Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02-07-2024 07:25
Behavioral task
behavioral1
Sample
1e741922a8509217b0fd8bd126cf034a_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
1e741922a8509217b0fd8bd126cf034a_JaffaCakes118.exe
-
Size
508KB
-
MD5
1e741922a8509217b0fd8bd126cf034a
-
SHA1
a398f6aced564dbacf62dcab3ab3355b5f4369c2
-
SHA256
8352bbe026f6e4c539401b430fa420eb879a6d468f1bbbb2eff151538b16f8c4
-
SHA512
d1a2da57ed3e95b952e40a6bedff9b18fd239d2034629043cb1c0d94dce153a417d1726042f7c09d6dbcf853ebb365337c9d1cf99b63b820bd777e5a2d55ad67
-
SSDEEP
12288:kdBNKTCqqwXCcdgT89+MvA+BisqYpxHtk:kLjQC+fs0O
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1e741922a8509217b0fd8bd126cf034a_JaffaCakes118.exegukeb.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 1e741922a8509217b0fd8bd126cf034a_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation gukeb.exe -
Executes dropped EXE 2 IoCs
Processes:
gukeb.exevyhyh.exepid process 428 gukeb.exe 4760 vyhyh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
vyhyh.exepid process 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe 4760 vyhyh.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
1e741922a8509217b0fd8bd126cf034a_JaffaCakes118.exegukeb.exedescription pid process target process PID 1828 wrote to memory of 428 1828 1e741922a8509217b0fd8bd126cf034a_JaffaCakes118.exe gukeb.exe PID 1828 wrote to memory of 428 1828 1e741922a8509217b0fd8bd126cf034a_JaffaCakes118.exe gukeb.exe PID 1828 wrote to memory of 428 1828 1e741922a8509217b0fd8bd126cf034a_JaffaCakes118.exe gukeb.exe PID 1828 wrote to memory of 3004 1828 1e741922a8509217b0fd8bd126cf034a_JaffaCakes118.exe cmd.exe PID 1828 wrote to memory of 3004 1828 1e741922a8509217b0fd8bd126cf034a_JaffaCakes118.exe cmd.exe PID 1828 wrote to memory of 3004 1828 1e741922a8509217b0fd8bd126cf034a_JaffaCakes118.exe cmd.exe PID 428 wrote to memory of 4760 428 gukeb.exe vyhyh.exe PID 428 wrote to memory of 4760 428 gukeb.exe vyhyh.exe PID 428 wrote to memory of 4760 428 gukeb.exe vyhyh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e741922a8509217b0fd8bd126cf034a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1e741922a8509217b0fd8bd126cf034a_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\gukeb.exe"C:\Users\Admin\AppData\Local\Temp\gukeb.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\vyhyh.exe"C:\Users\Admin\AppData\Local\Temp\vyhyh.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵PID:3004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD555c5bd503a5fcf4a4d097cee815150b5
SHA184f710f8870676b966d2a691ef200634b9fac458
SHA256b75081756c0fd381b4e9a215697c4efcbe49abb188c709de1f32595729bcddbb
SHA512349e0bc3ef00ebc7125f6ec1da228495423567fdf0834171cb20eb50ac62c7296f5d967eebaf3d6dcc300ca524747149620e3265fe1fd69e1b1b556acd4e9462
-
Filesize
512B
MD56083038c0b18863c355e03746e7faa3d
SHA1c46d96ff75cd0ab6bb351f72144a05a2947343b3
SHA256f4226217c5e01e5a649d19f32c3468d05402ce3d8391596cb87da1cc19ced27e
SHA5120428aedd967701ef36136425c8f581088216ee5c540b59f5976ffb1db79438de5b908a88dad17f32231f72d648983faad745e893c9ba3a25f46908ef597aa15a
-
Filesize
508KB
MD59849533032be8b3b1f2ab1e4d29d406f
SHA18be1e42d8fd0748d6139ee0c65e2622086251c40
SHA256672df4600cdd5e0193c304cbe9045e54b05b7c10a6568ed967899980649002a8
SHA5121c11c5db5c6b1d236721ab786c0ddc50b0d82066d3766b02e03622e07f4c57e1e3b41db961159e8a99f858a87ffa411105ca07bb623b6c703c20998a45cc5eaf
-
Filesize
241KB
MD5c8da8e0cc56eaa874a87b01d4efe5f1c
SHA17e81983bc2ffe1a221a90bdd4e652a44f0fb4c05
SHA2567cd8495ee3dce828f4895da9ac4cd407f9a2c5fda25a1f536cb411a367ed1443
SHA5128329043975a7ff6b138d45d2ac245f2937dc9ca8511e4ff4b82dfaa61191b7a341ad53355e340495bbb0cb101a1840a50ce35eed80d2e1e6a0876dd12fbe2165