Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240708-en -
resource tags
arch:x64arch:x86image:win10v2004-20240708-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
2f64ab64549251d59cf976f856d76bbe_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2f64ab64549251d59cf976f856d76bbe_JaffaCakes118.exe
Resource
win10v2004-20240708-en
General
-
Target
2f64ab64549251d59cf976f856d76bbe_JaffaCakes118.exe
-
Size
238KB
-
MD5
2f64ab64549251d59cf976f856d76bbe
-
SHA1
11f9340a7df351568c4bdac9d73f351534613ec9
-
SHA256
d8ba17468911084d3797cdb1ea6246737879bb17fe94b4984d12d484a7b62cae
-
SHA512
f863a09ecfbb7ed293c7b921bb38b54ed38c1ea738b9a4d54a4597fa81f0bed7195191ed3f12c5aa7442ffdfe98050d420f5459bd56e35ea776c0e5c22b8f327
-
SSDEEP
3072:6p332JMd1cCbaLBTco4vCo0gCOW4uATe2kCzoGtC+srO9k9HohLO34wCcSeZjZ:6p3dd1cCb84egCLUfcaC8lmCcPZ1
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3310979990-555183016-1244931625-1000\Control Panel\International\Geo\Nation 2f64ab64549251d59cf976f856d76bbe_JaffaCakes118.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\show.rpm 2f64ab64549251d59cf976f856d76bbe_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\show.rpm 2f64ab64549251d59cf976f856d76bbe_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\0.cmd 2f64ab64549251d59cf976f856d76bbe_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\0.cmd 2f64ab64549251d59cf976f856d76bbe_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\enb cmd.reg 2f64ab64549251d59cf976f856d76bbe_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\enb cmd.reg 2f64ab64549251d59cf976f856d76bbe_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\nircmd.exe 2f64ab64549251d59cf976f856d76bbe_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\nircmd.exe 2f64ab64549251d59cf976f856d76bbe_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2280 1204 2f64ab64549251d59cf976f856d76bbe_JaffaCakes118.exe 84 PID 1204 wrote to memory of 2280 1204 2f64ab64549251d59cf976f856d76bbe_JaffaCakes118.exe 84 PID 1204 wrote to memory of 2280 1204 2f64ab64549251d59cf976f856d76bbe_JaffaCakes118.exe 84 PID 2280 wrote to memory of 1528 2280 cmd.exe 86 PID 2280 wrote to memory of 1528 2280 cmd.exe 86 PID 2280 wrote to memory of 1528 2280 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f64ab64549251d59cf976f856d76bbe_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2f64ab64549251d59cf976f856d76bbe_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\WINDOWS\system32\0.cmd" "2⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\WINDOWS\SysWOW64\mode.commode 90,203⤵PID:1528
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5baa9a9b8c8b4e96d11232410b3970e0f
SHA10347506ddea47b565a9529d8d1a5284eb6da3758
SHA2568e1a0fa98ea2e96885b8c3159730eed39f621f1599b6a64325833723ff66e020
SHA51261bea150c206c17ec6ee736d742357a992c7fda82397554af741b24bee695ce7dc5c73decba017690b9c4d28eaa3e6f5f4913b0cb3da8715b42756f099fc0a94