Analysis
-
max time kernel
125s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 14:25
Static task
static1
Behavioral task
behavioral1
Sample
165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe
-
Size
32KB
-
MD5
165424cd6c1aecf9cee9d38ee8e95233
-
SHA1
04041a854d4d5e8d05d16fd7438a5ad9ee1d871b
-
SHA256
e74ed7ccc7fb53bafb714695c3c67125a3d157f5f64712cedea50e198ea724bc
-
SHA512
8d704027d4ac589d95fc297b2afcae158ad9f2659b9186f3048bd4493d24b3660fafac39b85cc200128c672fccbcbf28a407469b50446802a56f27503af23a73
-
SSDEEP
384:Xcr9KZurWZKuYAWwRJ64XNLYtKi/TE+kOjk0Un1pDhHugvdukDGSne74:XsewJU649LYKr+Un1ugvE+Be7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2492 tasklist.exe 4744 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4744 tasklist.exe Token: SeDebugPrivilege 2492 tasklist.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 780 165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe 780 165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 780 wrote to memory of 1832 780 165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe 99 PID 780 wrote to memory of 1832 780 165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe 99 PID 780 wrote to memory of 1832 780 165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe 99 PID 780 wrote to memory of 400 780 165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe 101 PID 780 wrote to memory of 400 780 165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe 101 PID 780 wrote to memory of 400 780 165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe 101 PID 1832 wrote to memory of 2492 1832 cmd.exe 103 PID 1832 wrote to memory of 2492 1832 cmd.exe 103 PID 1832 wrote to memory of 2492 1832 cmd.exe 103 PID 400 wrote to memory of 4744 400 cmd.exe 104 PID 400 wrote to memory of 4744 400 cmd.exe 104 PID 400 wrote to memory of 4744 400 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.com2⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 165424cd6c1aecf9cee9d38ee8e95233_JaffaCakes118.exe2⤵
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4040,i,5711962389779687290,1245653010537220991,262144 --variations-seed-version --mojo-platform-channel-handle=4080 /prefetch:81⤵PID:3688