Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 03:15
Static task
static1
Behavioral task
behavioral1
Sample
20e60e4c8384d22886c7ba3f9923124e_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
20e60e4c8384d22886c7ba3f9923124e_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
20e60e4c8384d22886c7ba3f9923124e_JaffaCakes118.exe
-
Size
2.4MB
-
MD5
20e60e4c8384d22886c7ba3f9923124e
-
SHA1
00f03f24786f92d2fa313db6257c4ba386a35300
-
SHA256
bf975b2beca4293abfa58ddfc6cb1cf3529d5e566e355d9f66291ab7854935e3
-
SHA512
879ccb3a973c5c3c6d0748ba767481b29995d6be152789e1c16e34753e90ca1bb5638bfaf9e1cc51fff7b1be9194c89df17bcad2db53db1d5c24e2be3c8d2c2a
-
SSDEEP
49152:qFKcGbWeufY+V4K7xGllP2thLvmEL1Dbb86XsfNDaxDXmjy:T+V4QGPPmhLvn1Dbb8HfNSXmG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\International\Geo\Nation 20e60e4c8384d22886c7ba3f9923124e_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 5084 KOHDBot(EU)Setup.exe -
resource yara_rule behavioral2/files/0x000600000001e6dc-5.dat upx behavioral2/memory/5084-13-0x0000000000400000-0x00000000004AB000-memory.dmp upx behavioral2/memory/5084-91-0x0000000000400000-0x00000000004AB000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3160 wrote to memory of 3892 3160 20e60e4c8384d22886c7ba3f9923124e_JaffaCakes118.exe 85 PID 3160 wrote to memory of 3892 3160 20e60e4c8384d22886c7ba3f9923124e_JaffaCakes118.exe 85 PID 3160 wrote to memory of 5084 3160 20e60e4c8384d22886c7ba3f9923124e_JaffaCakes118.exe 86 PID 3160 wrote to memory of 5084 3160 20e60e4c8384d22886c7ba3f9923124e_JaffaCakes118.exe 86 PID 3160 wrote to memory of 5084 3160 20e60e4c8384d22886c7ba3f9923124e_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\20e60e4c8384d22886c7ba3f9923124e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\20e60e4c8384d22886c7ba3f9923124e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\program files\internet explorer\iexplore.exe"C:\program files\internet explorer\iexplore.exe"2⤵PID:3892
-
-
C:\Users\Admin\AppData\Local\KOHDBot(EU)Setup.exe"C:\Users\Admin\AppData\Local\KOHDBot(EU)Setup.exe"2⤵
- Executes dropped EXE
PID:5084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5e4c72afc842d275e596c9a0cb7527d9e
SHA1426c336ad33765fc24b3b7769ae54297c0aeb357
SHA256a4896c45c986b2cc2c68acc53af60f66db91b0aea92460d42a24b2aa358b79bd
SHA512fb2b2ff0873a51dd334c782b57b9f5b3966a63b4aeb3f5dd646859f54a767be9343a6bef1d621694a08ea2e2f104f10920d96f8405d05b4fafb82934ae25be1d
-
Filesize
3KB
MD50ccfbdbf767e121816b59a42cfb13fe9
SHA1acac1225a0110459ddc729b92c016e955dfee79d
SHA25671a534e7ac8c4fbca2b2a47c7f7f7eaa3b27e88d36d17bf6035eedf767399d8f
SHA51270fe25a45bd569185efe3146e411d70b5a1bfa6bc776a8cea95250b8a2bce5336d13b1ca9a2abee4a7267ab6a1f83340b9c46de2993e44b6048345f4b24ca9f7
-
Filesize
9KB
MD520dfca9eb810f08615236ffcf190f775
SHA1cd2454c65136378ea5e2d6b2b233560352911196
SHA2562c12023733d628fd9cb42665b334a84dcb48796510babf479c2599dd9f893c80
SHA512a0817e4e554f7e5d53f2380a5b02ac3d6609067089fd35750038170381abf02f66bb26922e4639c086683557d1abd14787cba7223c09b2cbf6ba125cdd487c31
-
Filesize
2KB
MD5946281234fe17fbdb2867842e24856c9
SHA1c6e09d79b1f3f64dc8dbde2cfedda8087f08c6bc
SHA256ad4461fcb6f45b46be0cc1442898d243973bda481671717b63c4955ced66c567
SHA512b25ca70e429fe761d171f14cf55fde290dd7e56ecebc1df8780c886f20ccd39e5a1c761a259bf9e607977cbdb5a4b468526ebd151702719852a572280ac93c62