Analysis
-
max time kernel
147s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 20:57
Static task
static1
Behavioral task
behavioral1
Sample
177eb68cc4f405e5a89c4a0867b738fb_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
177eb68cc4f405e5a89c4a0867b738fb_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
177eb68cc4f405e5a89c4a0867b738fb_JaffaCakes118.exe
-
Size
390KB
-
MD5
177eb68cc4f405e5a89c4a0867b738fb
-
SHA1
fa0daae7e6db8a56aca0d9bcd0e9673b45946186
-
SHA256
ba83afde097acfbcf72a83c12fd8c58639ddf165ab0134f194e70549b1cdf891
-
SHA512
f27297df6c8cd4dc587461623e1faa34dc183162d3b5681c25d7ccd650fd46bdd64f512e4537acb01cbb01c3fc72fa1e2692bf8f55e5fbf39775da89068310d7
-
SSDEEP
3072:1oWoaYMS7k7YS+OZVsrKmrBAf7qcbPmNfq/b3hDHAwE4aJaMkynQssssssDssssY:1O6wOZVYWD7PmRq/Bw55
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 177eb68cc4f405e5a89c4a0867b738fb_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 552 service.exe 4936 service.exe 4852 service.exe -
resource yara_rule behavioral2/memory/4936-20-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4936-23-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4936-24-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4936-33-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\service.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svhost.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\svhost.exe\"䜀" service.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svhost.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\svhost.exe\"䜀" service.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 552 set thread context of 4936 552 service.exe 86 PID 4936 set thread context of 4852 4936 service.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4852 service.exe 4852 service.exe 4852 service.exe 4852 service.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 792 177eb68cc4f405e5a89c4a0867b738fb_JaffaCakes118.exe 552 service.exe 4936 service.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 792 wrote to memory of 3560 792 177eb68cc4f405e5a89c4a0867b738fb_JaffaCakes118.exe 81 PID 792 wrote to memory of 3560 792 177eb68cc4f405e5a89c4a0867b738fb_JaffaCakes118.exe 81 PID 792 wrote to memory of 3560 792 177eb68cc4f405e5a89c4a0867b738fb_JaffaCakes118.exe 81 PID 3560 wrote to memory of 4496 3560 cmd.exe 84 PID 3560 wrote to memory of 4496 3560 cmd.exe 84 PID 3560 wrote to memory of 4496 3560 cmd.exe 84 PID 792 wrote to memory of 552 792 177eb68cc4f405e5a89c4a0867b738fb_JaffaCakes118.exe 85 PID 792 wrote to memory of 552 792 177eb68cc4f405e5a89c4a0867b738fb_JaffaCakes118.exe 85 PID 792 wrote to memory of 552 792 177eb68cc4f405e5a89c4a0867b738fb_JaffaCakes118.exe 85 PID 552 wrote to memory of 4936 552 service.exe 86 PID 552 wrote to memory of 4936 552 service.exe 86 PID 552 wrote to memory of 4936 552 service.exe 86 PID 552 wrote to memory of 4936 552 service.exe 86 PID 552 wrote to memory of 4936 552 service.exe 86 PID 552 wrote to memory of 4936 552 service.exe 86 PID 552 wrote to memory of 4936 552 service.exe 86 PID 552 wrote to memory of 4936 552 service.exe 86 PID 4936 wrote to memory of 4852 4936 service.exe 87 PID 4936 wrote to memory of 4852 4936 service.exe 87 PID 4936 wrote to memory of 4852 4936 service.exe 87 PID 4936 wrote to memory of 4852 4936 service.exe 87 PID 4936 wrote to memory of 4852 4936 service.exe 87 PID 4936 wrote to memory of 4852 4936 service.exe 87 PID 4936 wrote to memory of 4852 4936 service.exe 87 PID 4936 wrote to memory of 4852 4936 service.exe 87 PID 4936 wrote to memory of 4852 4936 service.exe 87 PID 4852 wrote to memory of 3564 4852 service.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\177eb68cc4f405e5a89c4a0867b738fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\177eb68cc4f405e5a89c4a0867b738fb_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240605750.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Microsoft" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\service.exe" /f4⤵
- Adds Run key to start application
PID:4496
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\service.exe"C:\Users\Admin\AppData\Roaming\Microsoft\service.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Roaming\Microsoft\service.exeC:\Users\Admin\AppData\Roaming\Microsoft\service.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Roaming\Microsoft\service.exe
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4852
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146B
MD57eee65b102f30fd1ead48a8cd3b99827
SHA12f74a754019f280c6186c11531d460006814952e
SHA2565748c60056db288b67e61148b339778816279e36907977f4fe03b5df04f6b57f
SHA512a06de9e35ada579a95b2ba399e4c65b074d642788d456e10e0ae967896ac729c552f715261d9dc8c17fffca8d6b9144a6155ff11ab8569a82bdbd9d26109bd85
-
Filesize
390KB
MD51fcf9e0a07bca953372b2b6e23a916e1
SHA164bef037a77c13f7146ce297b5716a573cf6206b
SHA256ce99ebeab8fdd9d0258bda074206014e29f6233d4309b7c6b835a47db8798be2
SHA51213cdaa6e9ef3ba2b0871dda52191f4c58753b263d88d3466ea5906a67af986b58a7e37a8a898138ca7f994d9d0ded805c0846a05da582e982d0585c63677fb01