Analysis
-
max time kernel
142s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 17:59
Static task
static1
Behavioral task
behavioral1
Sample
1bf6e5cf12a45138dae632ad05ab08c6_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1bf6e5cf12a45138dae632ad05ab08c6_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1bf6e5cf12a45138dae632ad05ab08c6_JaffaCakes118.exe
-
Size
687KB
-
MD5
1bf6e5cf12a45138dae632ad05ab08c6
-
SHA1
0e5c731ac4e592c329d2b0a2bd1b2ac65a5da34b
-
SHA256
86173557394f3db9f0190ba38d9229ab2f93721c01b67a080af58b168c434442
-
SHA512
1b8e1123799a567096f5f4fc45c665658db82efda9629440a509480d83cfed3e86a332fd5089320d91622a135d7b7ed53011d345f05d2e7d7d87eefe6d26d81c
-
SSDEEP
12288:6GcoX95w5KwZgSCP70sZvqmBG0qLAWmhuKf3Smw+VInXDcTTYLG:0aDw5S34x6GaHuKf3l5V6cTTYS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\International\Geo\Nation 1bf6e5cf12a45138dae632ad05ab08c6_JaffaCakes118.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe 1bf6e5cf12a45138dae632ad05ab08c6_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4636 scvhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3588 wrote to memory of 4636 3588 1bf6e5cf12a45138dae632ad05ab08c6_JaffaCakes118.exe 92 PID 3588 wrote to memory of 4636 3588 1bf6e5cf12a45138dae632ad05ab08c6_JaffaCakes118.exe 92 PID 3588 wrote to memory of 4636 3588 1bf6e5cf12a45138dae632ad05ab08c6_JaffaCakes118.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bf6e5cf12a45138dae632ad05ab08c6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1bf6e5cf12a45138dae632ad05ab08c6_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe"2⤵
- Executes dropped EXE
PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4268,i,11069752405888604640,8928124405695604965,262144 --variations-seed-version --mojo-platform-channel-handle=4164 /prefetch:81⤵PID:1836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
546KB
MD5d325c1bdcedcc6e1ea859f9722eff22d
SHA100fcd08ef0653a02d9475c0cf7ba7f504218ae28
SHA25671a43fcc36337a54fe6b7c43c9111b1e7dd45fa82493eadf08a22857584f5e73
SHA512268af78f7758095eec05d29c49b0e69cd2ecf0a275822c97b0592e98c8a97d4b7c58de1baea15bfeb440d1b78a6fd774a1a8c14647720cd0129bac17aea48bb7