Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 21:34
Static task
static1
Behavioral task
behavioral1
Sample
264aa882e59df39d0dc7175249f505fe_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
264aa882e59df39d0dc7175249f505fe_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
264aa882e59df39d0dc7175249f505fe_JaffaCakes118.exe
-
Size
41KB
-
MD5
264aa882e59df39d0dc7175249f505fe
-
SHA1
2125b8bab88be608298faf5da9d0ab2fec5bae41
-
SHA256
4b876e0df2482473c0e10c30815a93b21bdb409361c3628b7af65e507bb77d84
-
SHA512
6c74c1d6b53e9ae1664001e57fbdfb78754ba3b0096516813f69723c311e614033f70054dab9a41cb12ec480cf6709a0a3ee15f5a7e9e3e912999c673a529284
-
SSDEEP
768:QIBar1ZIZYnfI9opm6AIHIjaI7g9mVmUnooNE/W5dRV8:pW1ZIZqI9opm6AIHIjzmUhNzd
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 264aa882e59df39d0dc7175249f505fe_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation sxhost.exe -
Executes dropped EXE 1 IoCs
pid Process 3724 sxhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2376 wrote to memory of 3724 2376 264aa882e59df39d0dc7175249f505fe_JaffaCakes118.exe 84 PID 2376 wrote to memory of 3724 2376 264aa882e59df39d0dc7175249f505fe_JaffaCakes118.exe 84 PID 2376 wrote to memory of 3724 2376 264aa882e59df39d0dc7175249f505fe_JaffaCakes118.exe 84 PID 2376 wrote to memory of 2788 2376 264aa882e59df39d0dc7175249f505fe_JaffaCakes118.exe 85 PID 2376 wrote to memory of 2788 2376 264aa882e59df39d0dc7175249f505fe_JaffaCakes118.exe 85 PID 2376 wrote to memory of 2788 2376 264aa882e59df39d0dc7175249f505fe_JaffaCakes118.exe 85 PID 3724 wrote to memory of 1732 3724 sxhost.exe 87 PID 3724 wrote to memory of 1732 3724 sxhost.exe 87 PID 3724 wrote to memory of 1732 3724 sxhost.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\264aa882e59df39d0dc7175249f505fe_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\264aa882e59df39d0dc7175249f505fe_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\sxhost.exe"C:\Users\Admin\sxhost.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del C:\Users\Admin\sxhost.exe >> NUL3⤵PID:1732
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\264AA8~1.EXE >> NUL2⤵PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5264aa882e59df39d0dc7175249f505fe
SHA12125b8bab88be608298faf5da9d0ab2fec5bae41
SHA2564b876e0df2482473c0e10c30815a93b21bdb409361c3628b7af65e507bb77d84
SHA5126c74c1d6b53e9ae1664001e57fbdfb78754ba3b0096516813f69723c311e614033f70054dab9a41cb12ec480cf6709a0a3ee15f5a7e9e3e912999c673a529284