Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 19:58
Behavioral task
behavioral1
Sample
1c4f9ab1b4226ce6e308662f208aab6b_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
1c4f9ab1b4226ce6e308662f208aab6b_JaffaCakes118.exe
-
Size
463KB
-
MD5
1c4f9ab1b4226ce6e308662f208aab6b
-
SHA1
1ad72fd01dbb77dec2ec764acc4bfd1f9da6eab0
-
SHA256
8d6f452ae1f250035af51fdc1e21fd6c7691a64cf2e19726062715eb17390fbf
-
SHA512
06be07be62cb8d68049a73a654a3576ca8c59f977119a8f3ecec13e5967c235cec6d335c548d2a23b54146b186c4a655c8e2c3b16c5d7ea239ac07dced76ce1c
-
SSDEEP
12288:Y6twjLHj/8/GcHUIdPPzEmvTnabAh0ZnAr1UL:Y6tQCG0UUPzEkTn4AC1+s
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1c4f9ab1b4226ce6e308662f208aab6b_JaffaCakes118.exefoarm.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation 1c4f9ab1b4226ce6e308662f208aab6b_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation foarm.exe -
Executes dropped EXE 2 IoCs
Processes:
foarm.exeyvpeg.exepid process 2524 foarm.exe 1020 yvpeg.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\yvpeg.exe upx behavioral2/memory/1020-25-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/1020-28-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/1020-29-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/1020-30-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/1020-31-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/1020-32-0x0000000000400000-0x000000000049F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
yvpeg.exepid process 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe 1020 yvpeg.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
1c4f9ab1b4226ce6e308662f208aab6b_JaffaCakes118.exefoarm.exedescription pid process target process PID 412 wrote to memory of 2524 412 1c4f9ab1b4226ce6e308662f208aab6b_JaffaCakes118.exe foarm.exe PID 412 wrote to memory of 2524 412 1c4f9ab1b4226ce6e308662f208aab6b_JaffaCakes118.exe foarm.exe PID 412 wrote to memory of 2524 412 1c4f9ab1b4226ce6e308662f208aab6b_JaffaCakes118.exe foarm.exe PID 412 wrote to memory of 2336 412 1c4f9ab1b4226ce6e308662f208aab6b_JaffaCakes118.exe cmd.exe PID 412 wrote to memory of 2336 412 1c4f9ab1b4226ce6e308662f208aab6b_JaffaCakes118.exe cmd.exe PID 412 wrote to memory of 2336 412 1c4f9ab1b4226ce6e308662f208aab6b_JaffaCakes118.exe cmd.exe PID 2524 wrote to memory of 1020 2524 foarm.exe yvpeg.exe PID 2524 wrote to memory of 1020 2524 foarm.exe yvpeg.exe PID 2524 wrote to memory of 1020 2524 foarm.exe yvpeg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c4f9ab1b4226ce6e308662f208aab6b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1c4f9ab1b4226ce6e308662f208aab6b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\foarm.exe"C:\Users\Admin\AppData\Local\Temp\foarm.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\yvpeg.exe"C:\Users\Admin\AppData\Local\Temp\yvpeg.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_sannuy.bat" "2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_sannuy.batFilesize
304B
MD53af1ce889fc65ed38d96cbfeace808a3
SHA132e007f16426395cfb0b7144b93d9fd1b690ef0c
SHA256d9d01b6759166bfe1ed68a1b464946ce662be0bc678ca5f67fcd680cae26e85a
SHA51271cb0f8bcc01401c3c2ce2e78b41b67e82328b1d4fb8af431b564457032e6ff9df6ead3eb3d6a80151e7753186f8431d5362bf523ed2d86669ef317dba86aa9c
-
C:\Users\Admin\AppData\Local\Temp\foarm.exeFilesize
464KB
MD518c09c2f313f6f65e86d8ab05fd694f8
SHA1e971a1491250871628aa0e1b7fd14759113088d9
SHA256549ad68ca83649d997060dbe7dd88eac6bdb915eaad64ef19051c62a45bb1cc8
SHA512edf6e052e826287b389b189c1134e70fbe7d6cca1b54fb96acab5efb10b7aaccee2069744b7bec05272eaacd15dd18d72cb312c9c5fcebc814584954984075f8
-
C:\Users\Admin\AppData\Local\Temp\golfinfo.iniFilesize
512B
MD564f44016abe4ea6dad7af8d13a422ff1
SHA1f7b011db2494aa01cbfa28eab7825f0796d0f223
SHA2562d8bfb21c1cf3cbbe9db1245f32f63922091be82a728d2f8a652127d3b7cdf5c
SHA512df51f9cadb89d93a678c56463a89ee1b69a5aab924a99a9a63d9ab66aa99a3d4b015e03f1930ea2b7394150d25d8d894b344f0b6babd9b5614716b0760746976
-
C:\Users\Admin\AppData\Local\Temp\yvpeg.exeFilesize
198KB
MD5f01158cf4dadb5c91bab30a26eb7eaca
SHA1caafb87cac43b8586a0ab1c5f4a3a44b040e3d19
SHA256e8b651cee49f4bce03723793eaf75ac7aceadc32681020fddaa45f650fdbe6f0
SHA51202c25e7f432f8f304a01384067f51e15a76ca74fc604bb00b3609ecda0c1c0232ff822632b77a52bc4426d14ce472c65317000a27600f1dda4031cb6ae84271f
-
memory/412-14-0x0000000000F20000-0x0000000000F9C000-memory.dmpFilesize
496KB
-
memory/412-0-0x0000000000F20000-0x0000000000F9C000-memory.dmpFilesize
496KB
-
memory/1020-25-0x0000000000400000-0x000000000049F000-memory.dmpFilesize
636KB
-
memory/1020-28-0x0000000000400000-0x000000000049F000-memory.dmpFilesize
636KB
-
memory/1020-29-0x0000000000400000-0x000000000049F000-memory.dmpFilesize
636KB
-
memory/1020-30-0x0000000000400000-0x000000000049F000-memory.dmpFilesize
636KB
-
memory/1020-31-0x0000000000400000-0x000000000049F000-memory.dmpFilesize
636KB
-
memory/1020-32-0x0000000000400000-0x000000000049F000-memory.dmpFilesize
636KB
-
memory/2524-11-0x0000000000720000-0x000000000079C000-memory.dmpFilesize
496KB
-
memory/2524-26-0x0000000000720000-0x000000000079C000-memory.dmpFilesize
496KB