Analysis
-
max time kernel
125s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 09:45
Behavioral task
behavioral1
Sample
2bdd97fb46d0ed900416decee7058ed3_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2bdd97fb46d0ed900416decee7058ed3_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2bdd97fb46d0ed900416decee7058ed3_JaffaCakes118.exe
-
Size
29KB
-
MD5
2bdd97fb46d0ed900416decee7058ed3
-
SHA1
1a55a1e75dde04912dc5a08c20426377d2cbd3fe
-
SHA256
e7ba3c7c1a05473cf856ec066ec883850f4af974095b9027569eccf1a2e2a01a
-
SHA512
3998df370d2c3b31f067a940b6f0f364344c12ca119881b749c4c193fb4f4ec6fad17e1bcf7eb8b43f59ac57e812d5028fd9fb91c7afedbf56fead3868881ff6
-
SSDEEP
768:cuVcgKI/AYTnZ4puhnmJLBe6QMYzVRcsjESRR0FIFFFdB:xCPI/LTnCcz6QbBzHFzT
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-661257284-3186977026-4220467887-1000\Control Panel\International\Geo\Nation 2bdd97fb46d0ed900416decee7058ed3_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/456-0-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/456-3-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 456 wrote to memory of 1108 456 2bdd97fb46d0ed900416decee7058ed3_JaffaCakes118.exe 92 PID 456 wrote to memory of 1108 456 2bdd97fb46d0ed900416decee7058ed3_JaffaCakes118.exe 92 PID 456 wrote to memory of 1108 456 2bdd97fb46d0ed900416decee7058ed3_JaffaCakes118.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bdd97fb46d0ed900416decee7058ed3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2bdd97fb46d0ed900416decee7058ed3_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\a..bat" > nul 2> nul2⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4304,i,7362247189940554640,1583793531684159627,262144 --variations-seed-version --mojo-platform-channel-handle=4208 /prefetch:81⤵PID:660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD5b2a73f5bb6eab8bae76661607f44e205
SHA172bf829cbf9928ccd0bcfedfd9dec389af58fe0a
SHA256970c860d6fe8253f49a1cd1476b1b2952ade8ea8b278c7656f3e822985fb725f
SHA51237a1c70a1675720777651f4a23bf3a656f12e87dd6f5ec5d9ced677b8381d5ef2413aedf568f7b2da3215b47eff7cec31d61ac096fd897d1171925c5ef2f801f