Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 03:07
Static task
static1
Behavioral task
behavioral1
Sample
246bdad54992a89c58ea6bb32fa92fac_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
246bdad54992a89c58ea6bb32fa92fac_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
246bdad54992a89c58ea6bb32fa92fac_JaffaCakes118.exe
-
Size
259KB
-
MD5
246bdad54992a89c58ea6bb32fa92fac
-
SHA1
3453a29d9f9aeab2501c88aad2d625f7a5bbdfe8
-
SHA256
cd1d284ab167ca328058d9516ac452eb4a90ee7fa6aae7e511b3925e2bd8be9f
-
SHA512
01de3566cb44864c1a8d76bfd17575d152f2557153dbc139d1061459de45a50cb9c6bdc06ea68aec0284efe1aa86173bced3f5992d88367fa6c148e003b04e85
-
SSDEEP
6144:TamhEC+qTBgR5LEiVa5CF2zWOJtmCjgQNBuepW:n+qTe3LEP0wJt58QNBvo
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 246bdad54992a89c58ea6bb32fa92fac_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4216 Install Penguin Families.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4684 wrote to memory of 4216 4684 246bdad54992a89c58ea6bb32fa92fac_JaffaCakes118.exe 81 PID 4684 wrote to memory of 4216 4684 246bdad54992a89c58ea6bb32fa92fac_JaffaCakes118.exe 81 PID 4684 wrote to memory of 4216 4684 246bdad54992a89c58ea6bb32fa92fac_JaffaCakes118.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\246bdad54992a89c58ea6bb32fa92fac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\246bdad54992a89c58ea6bb32fa92fac_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\AIR4B32.tmp\Install Penguin Families.exe"C:\Users\Admin\AppData\Local\Temp\AIR4B32.tmp\Install Penguin Families.exe"2⤵
- Executes dropped EXE
PID:4216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28B
MD5d8e4d6a9659681f1fec17f44dd03f176
SHA1abb094d6d8393e32987ec4bdf2c98034ad01017b
SHA256dc06a0581b426dec32ca170821e13ad490fe276133996219b5a3cfa1a9d51fe5
SHA512ce131a71d353e81e1ab4684f992db60cb2d99d2617997b70b0b6f9cf8d996a3a24e24bb055b3893a196b6e69bbcc7419cbd9cc179e321d1e9aade4e46eaf81bc
-
Filesize
127KB
MD5c40bfd1e61ec7386006e4e0556e6bc7a
SHA1ea86df302610ce2f720693b3d196f892aca34840
SHA25610a8928c79fb0a1bc456d9ce548bf3fba3cbd67351894a0fb0ffcd1686eaec85
SHA512013484737339f590d4fbb878c36883749a3160552c1cf851db6cbd3463d2e6965bc660588f33e51fba5610ef3ca5df89c879fbb53dcbd956cdab4fc8eef2ad6a