Analysis
-
max time kernel
141s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 22:43
Static task
static1
Behavioral task
behavioral1
Sample
2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe
-
Size
92KB
-
MD5
2977ed244ee40ca67f9ad2e311483a94
-
SHA1
a5f755817ffde145b93bfac9a8e222f8f193d89f
-
SHA256
f6bf0b7dc8ca97cd8444f88c299cb53dd639f8f199b926990ba627956cefaa41
-
SHA512
b4bb84dd398d8db97cd71789b6b23d32ffc2dc8319d8c14ee69f0fc8fc10f2c685d7f2a3a9da4bb90d950116ab7748afd0d98f37eca465221897c7330e792230
-
SSDEEP
1536:liehYAlxXsLz/qNHfJmUoyKIhZBG+13KAf38r4J0spbYY95heYQu:/vsk/J9oyKCZBG+J2rJMTeBu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2172 winsvchost.exe 1728 winsvchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "\"C:\\Users\\Admin\\AppData\\Local\\winsvchost.exe\"" winsvchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4132 set thread context of 2024 4132 2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe 85 PID 2172 set thread context of 1728 2172 winsvchost.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4132 2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe 4132 2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe 2172 winsvchost.exe 2172 winsvchost.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 4132 wrote to memory of 2024 4132 2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe 85 PID 4132 wrote to memory of 2024 4132 2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe 85 PID 4132 wrote to memory of 2024 4132 2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe 85 PID 4132 wrote to memory of 2024 4132 2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe 85 PID 4132 wrote to memory of 2024 4132 2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe 85 PID 4132 wrote to memory of 2024 4132 2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe 85 PID 4132 wrote to memory of 2024 4132 2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe 85 PID 4132 wrote to memory of 2024 4132 2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe 85 PID 4132 wrote to memory of 2024 4132 2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe 85 PID 4132 wrote to memory of 2024 4132 2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe 85 PID 4132 wrote to memory of 2024 4132 2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe 85 PID 4132 wrote to memory of 2024 4132 2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe 85 PID 4132 wrote to memory of 2024 4132 2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe 85 PID 4132 wrote to memory of 2024 4132 2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe 85 PID 2024 wrote to memory of 2172 2024 2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe 86 PID 2024 wrote to memory of 2172 2024 2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe 86 PID 2024 wrote to memory of 2172 2024 2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe 86 PID 2172 wrote to memory of 1728 2172 winsvchost.exe 87 PID 2172 wrote to memory of 1728 2172 winsvchost.exe 87 PID 2172 wrote to memory of 1728 2172 winsvchost.exe 87 PID 2172 wrote to memory of 1728 2172 winsvchost.exe 87 PID 2172 wrote to memory of 1728 2172 winsvchost.exe 87 PID 2172 wrote to memory of 1728 2172 winsvchost.exe 87 PID 2172 wrote to memory of 1728 2172 winsvchost.exe 87 PID 2172 wrote to memory of 1728 2172 winsvchost.exe 87 PID 2172 wrote to memory of 1728 2172 winsvchost.exe 87 PID 2172 wrote to memory of 1728 2172 winsvchost.exe 87 PID 2172 wrote to memory of 1728 2172 winsvchost.exe 87 PID 2172 wrote to memory of 1728 2172 winsvchost.exe 87 PID 2172 wrote to memory of 1728 2172 winsvchost.exe 87 PID 2172 wrote to memory of 1728 2172 winsvchost.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\2977ed244ee40ca67f9ad2e311483a94_JaffaCakes118.exe2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\winsvchost.exe"C:\Users\Admin\AppData\Local\winsvchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\winsvchost.exeC:\Users\Admin\AppData\Local\winsvchost.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1728
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD52977ed244ee40ca67f9ad2e311483a94
SHA1a5f755817ffde145b93bfac9a8e222f8f193d89f
SHA256f6bf0b7dc8ca97cd8444f88c299cb53dd639f8f199b926990ba627956cefaa41
SHA512b4bb84dd398d8db97cd71789b6b23d32ffc2dc8319d8c14ee69f0fc8fc10f2c685d7f2a3a9da4bb90d950116ab7748afd0d98f37eca465221897c7330e792230