Analysis
-
max time kernel
130s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 03:33
Static task
static1
Behavioral task
behavioral1
Sample
18a15ee4a5bf899e48ef481d8f48437b_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
18a15ee4a5bf899e48ef481d8f48437b_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
18a15ee4a5bf899e48ef481d8f48437b_JaffaCakes118.exe
-
Size
984KB
-
MD5
18a15ee4a5bf899e48ef481d8f48437b
-
SHA1
9f64797d2393edf76fcb9c07d7c2d4a6e54bd422
-
SHA256
de4dff738072a634b37b86d5ecd4409f00974cd64498288f85cb1fffe15ca2ee
-
SHA512
ec9ec1a9759529e1a57d000ffb47e3715649835b863e63e6fc85b0d4d759494888ee71ebb625fe7c41144bbd005adfb79fb9913ce040194d05f930aebe5dc476
-
SSDEEP
12288:gLCS+qQ6Le8SP7J4pL4ij3MqdmZTWzwLqPj3MqdmZTWzwLqCoKJW:4Qn3mLvL2TjLqrL2TjLqM
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\International\Geo\Nation 18a15ee4a5bf899e48ef481d8f48437b_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\International\Geo\Nation 2.exe -
Executes dropped EXE 4 IoCs
pid Process 2112 1.exe 3916 2.exe 5056 J9R9He.exe 640 J9R9He.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5056 set thread context of 640 5056 J9R9He.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 2556 640 WerFault.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3916 2.exe 5056 J9R9He.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3484 wrote to memory of 2112 3484 18a15ee4a5bf899e48ef481d8f48437b_JaffaCakes118.exe 91 PID 3484 wrote to memory of 2112 3484 18a15ee4a5bf899e48ef481d8f48437b_JaffaCakes118.exe 91 PID 3484 wrote to memory of 3916 3484 18a15ee4a5bf899e48ef481d8f48437b_JaffaCakes118.exe 92 PID 3484 wrote to memory of 3916 3484 18a15ee4a5bf899e48ef481d8f48437b_JaffaCakes118.exe 92 PID 3484 wrote to memory of 3916 3484 18a15ee4a5bf899e48ef481d8f48437b_JaffaCakes118.exe 92 PID 3916 wrote to memory of 5056 3916 2.exe 93 PID 3916 wrote to memory of 5056 3916 2.exe 93 PID 3916 wrote to memory of 5056 3916 2.exe 93 PID 5056 wrote to memory of 640 5056 J9R9He.exe 94 PID 5056 wrote to memory of 640 5056 J9R9He.exe 94 PID 5056 wrote to memory of 640 5056 J9R9He.exe 94 PID 5056 wrote to memory of 640 5056 J9R9He.exe 94 PID 5056 wrote to memory of 640 5056 J9R9He.exe 94 PID 5056 wrote to memory of 640 5056 J9R9He.exe 94 PID 5056 wrote to memory of 640 5056 J9R9He.exe 94 PID 5056 wrote to memory of 640 5056 J9R9He.exe 94 PID 5056 wrote to memory of 640 5056 J9R9He.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\18a15ee4a5bf899e48ef481d8f48437b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\18a15ee4a5bf899e48ef481d8f48437b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵
- Executes dropped EXE
PID:2112
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\J9R9He.exe"C:\Users\Admin\AppData\Local\Temp\J9R9He.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\J9R9He.exe"C:\Users\Admin\AppData\Local\Temp\J9R9He.exe"4⤵
- Executes dropped EXE
PID:640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 3085⤵
- Program crash
PID:2556
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 640 -ip 6401⤵PID:3884
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4236,i,1400471177590024469,587385956640537806,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:81⤵PID:4124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
511KB
MD5b865767be273a4b1576aa331341d8d70
SHA1dfe05304d4ae10098da13b39f7b8f38dd2fbad4a
SHA256e755b7cb542126f83c0647205a21a98f9c90265e68307f6a5ab2f26671a6c01d
SHA5126ade746e9945a28cceb1c4e2a6f1aa833c86fe3e5c77ecc28c6983e72819d9d5617cc492930f86224364063548972f723d66ea8b44c5928475f79c41e2cd63bc
-
Filesize
332KB
MD5389c696ef3f1c33bf5c72fc037bc925a
SHA1eae6a95218de680108cfb8f4c0aa01520421b3bf
SHA256ac7e98bc5e43e88c12b7083684dedc4d8636ff7a815341ad6d52b8ceb1f3fc50
SHA5129e636f447422a4d611de4fa26a741d78677b61cabe8219ca9385a2f520369255c345fd3b731dea6e18d1b3dacb25009ebd3cab653a006c41d69459a81d242b32
-
Filesize
112KB
MD5f5fa69d30406fe5cd89bb9c559703399
SHA157114f7755e028d2dfe1415f5f15a40ec48b3a2d
SHA2564a7683ba19e99f250508b1ce491c1d14bf9bee751b96264b4ac5b9d832f56842
SHA512fbfb3844ab5168c57fb142520a95b14e228950d1f6780198c1336da992cb8166c33df6f9181c831bc821ec17963e1e3bdaa75d6a2e67dee68223077f0bc59d5e