Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 13:15
Behavioral task
behavioral1
Sample
1b70124415d1c3b32bbc9fa082c6943c_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1b70124415d1c3b32bbc9fa082c6943c_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1b70124415d1c3b32bbc9fa082c6943c_JaffaCakes118.exe
-
Size
1000KB
-
MD5
1b70124415d1c3b32bbc9fa082c6943c
-
SHA1
46d20d3184f7140fb80a78fc0368d7c1d2b1e78a
-
SHA256
74b5caa560f8857431df58a21b85880e07c2e06d84fbb3a327c1add7e6b21495
-
SHA512
73ac06f95e36200b1b0153b278afe0cdb9b12497e57f166a9277187ab1542cf0d88d93c479862857fe0bf7504dbebb1067c947e806749d1b641559111e5978c7
-
SSDEEP
12288:UIu9pb7QlUDrNMc3a46A9jmP/uhu/yMS08CkntxYRv:HuDbaurNtFfmP/UDMS08Ckn3q
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2652 mspaint.exe 2652 mspaint.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 5108 1b70124415d1c3b32bbc9fa082c6943c_JaffaCakes118.exe 5108 1b70124415d1c3b32bbc9fa082c6943c_JaffaCakes118.exe 5108 1b70124415d1c3b32bbc9fa082c6943c_JaffaCakes118.exe 2652 mspaint.exe 2652 mspaint.exe 2652 mspaint.exe 2652 mspaint.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5108 wrote to memory of 3820 5108 1b70124415d1c3b32bbc9fa082c6943c_JaffaCakes118.exe 84 PID 5108 wrote to memory of 3820 5108 1b70124415d1c3b32bbc9fa082c6943c_JaffaCakes118.exe 84 PID 5108 wrote to memory of 3820 5108 1b70124415d1c3b32bbc9fa082c6943c_JaffaCakes118.exe 84 PID 3820 wrote to memory of 2652 3820 cmd.exe 86 PID 3820 wrote to memory of 2652 3820 cmd.exe 86 PID 3820 wrote to memory of 2652 3820 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b70124415d1c3b32bbc9fa082c6943c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1b70124415d1c3b32bbc9fa082c6943c_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\Receipt.bmp2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\Receipt.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2652
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:2416