Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 12:01
Static task
static1
Behavioral task
behavioral1
Sample
2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe
-
Size
98KB
-
MD5
2253c8da99eb1c32dae9568bb749a13f
-
SHA1
c073f6de200f85d652e6bd2eb8d58bdd94ccdc8d
-
SHA256
a425dd275e1b06734e737093123eae3a7d59a1e8449e789cd2d5c928640bcaa7
-
SHA512
27e3973171ee5ff055add2009825adc68246c08db7b162de6473d8bac9cd2d3fd0b3a7493cc080580bad6fa12650db026e476d1e76a5ee9680265f44d885107d
-
SSDEEP
1536:rvcnFivCOLJVj7hH+sONVPVAtXghxNKOXGlT1EZ1o8g4VrGvrkyKSPGwJn+fj0BB:rUsJHO9SXwklT1Q1o8gMrSkyrO02K
Malware Config
Extracted
tofsee
64.20.54.234
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
Processes:
lbi.exelbi.exepid process 532 lbi.exe 5060 lbi.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\lbi.exe\" /r" 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exelbi.exelbi.exedescription pid process target process PID 2644 set thread context of 700 2644 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe PID 532 set thread context of 5060 532 lbi.exe lbi.exe PID 5060 set thread context of 3380 5060 lbi.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4440 3380 WerFault.exe svchost.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exelbi.exelbi.exedescription pid process target process PID 2644 wrote to memory of 700 2644 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe PID 2644 wrote to memory of 700 2644 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe PID 2644 wrote to memory of 700 2644 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe PID 2644 wrote to memory of 700 2644 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe PID 2644 wrote to memory of 700 2644 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe PID 2644 wrote to memory of 700 2644 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe PID 2644 wrote to memory of 700 2644 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe PID 2644 wrote to memory of 700 2644 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe PID 700 wrote to memory of 532 700 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe lbi.exe PID 700 wrote to memory of 532 700 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe lbi.exe PID 700 wrote to memory of 532 700 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe lbi.exe PID 532 wrote to memory of 5060 532 lbi.exe lbi.exe PID 532 wrote to memory of 5060 532 lbi.exe lbi.exe PID 532 wrote to memory of 5060 532 lbi.exe lbi.exe PID 532 wrote to memory of 5060 532 lbi.exe lbi.exe PID 532 wrote to memory of 5060 532 lbi.exe lbi.exe PID 532 wrote to memory of 5060 532 lbi.exe lbi.exe PID 532 wrote to memory of 5060 532 lbi.exe lbi.exe PID 532 wrote to memory of 5060 532 lbi.exe lbi.exe PID 5060 wrote to memory of 3380 5060 lbi.exe svchost.exe PID 5060 wrote to memory of 3380 5060 lbi.exe svchost.exe PID 5060 wrote to memory of 3380 5060 lbi.exe svchost.exe PID 5060 wrote to memory of 3380 5060 lbi.exe svchost.exe PID 5060 wrote to memory of 3380 5060 lbi.exe svchost.exe PID 700 wrote to memory of 4156 700 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe cmd.exe PID 700 wrote to memory of 4156 700 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe cmd.exe PID 700 wrote to memory of 4156 700 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Users\Admin\lbi.exe"C:\Users\Admin\lbi.exe" /r3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\lbi.exe"C:\Users\Admin\lbi.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:3380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3380 -s 3326⤵
- Program crash
PID:4440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3482.bat" "3⤵PID:4156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3380 -ip 33801⤵PID:2516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD531241121304eb0a316d4bee94941747b
SHA1104b63fa808538dd99b93e34d0db43f79510783d
SHA256e3e85a53c7fb0958ca30422898cdad65603c1cc4b26c1f077950c2a5b7521d54
SHA512a7341bd8c745372072b7eda8d5ba15b1f16e7d5ea0665d104643b466438d17fd99e15747e5ec9f74296b30c634e8ab2c45779cd4b10b3c44f49a862258e74793
-
Filesize
98KB
MD52253c8da99eb1c32dae9568bb749a13f
SHA1c073f6de200f85d652e6bd2eb8d58bdd94ccdc8d
SHA256a425dd275e1b06734e737093123eae3a7d59a1e8449e789cd2d5c928640bcaa7
SHA51227e3973171ee5ff055add2009825adc68246c08db7b162de6473d8bac9cd2d3fd0b3a7493cc080580bad6fa12650db026e476d1e76a5ee9680265f44d885107d