Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
167895353a6604de58f25c04411d1b28_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
167895353a6604de58f25c04411d1b28_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
167895353a6604de58f25c04411d1b28_JaffaCakes118.exe
-
Size
27KB
-
MD5
167895353a6604de58f25c04411d1b28
-
SHA1
5951d5cc08421c4983395b05bddc93e5c406a06a
-
SHA256
9986fa3c2ada87724d8c196ea39750995f5f6aba7e990c0247f4a02622ff6718
-
SHA512
9932aa7fa03459d20c8d6d154abf59e9c0fbc5f8ad28c050903d8d99664da0d0e759b26e5a62469ef7a0352434fd506c005d0454bd7899447020d5c3aa97c766
-
SSDEEP
384:1Cv8NjS0wMfm4ZXJZyDs4C/6MyKzlX0t5SFMGDeMElby9V1vvz:SIOEotLR8NHDrpvb
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 167895353a6604de58f25c04411d1b28_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1392 decrypted.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4444 167895353a6604de58f25c04411d1b28_JaffaCakes118.exe 1392 decrypted.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4444 wrote to memory of 1392 4444 167895353a6604de58f25c04411d1b28_JaffaCakes118.exe 81 PID 4444 wrote to memory of 1392 4444 167895353a6604de58f25c04411d1b28_JaffaCakes118.exe 81 PID 4444 wrote to memory of 1392 4444 167895353a6604de58f25c04411d1b28_JaffaCakes118.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\167895353a6604de58f25c04411d1b28_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\167895353a6604de58f25c04411d1b28_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\decrypted.exe"C:\Users\Admin\AppData\Local\Temp\decrypted.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD506e439cdc92d96d540f4ea5c3afd34d3
SHA18b951912ceff29f0f6454a602a8078e6db65a9a7
SHA256f0d55d102598718ef3fa76f54b3eecca484d03e251ab64990e9dd3ce0798e9ed
SHA5123a7ed6805a662829c32d19f29e5fbf97c645735d775bc18d96e13c57ff788ba27e3b36afc46bcdc940e6c74ed06f26067a0cdb17a24c2ef09c9c599ff02caa31