Analysis
-
max time kernel
94s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 02:33
Behavioral task
behavioral1
Sample
2aae317c75f9b4b591d44731924cdd57_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2aae317c75f9b4b591d44731924cdd57_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2aae317c75f9b4b591d44731924cdd57_JaffaCakes118.exe
-
Size
8KB
-
MD5
2aae317c75f9b4b591d44731924cdd57
-
SHA1
bd15068f86167d5380d4e19661350c14f608c55f
-
SHA256
3551f815794b10ca11146b4cd1b40a8a5fdb910d6d81027b7bd10dc9f3076e36
-
SHA512
2d3b3cfa2698a134f7bba01bb4b4d2d4cc176941780fdcbc2867e5cf7abae50af47973e7e12ee5bb822388bf3b0bafaea456dac7b59ab42e287cbdd77b1dea73
-
SSDEEP
192:Q4D8/ZNI/0J+OSdFnz4/QoC4ZFaNJhLkwcud2DH9VwGfctlHO:vtOkFnz8RCUaNJawcudoD7UC
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Control Panel\International\Geo\Nation 2aae317c75f9b4b591d44731924cdd57_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 1 IoCs
pid Process 948 b2e.exe -
resource yara_rule behavioral2/memory/2432-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/2432-9-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2432 wrote to memory of 948 2432 2aae317c75f9b4b591d44731924cdd57_JaffaCakes118.exe 86 PID 2432 wrote to memory of 948 2432 2aae317c75f9b4b591d44731924cdd57_JaffaCakes118.exe 86 PID 2432 wrote to memory of 948 2432 2aae317c75f9b4b591d44731924cdd57_JaffaCakes118.exe 86 PID 948 wrote to memory of 1848 948 b2e.exe 87 PID 948 wrote to memory of 1848 948 b2e.exe 87 PID 948 wrote to memory of 1848 948 b2e.exe 87 PID 1848 wrote to memory of 4388 1848 cmd.exe 90 PID 1848 wrote to memory of 4388 1848 cmd.exe 90 PID 1848 wrote to memory of 4388 1848 cmd.exe 90 PID 1848 wrote to memory of 4992 1848 cmd.exe 91 PID 1848 wrote to memory of 4992 1848 cmd.exe 91 PID 1848 wrote to memory of 4992 1848 cmd.exe 91 PID 1848 wrote to memory of 3296 1848 cmd.exe 92 PID 1848 wrote to memory of 3296 1848 cmd.exe 92 PID 1848 wrote to memory of 3296 1848 cmd.exe 92 PID 948 wrote to memory of 5028 948 b2e.exe 93 PID 948 wrote to memory of 5028 948 b2e.exe 93 PID 948 wrote to memory of 5028 948 b2e.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2aae317c75f9b4b591d44731924cdd57_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2aae317c75f9b4b591d44731924cdd57_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\AEBE.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\AEBE.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\AEBE.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\2aae317c75f9b4b591d44731924cdd57_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B5C3.tmp\batfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo. "4⤵PID:4388
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" date "4⤵PID:4992
-
-
C:\Windows\SysWOW64\find.exefind /c /i "2008-10"4⤵PID:3296
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\selfdel0.bat" "3⤵PID:5028
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD58f7ccf720e03d40de2dd0e1eff5860b6
SHA1d1edcf27974bbf1f762d05224e5ab1ec03fab15a
SHA256f4ac93bee578357364befef47856b66dfcfb9c305d94831f7b2b56db69a27825
SHA512c6f970355313db7cff5d7e493ee66566e543707284a39328305c73bb432a37cf43121f1b0c841137668afdb05e8fa9e1b4b889ee49472c927d4a20d1520b4b13
-
Filesize
142B
MD5d0dbb92c87f1a92088e774546ead3706
SHA1391e113539fe3f892ca57906b008a6fca4d45188
SHA25671d0eff6f46c585792e10851648c0fbe0b0e0702ae6e90964eb0eb25af3bd96e
SHA512f2bc16895f0d7b576f6c43718f98200000270e3bb265b6ab3796d8149701ab5c95bd73dc5266ee63719b8bd2fae2d3faeaa414dd802cde0902027143ab6d441d
-
Filesize
158B
MD55e8b3b1044f30c6d15415d53cd83be5d
SHA1de92057230132122b5ef87b8796671e1f01471b4
SHA256a3b28c3df5f20e0d4cc789d5e62828309517d2faf3c684a0ea3c7739f900db46
SHA5125999c8b32fe203a397e9994efbc17c8b3c4f9fa7664380a3983f1a1486ddfc525df0331261b8e08bb7ca42e6f93c206627aa0de1a8fe0aee68d557cba6c5ed99