Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 05:31
Static task
static1
Behavioral task
behavioral1
Sample
276808deb414c644073593b8d29d886a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
276808deb414c644073593b8d29d886a_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
276808deb414c644073593b8d29d886a_JaffaCakes118.exe
-
Size
69KB
-
MD5
276808deb414c644073593b8d29d886a
-
SHA1
145fee5cc7920024b53c089d19ff281d9a4ac428
-
SHA256
cfc5d23ac64eac6d38ee0f3723dec50bba111ef18880b44c3a1fb1081d10902b
-
SHA512
7e4517c7a3bbb3e0bba2c8f09f65007c6485fee39e08bddb5e560c1e300fe44a4df1a9c5df044d27f757f366a1c89b74ae03f916e14e5c49c52e0e42faad497d
-
SSDEEP
1536:3k8qkQtjmO5AI9AYkZULavtR96JJpagWsVC:VajmkVkGLoRs0gdVC
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation 276808deb414c644073593b8d29d886a_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\z: 276808deb414c644073593b8d29d886a_JaffaCakes118.exe -
Drops file in System32 directory 17 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ntio523.sys 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\netmen.exe 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\netmenc.txt 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ntio494.sys 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ntio495.sys 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\AFxBSjz4ZY5slIA 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\netddess.exe 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ver.txt 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\netmen.txt 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\adclient.exe 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\€²§)™÷M 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\netmenc.exe 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File created C:\Windows\SysWOW64\comsa64.sys 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\netddess.txt 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drmgs.sys 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File created C:\Windows\SysWOW64\drmgs.sys 276808deb414c644073593b8d29d886a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\comsa64.sys 276808deb414c644073593b8d29d886a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe Token: SeDebugPrivilege 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3604 wrote to memory of 456 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 83 PID 3604 wrote to memory of 456 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 83 PID 3604 wrote to memory of 456 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 83 PID 456 wrote to memory of 4816 456 net.exe 85 PID 456 wrote to memory of 4816 456 net.exe 85 PID 456 wrote to memory of 4816 456 net.exe 85 PID 3604 wrote to memory of 4988 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 88 PID 3604 wrote to memory of 4988 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 88 PID 3604 wrote to memory of 4988 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 88 PID 4988 wrote to memory of 3188 4988 net.exe 90 PID 4988 wrote to memory of 3188 4988 net.exe 90 PID 4988 wrote to memory of 3188 4988 net.exe 90 PID 3604 wrote to memory of 1600 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 91 PID 3604 wrote to memory of 1600 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 91 PID 3604 wrote to memory of 1600 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 91 PID 1600 wrote to memory of 2096 1600 net.exe 93 PID 1600 wrote to memory of 2096 1600 net.exe 93 PID 1600 wrote to memory of 2096 1600 net.exe 93 PID 3604 wrote to memory of 5052 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 94 PID 3604 wrote to memory of 5052 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 94 PID 3604 wrote to memory of 5052 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 94 PID 5052 wrote to memory of 4372 5052 net.exe 96 PID 5052 wrote to memory of 4372 5052 net.exe 96 PID 5052 wrote to memory of 4372 5052 net.exe 96 PID 3604 wrote to memory of 4460 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 97 PID 3604 wrote to memory of 4460 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 97 PID 3604 wrote to memory of 4460 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 97 PID 4460 wrote to memory of 4132 4460 net.exe 99 PID 4460 wrote to memory of 4132 4460 net.exe 99 PID 4460 wrote to memory of 4132 4460 net.exe 99 PID 3604 wrote to memory of 2300 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 100 PID 3604 wrote to memory of 2300 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 100 PID 3604 wrote to memory of 2300 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 100 PID 2300 wrote to memory of 4024 2300 net.exe 102 PID 2300 wrote to memory of 4024 2300 net.exe 102 PID 2300 wrote to memory of 4024 2300 net.exe 102 PID 3604 wrote to memory of 4520 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 103 PID 3604 wrote to memory of 4520 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 103 PID 3604 wrote to memory of 4520 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 103 PID 4520 wrote to memory of 4724 4520 net.exe 105 PID 4520 wrote to memory of 4724 4520 net.exe 105 PID 4520 wrote to memory of 4724 4520 net.exe 105 PID 3604 wrote to memory of 5088 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 106 PID 3604 wrote to memory of 5088 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 106 PID 3604 wrote to memory of 5088 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 106 PID 5088 wrote to memory of 4888 5088 net.exe 108 PID 5088 wrote to memory of 4888 5088 net.exe 108 PID 5088 wrote to memory of 4888 5088 net.exe 108 PID 3604 wrote to memory of 2864 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 109 PID 3604 wrote to memory of 2864 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 109 PID 3604 wrote to memory of 2864 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 109 PID 2864 wrote to memory of 816 2864 net.exe 111 PID 2864 wrote to memory of 816 2864 net.exe 111 PID 2864 wrote to memory of 816 2864 net.exe 111 PID 3604 wrote to memory of 2928 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 112 PID 3604 wrote to memory of 2928 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 112 PID 3604 wrote to memory of 2928 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 112 PID 2928 wrote to memory of 1864 2928 net.exe 114 PID 2928 wrote to memory of 1864 2928 net.exe 114 PID 2928 wrote to memory of 1864 2928 net.exe 114 PID 3604 wrote to memory of 2916 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 118 PID 3604 wrote to memory of 2916 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 118 PID 3604 wrote to memory of 2916 3604 276808deb414c644073593b8d29d886a_JaffaCakes118.exe 118 PID 2916 wrote to memory of 3896 2916 net.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\276808deb414c644073593b8d29d886a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\276808deb414c644073593b8d29d886a_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop Netmen2⤵
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Netmen3⤵PID:4816
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop Netmen2⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Netmen3⤵PID:3188
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop Netmenc2⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Netmenc3⤵PID:2096
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop Netmenc2⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Netmenc3⤵PID:4372
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop Netmen2⤵
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Netmen3⤵PID:4132
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop Netmen2⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Netmen3⤵PID:4024
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop Netmenc2⤵
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Netmenc3⤵PID:4724
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop Netmenc2⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Netmenc3⤵PID:4888
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop NetDDESRV2⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NetDDESRV3⤵PID:816
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop NetDDESRV2⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NetDDESRV3⤵PID:1864
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop NetDDESS2⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NetDDESS3⤵PID:3896
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop NetDDESS2⤵PID:4516
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NetDDESS3⤵PID:212
-
-