Analysis
-
max time kernel
94s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 18:32
Static task
static1
Behavioral task
behavioral1
Sample
2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe
-
Size
337KB
-
MD5
2d63f3baeadbc7e6d0ead97a0aa7cd23
-
SHA1
5b207f74db9a3af947189d909c28106cf1d7dad1
-
SHA256
2dd5af4b17bcf7a7ab4f8eea8bca55c7604f17705f5f047ae1d2903a9ca74636
-
SHA512
96f1db3c9a497be746781ebaef90450e63b395c396df4b0ca7d51d04787ea88f3e9487672c9a6c95764344038a140de5e7323c5087231f2b6ac5311e2e2ff95a
-
SSDEEP
6144:/hCUEgMXa8rkOWYE6yqBwhUSLzueZyEtenjRbxxD3u4zI:/hCUEpXrkNWyqCKSbfuj9vR
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Control Panel\International\Geo\Nation 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\pyhztS.dll 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe File created C:\Windows\SysWOW64\sysyhzt7.dll 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3FDEB171-8F86-0022-0001-69B8DB553683} 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3FDEB171-8F86-0022-0001-69B8DB553683}\ 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3FDEB171-8F86-0022-0001-69B8DB553683}\InProcServer32 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3FDEB171-8F86-0022-0001-69B8DB553683}\InProcServer32\ = "C:\\Windows\\SysWow64\\sysyhzt7.dll" 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3FDEB171-8F86-0022-0001-69B8DB553683}\InProcServer32\ThreadingModel = "Apartment" 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4348 wrote to memory of 4948 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 86 PID 4348 wrote to memory of 4948 4348 2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2d63f3baeadbc7e6d0ead97a0aa7cd23_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Modifies registry class
PID:4948
-