Analysis
-
max time kernel
150s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 06:08
Behavioral task
behavioral1
Sample
21551e1b22ab94000213378e2847053b_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
21551e1b22ab94000213378e2847053b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
21551e1b22ab94000213378e2847053b_JaffaCakes118.exe
-
Size
37KB
-
MD5
21551e1b22ab94000213378e2847053b
-
SHA1
358b938e0ada7b9f95ce68281a0bf32c8d834b28
-
SHA256
39a1bc8c9a41da81a92115b50d2e8428e06825810ce616c26f64b9adfcbe2c69
-
SHA512
1dff9e01f191e69cc8488bb54cf2795398b38cca439013c8326cf34c3fc2ebe01c263056b9bb5624e1026a1b5f1f9c8ed6542c8cab30388c8d899c85c054e60a
-
SSDEEP
768:xvSK4e1PmWr/99cGnkYr9WaHTXc0Kj9SM4qphCqUfJ3Ean/g7Fo9CKtHEk:6AzsJYbHr0hsLqodEanWYHE
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 21551e1b22ab94000213378e2847053b_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1484 wlock.exe -
resource yara_rule behavioral2/memory/2140-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2140-10-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wlock = "C:\\Users\\Admin\\wlock\\wlock.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ScreenSaveActive = "0" wlock.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe 1484 wlock.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2140 21551e1b22ab94000213378e2847053b_JaffaCakes118.exe Token: SeDebugPrivilege 1484 wlock.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1484 wlock.exe 1484 wlock.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2140 wrote to memory of 4512 2140 21551e1b22ab94000213378e2847053b_JaffaCakes118.exe 81 PID 2140 wrote to memory of 4512 2140 21551e1b22ab94000213378e2847053b_JaffaCakes118.exe 81 PID 2140 wrote to memory of 4512 2140 21551e1b22ab94000213378e2847053b_JaffaCakes118.exe 81 PID 4512 wrote to memory of 824 4512 cmd.exe 83 PID 4512 wrote to memory of 824 4512 cmd.exe 83 PID 4512 wrote to memory of 824 4512 cmd.exe 83 PID 2140 wrote to memory of 1484 2140 21551e1b22ab94000213378e2847053b_JaffaCakes118.exe 84 PID 2140 wrote to memory of 1484 2140 21551e1b22ab94000213378e2847053b_JaffaCakes118.exe 84 PID 2140 wrote to memory of 1484 2140 21551e1b22ab94000213378e2847053b_JaffaCakes118.exe 84 PID 2140 wrote to memory of 1820 2140 21551e1b22ab94000213378e2847053b_JaffaCakes118.exe 85 PID 2140 wrote to memory of 1820 2140 21551e1b22ab94000213378e2847053b_JaffaCakes118.exe 85 PID 2140 wrote to memory of 1820 2140 21551e1b22ab94000213378e2847053b_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\21551e1b22ab94000213378e2847053b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\21551e1b22ab94000213378e2847053b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v wlock /t REG_SZ /d "C:\Users\Admin\wlock\wlock.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v wlock /t REG_SZ /d "C:\Users\Admin\wlock\wlock.exe" /f3⤵
- Adds Run key to start application
PID:824
-
-
-
C:\Users\Admin\wlock\wlock.exe"C:\Users\Admin\wlock\wlock.exe" f2⤵
- Executes dropped EXE
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1484
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\21551E~1.EXE > NuL2⤵PID:1820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD535d59cddf9703c68e54ce84787464fbf
SHA1f988df8ba86f6a3d9c76ec0c911cb0e002306155
SHA256ab589a7db1a68cc8f9427f05217f7e0d10de894b6a1ec270f9a9721869be7058
SHA512887641b9049eddf4ccabbfa81b96f5addbecc3dc5af0be4018edac7fd545c74547b029416a1adf53a258992ad505185629496e5af937a69c3d3c21e265654338