 wuybp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
12fa601e1afdc16b2a2b187fbdd123fd_JaffaCakes118.exemuxek.exedescription pid process target process PID 2508 wrote to memory of 1148 2508 12fa601e1afdc16b2a2b187fbdd123fd_JaffaCakes118.exe muxek.exe PID 2508 wrote to memory of 1148 2508 12fa601e1afdc16b2a2b187fbdd123fd_JaffaCakes118.exe muxek.exe PID 2508 wrote to memory of 1148 2508 12fa601e1afdc16b2a2b187fbdd123fd_JaffaCakes118.exe muxek.exe PID 2508 wrote to memory of 5024 2508 12fa601e1afdc16b2a2b187fbdd123fd_JaffaCakes118.exe cmd.exe PID 2508 wrote to memory of 5024 2508 12fa601e1afdc16b2a2b187fbdd123fd_JaffaCakes118.exe cmd.exe PID 2508 wrote to memory of 5024 2508 12fa601e1afdc16b2a2b187fbdd123fd_JaffaCakes118.exe cmd.exe PID 1148 wrote to memory of 4500 1148 muxek.exe wuybp.exe PID 1148 wrote to memory of 4500 1148 muxek.exe wuybp.exe PID 1148 wrote to memory of 4500 1148 muxek.exe wuybp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12fa601e1afdc16b2a2b187fbdd123fd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\12fa601e1afdc16b2a2b187fbdd123fd_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\muxek.exe"C:\Users\Admin\AppData\Local\Temp\muxek.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\wuybp.exe"C:\Users\Admin\AppData\Local\Temp\wuybp.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_uinsey.batFilesize
304B
MD59c177c2ed7692215957e301c07f95148
SHA11cccea2816ef2844d7cc493096b3f210616ccbba
SHA256ccff050ebca619fb7ffe8b40a9da8c8338e0504afd5c69c956063e6cbe576e0f
SHA512445c367b1dab53bcfe5fb8c16414e132398c765e7e803f84b593521a42ef0a36d1880e6694f328bc9a34eb69396f7a21b21c1301f3ff30bfd86b98e6824417ec
-
C:\Users\Admin\AppData\Local\Temp\golfinfo.iniFilesize
512B
MD5cd4a7cf04140873e78de0b03a13d3d7d
SHA11a7178437f8af62adc906ba9330e3023359293ac
SHA256d1195b933bffaa4e5a4e382689adddd9516db723c8eae02825a459e42ffa09c2
SHA512b814a79f4659c917edf340593c8bc214c016cb688e132ae5d1addf25be0174375325e0f9902d0f56a2b25955d9ebedb41f9fb04d09c7d388170379914df3f649
-
C:\Users\Admin\AppData\Local\Temp\muxek.exeFilesize
535KB
MD5ae0273b68eec9402e2e7fcdb136a2a56
SHA14b5b062bfa4342d1eab359cb2a38e2ae3ea3496f
SHA2563b458fb90963cc880e5f1e56556e9a472f2ff7d9eac5273c2997b4baacc8ff09
SHA512ec125dab6f5471be9fc7544dc18258ee00bd09cc32d6058b1258b30eec6507f23143f17abd3641f35c3f222bc9dbf963d76bc313add0b0f5657618a55067dd81
-
C:\Users\Admin\AppData\Local\Temp\wuybp.exeFilesize
241KB
MD5cd8edc46b8e6ba49ecb6a6b7b12799ab
SHA13238b7f3c15cfe10569aa6461c3353b15aea4ce4
SHA256d3ed8ac12ad9edb9b04f4a0d8270e4410f796fa9371a1e841aec9adcac554dbb
SHA51256564d888a15de3102169d57d1c87d021c747c568b1767179ab56709af6cebf8a738485b119fdde0e842135c2afbae6770d4368379524041ad680e0abe4ae159
-
memory/1148-26-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1148-17-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1148-11-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/2508-14-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/2508-0-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/4500-28-0x0000000000720000-0x0000000000721000-memory.dmpFilesize
4KB
-
memory/4500-27-0x0000000000B40000-0x0000000000BF6000-memory.dmpFilesize
728KB
-
memory/4500-30-0x0000000000B40000-0x0000000000BF6000-memory.dmpFilesize
728KB
-
memory/4500-31-0x0000000000B40000-0x0000000000BF6000-memory.dmpFilesize
728KB
-
memory/4500-32-0x0000000000B40000-0x0000000000BF6000-memory.dmpFilesize
728KB
-
memory/4500-33-0x0000000000B40000-0x0000000000BF6000-memory.dmpFilesize
728KB
-
memory/4500-34-0x0000000000B40000-0x0000000000BF6000-memory.dmpFilesize
728KB