Analysis
-
max time kernel
135s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 04:19
Behavioral task
behavioral1
Sample
210f3fd69d01e44ea7248d12eba587e4_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
210f3fd69d01e44ea7248d12eba587e4_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
210f3fd69d01e44ea7248d12eba587e4_JaffaCakes118.exe
-
Size
3.2MB
-
MD5
210f3fd69d01e44ea7248d12eba587e4
-
SHA1
f9d8a239913456cd4199a9e56b2c4b69e2694770
-
SHA256
7d04acaad6beb8b1dfd4d63ae83aa3d1e43015a7f733513173ece5d7399c7e0d
-
SHA512
62a7058b5d6f8639a39334cb6eed537cb749a3ece399553ff26985c456a8d3a9544c28584353de8b73091785dd596ca26828dcbe93db767636259398f6ec51da
-
SSDEEP
49152:h/gFk4qWdj5c4CCVSGB6THfmyCuv+vSAURu7m+Jyh2ihyAhJKzc4EABPT55qP3gZ:21jdjjkGcDCu20um+G5hyAhHMPTzqP3G
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\International\Geo\Nation 210f3fd69d01e44ea7248d12eba587e4_JaffaCakes118.exe -
Executes dropped EXE 4 IoCs
pid Process 868 ChdGJ.exe 1448 MyServer.exe 4988 DBS.EXE 4404 DBS.EXE -
Loads dropped DLL 2 IoCs
pid Process 4988 DBS.EXE 4988 DBS.EXE -
resource yara_rule behavioral2/memory/1956-0-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1956-17-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\DBS.EXE DBS.EXE File created C:\Windows\SysWOW64\DBS.EXE MyServer.exe File opened for modification C:\Windows\SysWOW64\DBS.EXE MyServer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 868 ChdGJ.exe 868 ChdGJ.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 868 ChdGJ.exe 868 ChdGJ.exe 868 ChdGJ.exe 868 ChdGJ.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 868 ChdGJ.exe 868 ChdGJ.exe 868 ChdGJ.exe 868 ChdGJ.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 868 ChdGJ.exe 868 ChdGJ.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1956 wrote to memory of 868 1956 210f3fd69d01e44ea7248d12eba587e4_JaffaCakes118.exe 90 PID 1956 wrote to memory of 868 1956 210f3fd69d01e44ea7248d12eba587e4_JaffaCakes118.exe 90 PID 1956 wrote to memory of 868 1956 210f3fd69d01e44ea7248d12eba587e4_JaffaCakes118.exe 90 PID 1956 wrote to memory of 1448 1956 210f3fd69d01e44ea7248d12eba587e4_JaffaCakes118.exe 91 PID 1956 wrote to memory of 1448 1956 210f3fd69d01e44ea7248d12eba587e4_JaffaCakes118.exe 91 PID 1956 wrote to memory of 1448 1956 210f3fd69d01e44ea7248d12eba587e4_JaffaCakes118.exe 91 PID 1448 wrote to memory of 4988 1448 MyServer.exe 92 PID 1448 wrote to memory of 4988 1448 MyServer.exe 92 PID 1448 wrote to memory of 4988 1448 MyServer.exe 92 PID 4988 wrote to memory of 4404 4988 DBS.EXE 93 PID 4988 wrote to memory of 4404 4988 DBS.EXE 93 PID 4988 wrote to memory of 4404 4988 DBS.EXE 93 PID 4988 wrote to memory of 2400 4988 DBS.EXE 94 PID 4988 wrote to memory of 2400 4988 DBS.EXE 94 PID 4988 wrote to memory of 2400 4988 DBS.EXE 94 PID 1448 wrote to memory of 2272 1448 MyServer.exe 96 PID 1448 wrote to memory of 2272 1448 MyServer.exe 96 PID 1448 wrote to memory of 2272 1448 MyServer.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\210f3fd69d01e44ea7248d12eba587e4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\210f3fd69d01e44ea7248d12eba587e4_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\Temp\ChdGJ.exe"C:\Users\Admin\AppData\Local\Temp\Temp\ChdGJ.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:868
-
-
C:\Users\Admin\AppData\Local\Temp\Temp\MyServer.exe"C:\Users\Admin\AppData\Local\Temp\Temp\MyServer.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\DBS.EXEC:\Windows\SYSTEM32\DBS.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\DBS.EXEC:\Windows\SYSTEM32\DBS.EXE4⤵
- Executes dropped EXE
PID:4404
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c del /F C:\Windows\SYSTEM32\DBS.EXE4⤵PID:2400
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c del /F "C:\Users\Admin\AppData\Local\Temp\Temp\MyServer.exe"3⤵PID:2272
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4256,i,2113996974559895641,18156918660790954073,262144 --variations-seed-version --mojo-platform-channel-handle=4228 /prefetch:81⤵PID:1816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD59bd83dbf6c14b7f53861e554c2d583de
SHA1971e807a09b0b4e794b7161f835aeda7791f2c6b
SHA256af2039115030b9dd98e17e0684c506b432094e8c9cb37cd45ae1cae13f3e419e
SHA5123695a241809c774fdc9f9aae935e2f76d691acf540432b294e214efe4c64fb263ef73b42c4efc71906cafab3d9795d09f2a1ebeb9d60b3e6d26e688fec1459f2
-
Filesize
32B
MD5a0425d86174d521e55881e4408cf3510
SHA164db8527cc4b3d9d0afb8dabe59527dab7d55554
SHA256c781786e0c9a9e83997f7692e136cf896bfb4367bad0ac6179bb008113315970
SHA5128997f61127cdf4c54a27170f762579d498c84fbf86298d2f20abbc6330e8bf318a00db0ad7a8ba90615c055de283f7e6fcc5f2b1a178a9ae68fd722b194c3910
-
Filesize
432KB
MD5726a8d9bd4a2835847f982b438966709
SHA18b7552e9a02aca1ade342a96472706ed4548caf1
SHA2561e9f59859c75a88fd40a979fdf62b82a96ed093ba7134dbd81628730c4bd2b0e
SHA5129fb451a354a199bb2f4f4522c54e6196281407d31649cd21d24e289846dea44a7329082b2932cb8582031951186893ec5ea460cf06b15d719926a5b15a292324