Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 18:26
Behavioral task
behavioral1
Sample
2d5fc44811b80caeb3f3070fa3ec8538_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2d5fc44811b80caeb3f3070fa3ec8538_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2d5fc44811b80caeb3f3070fa3ec8538_JaffaCakes118.exe
-
Size
28KB
-
MD5
2d5fc44811b80caeb3f3070fa3ec8538
-
SHA1
5c62ff91acd4602cb55f81262aae630ca6bc48a1
-
SHA256
9e0d7a81181488136600305a8418ab7ca737e9a4b7a18331cb7a4c8eddffd122
-
SHA512
e1209335a9760492a0c7bdb849a08c956fdec2061d7afd13590cde96788834ffc10464c96710678152fa48183c78ce58c1a3e43a29e2c82d9ee1b35e97ef8b9a
-
SSDEEP
768:DTwz6Gn72sHS6wc5Vajoe73H/EGqJy4w2IMi3h7bK:D0772gS6wcLajoe73/EfQh7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2d5fc44811b80caeb3f3070fa3ec8538_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2148 rundll32.exe -
resource yara_rule behavioral2/memory/4888-0-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/4888-5-0x0000000000400000-0x0000000000419000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2148 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4888 wrote to memory of 2148 4888 2d5fc44811b80caeb3f3070fa3ec8538_JaffaCakes118.exe 83 PID 4888 wrote to memory of 2148 4888 2d5fc44811b80caeb3f3070fa3ec8538_JaffaCakes118.exe 83 PID 4888 wrote to memory of 2148 4888 2d5fc44811b80caeb3f3070fa3ec8538_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d5fc44811b80caeb3f3070fa3ec8538_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2d5fc44811b80caeb3f3070fa3ec8538_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Users\Admin\Favorites\hfmxd.hlp" InstallHook12⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5631d50bb655a78687250844fac0731c2
SHA1602c6f10166958a6df47cfb9d0323b1f2e155711
SHA256ae26ec937c982f7e4518f9521ad72029766d94c33d8a114a1592f2b7c6cbeb9b
SHA5124a04c5b551fdd3d55be015e11dfa1b534c171060fd8aa1b5278d68362a9e2666a8d762bf45fe73be3b00bcf833acbf9ad6a3a0741a6a903bb1c8762d35bac223