Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 21:40
Static task
static1
Behavioral task
behavioral1
Sample
1c974346f5e3990dd3209045055f63a8_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1c974346f5e3990dd3209045055f63a8_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1c974346f5e3990dd3209045055f63a8_JaffaCakes118.exe
-
Size
3.5MB
-
MD5
1c974346f5e3990dd3209045055f63a8
-
SHA1
4d98867f6bf866ac2664586ab4bb572e91042f6d
-
SHA256
f025cc3a4431fb9fb46a69f7026e6582255dab2cc8a6bd62c1e47d7e4fdecc6c
-
SHA512
1bbbbd6b4d574d6d9dbbf2c92fdf83d81e83a163c3cd653bc56c62609128cc3ed324c0e4d0ae05b16a242f3fe1fa4b4f7349d1df6f603bbffcedf5f413e6d188
-
SSDEEP
49152:v2WQW0fO7IJ8J79hyRAB4o/LY4YmlpB1FEBN/s9dtEW5Wk4mEhewyByV/n89rUlG:uWAED/hce4093BrEBN/YBwtewna9r+tk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 1c974346f5e3990dd3209045055f63a8_JaffaCakes118.tmp -
Executes dropped EXE 2 IoCs
pid Process 3172 1c974346f5e3990dd3209045055f63a8_JaffaCakes118.tmp 2580 rkverify.exe -
Loads dropped DLL 2 IoCs
pid Process 2580 rkverify.exe 3172 1c974346f5e3990dd3209045055f63a8_JaffaCakes118.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe 2580 rkverify.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2388 wrote to memory of 3172 2388 1c974346f5e3990dd3209045055f63a8_JaffaCakes118.exe 81 PID 2388 wrote to memory of 3172 2388 1c974346f5e3990dd3209045055f63a8_JaffaCakes118.exe 81 PID 2388 wrote to memory of 3172 2388 1c974346f5e3990dd3209045055f63a8_JaffaCakes118.exe 81 PID 3172 wrote to memory of 2580 3172 1c974346f5e3990dd3209045055f63a8_JaffaCakes118.tmp 84 PID 3172 wrote to memory of 2580 3172 1c974346f5e3990dd3209045055f63a8_JaffaCakes118.tmp 84 PID 3172 wrote to memory of 2580 3172 1c974346f5e3990dd3209045055f63a8_JaffaCakes118.tmp 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c974346f5e3990dd3209045055f63a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1c974346f5e3990dd3209045055f63a8_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\is-43U22.tmp\1c974346f5e3990dd3209045055f63a8_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-43U22.tmp\1c974346f5e3990dd3209045055f63a8_JaffaCakes118.tmp" /SL5="$601D0,3301952,53248,C:\Users\Admin\AppData\Local\Temp\1c974346f5e3990dd3209045055f63a8_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\is-0OM98.tmp\rkverify.exe"C:\Users\Admin\AppData\Local\Temp\is-0OM98.tmp\rkverify.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2580
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD55ac09190daf249c3e93c3ac961067024
SHA1bad9c0d552d54310f669d66b549dcada90583812
SHA256f4934185f75518a13ef5425959f47516cc8467f513e838a82e749ffb782d7e23
SHA5122a87686c038e8a34f8e04a844726de564a08baeedc87632219b86f455d5222efe2ed7557fad9658627e304d916a75cfcb3c9dede4e72057a070f64370aa52f39
-
Filesize
268KB
MD5020ce95075f8c93e6cc957953d7f4589
SHA1e192a200e36974b8e0637230a8cb5905090f7555
SHA256df9d068202c060a898cd441d5c170686cd9c2774a37cfda3ea10abc428e20ad3
SHA512fb74170ed9b5ee078a176540c198513ed3a8c2e587fbcbf6d2384f840f0b6a2637fd20b6a01b2caf6e92e5f592d517b4733d34fdb349fd770eb04e1eac769170
-
Filesize
669KB
MD552950ac9e2b481453082f096120e355a
SHA1159c09db1abcee9114b4f792ffba255c78a6e6c3
SHA25625fbc88c7c967266f041ae4d47c2eae0b96086f9e440cca10729103aee7ef6cd
SHA5125b61c28bbcaedadb3b6cd3bb8a392d18016c354c4c16e01395930666addc95994333dfc45bea1a1844f6f1585e79c729136d3714ac118b5848becde0bdb182ba