Analysis
-
max time kernel
125s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 03:09
Static task
static1
Behavioral task
behavioral1
Sample
2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
2eca7340fea1097fc793af9fa4283ef7
-
SHA1
6194fc1424d14c934626c7c5e461c11617c3e6fd
-
SHA256
f9fccf384c8b213e23923f24d673a1a9180fad6344aabd95263013980031283a
-
SHA512
82b0229fff1f9035fcd990e264d1da1568797582137b3446bf97fd2fd8c364de0039b83dc3066cc0c5625e8cc34631d68187f91bd6e4932278f11d239b3a3020
-
SSDEEP
24576:u8lts9l/1e4CqxbpyaYwkkUyhgrIihU4BuhYCLEW2vxZlxlH:uqG9pk5qxtSBr/hU4BwOFH
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-661257284-3186977026-4220467887-1000\Control Panel\International\Geo\Nation 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 944 arun.exe -
Drops file in Program Files directory 37 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\duoduo\res\91555game.ico 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\duoduo\res\b_logo_1.bmp 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File created C:\Program Files (x86)\duoduo\res\logo_1.bmp 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\duoduo\bibibei.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\duoduo\ati2evxx.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\duoduo\res 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File created C:\Program Files (x86)\duoduo\coop.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\duoduo\DDVInstall.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File created C:\Program Files (x86)\duoduo\yd.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\duoduo\Client.ini 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File created C:\Program Files (x86)\duoduo\ff.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File created C:\Program Files (x86)\duoduo\bibibei.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\duoduo 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\duoduo\ff.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File created C:\Program Files (x86)\duoduo\kjkj.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\duoduo\kjkj.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File created C:\Program Files (x86)\duoduo\tc.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File created C:\Program Files (x86)\duoduo\res\b_logo_1.bmp 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\duoduo\res\logo_1.bmp 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\duoduo\bd.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File created C:\Program Files (x86)\duoduo\DDVInstall.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File created C:\Program Files (x86)\duoduo\ho.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\duoduo\QvodTermin.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File created C:\Program Files (x86)\duoduo\res\91555game.ico 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File created C:\Program Files (x86)\duoduo\ati2evxx.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\duoduo\ho.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File created C:\Program Files (x86)\duoduo\mytool.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File created C:\Program Files (x86)\duoduo\QvodTermin.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\duoduo\yd.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File created C:\Program Files (x86)\duoduo\arun.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File created C:\Program Files (x86)\duoduo\__tmp_rar_sfx_access_check_240666781 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File created C:\Program Files (x86)\duoduo\bd.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File created C:\Program Files (x86)\duoduo\Client.ini 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\duoduo\coop.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\duoduo\mytool.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\duoduo\tc.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\duoduo\arun.exe 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 1 IoCs
resource yara_rule behavioral2/files/0x00070000000235a1-16.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2420 wrote to memory of 944 2420 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe 92 PID 2420 wrote to memory of 944 2420 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe 92 PID 2420 wrote to memory of 944 2420 2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2eca7340fea1097fc793af9fa4283ef7_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\duoduo\arun.exe"C:\Program Files (x86)\duoduo\arun.exe"2⤵
- Executes dropped EXE
PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3872,i,5095735526234624271,6356691058050835509,262144 --variations-seed-version --mojo-platform-channel-handle=4180 /prefetch:81⤵PID:4024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5a78ea1aaa98d2aa7662ceaee47a60f52
SHA166e4987ddcc66aef31e6b676b3c7dbcba1ab24d3
SHA2567c255a05e81fe66e199297bd711059a9500eb4b70aabebcfc1526dd8438f7484
SHA5125227e16bd84f363533cf205661f6a165fc65b62c515f158911924da06a67488a371f03f8f701d293343a546527613d62636b98c1e35bcc3bc7c2d55d209d2e62
-
Filesize
48KB
MD5ba6edc95f02a099a65eebcad56f36375
SHA120affafd610f1f410604a01435657675f7528987
SHA25614a29286943f5ed955d65b3bbaf9d9411b2e7053b33eb901043f4178058a4909
SHA512e3d4427e8083e28856143a25aac547c6473e9176717a30cc1d01a91f897df5fd1c5e4c70d5c82df52b23aff1252667b198881bcfd94517ba6c99deb7fe689e04