Analysis
-
max time kernel
92s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 12:37
Behavioral task
behavioral1
Sample
306643b7135eebe0b58a3deaadeb83aa_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
306643b7135eebe0b58a3deaadeb83aa_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
306643b7135eebe0b58a3deaadeb83aa_JaffaCakes118.exe
-
Size
8KB
-
MD5
306643b7135eebe0b58a3deaadeb83aa
-
SHA1
515d260060a238cb83566f9d9db624f6b28af5d9
-
SHA256
e9ae025329b779d2fc58f410df66281c66d3ae01c560b9183f258600556f4e76
-
SHA512
eed1435d55e07ca2eab7005222f92b4eb3bd066695c876f18abce8bc8dcc361aed61684e7ccd45f7d111edfe8d67bd08fbce84dc4c5485819c2da9feae7f5a6f
-
SSDEEP
192:v4NZbcx/SD4quVTkbJaZ+zEFaNJhLkwcud2DH9VwGfct8uH:v478SD4aaAsaNJawcudoD7UWQ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Control Panel\International\Geo\Nation 306643b7135eebe0b58a3deaadeb83aa_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 1 IoCs
pid Process 1480 b2e.exe -
resource yara_rule behavioral2/memory/4100-0-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/4100-10-0x0000000000400000-0x0000000000409000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Discovers systems in the same network 1 TTPs 1 IoCs
pid Process 1204 net.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4100 wrote to memory of 1480 4100 306643b7135eebe0b58a3deaadeb83aa_JaffaCakes118.exe 84 PID 4100 wrote to memory of 1480 4100 306643b7135eebe0b58a3deaadeb83aa_JaffaCakes118.exe 84 PID 4100 wrote to memory of 1480 4100 306643b7135eebe0b58a3deaadeb83aa_JaffaCakes118.exe 84 PID 1480 wrote to memory of 1800 1480 b2e.exe 86 PID 1480 wrote to memory of 1800 1480 b2e.exe 86 PID 1480 wrote to memory of 1800 1480 b2e.exe 86 PID 1800 wrote to memory of 4220 1800 cmd.exe 89 PID 1800 wrote to memory of 4220 1800 cmd.exe 89 PID 1800 wrote to memory of 4220 1800 cmd.exe 89 PID 4220 wrote to memory of 1896 4220 net.exe 90 PID 4220 wrote to memory of 1896 4220 net.exe 90 PID 4220 wrote to memory of 1896 4220 net.exe 90 PID 1800 wrote to memory of 2520 1800 cmd.exe 91 PID 1800 wrote to memory of 2520 1800 cmd.exe 91 PID 1800 wrote to memory of 2520 1800 cmd.exe 91 PID 2520 wrote to memory of 3484 2520 net.exe 92 PID 2520 wrote to memory of 3484 2520 net.exe 92 PID 2520 wrote to memory of 3484 2520 net.exe 92 PID 1800 wrote to memory of 4812 1800 cmd.exe 93 PID 1800 wrote to memory of 4812 1800 cmd.exe 93 PID 1800 wrote to memory of 4812 1800 cmd.exe 93 PID 4812 wrote to memory of 4152 4812 net.exe 94 PID 4812 wrote to memory of 4152 4812 net.exe 94 PID 4812 wrote to memory of 4152 4812 net.exe 94 PID 1800 wrote to memory of 4060 1800 cmd.exe 95 PID 1800 wrote to memory of 4060 1800 cmd.exe 95 PID 1800 wrote to memory of 4060 1800 cmd.exe 95 PID 4060 wrote to memory of 452 4060 net.exe 96 PID 4060 wrote to memory of 452 4060 net.exe 96 PID 4060 wrote to memory of 452 4060 net.exe 96 PID 1800 wrote to memory of 1416 1800 cmd.exe 97 PID 1800 wrote to memory of 1416 1800 cmd.exe 97 PID 1800 wrote to memory of 1416 1800 cmd.exe 97 PID 1416 wrote to memory of 4412 1416 net.exe 98 PID 1416 wrote to memory of 4412 1416 net.exe 98 PID 1416 wrote to memory of 4412 1416 net.exe 98 PID 1800 wrote to memory of 4108 1800 cmd.exe 99 PID 1800 wrote to memory of 4108 1800 cmd.exe 99 PID 1800 wrote to memory of 4108 1800 cmd.exe 99 PID 4108 wrote to memory of 1964 4108 net.exe 100 PID 4108 wrote to memory of 1964 4108 net.exe 100 PID 4108 wrote to memory of 1964 4108 net.exe 100 PID 1800 wrote to memory of 4960 1800 cmd.exe 101 PID 1800 wrote to memory of 4960 1800 cmd.exe 101 PID 1800 wrote to memory of 4960 1800 cmd.exe 101 PID 4960 wrote to memory of 1368 4960 net.exe 102 PID 4960 wrote to memory of 1368 4960 net.exe 102 PID 4960 wrote to memory of 1368 4960 net.exe 102 PID 1800 wrote to memory of 5112 1800 cmd.exe 103 PID 1800 wrote to memory of 5112 1800 cmd.exe 103 PID 1800 wrote to memory of 5112 1800 cmd.exe 103 PID 5112 wrote to memory of 3364 5112 net.exe 104 PID 5112 wrote to memory of 3364 5112 net.exe 104 PID 5112 wrote to memory of 3364 5112 net.exe 104 PID 1800 wrote to memory of 4368 1800 cmd.exe 105 PID 1800 wrote to memory of 4368 1800 cmd.exe 105 PID 1800 wrote to memory of 4368 1800 cmd.exe 105 PID 4368 wrote to memory of 3376 4368 net.exe 106 PID 4368 wrote to memory of 3376 4368 net.exe 106 PID 4368 wrote to memory of 3376 4368 net.exe 106 PID 1800 wrote to memory of 2092 1800 cmd.exe 107 PID 1800 wrote to memory of 2092 1800 cmd.exe 107 PID 1800 wrote to memory of 2092 1800 cmd.exe 107 PID 2092 wrote to memory of 3276 2092 net.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\306643b7135eebe0b58a3deaadeb83aa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\306643b7135eebe0b58a3deaadeb83aa_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\D002.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\D002.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\D002.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\306643b7135eebe0b58a3deaadeb83aa_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\D169.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\net.exenet stop AVP324⤵
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AVP325⤵PID:1896
-
-
-
C:\Windows\SysWOW64\net.exenet stop LOCKDOWN20004⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop LOCKDOWN20005⤵PID:3484
-
-
-
C:\Windows\SysWOW64\net.exenet stop AVP.EXE4⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AVP.EXE5⤵PID:4152
-
-
-
C:\Windows\SysWOW64\net.exenet stop CFINET324⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop CFINET325⤵PID:452
-
-
-
C:\Windows\SysWOW64\net.exenet stop CFINET4⤵
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop CFINET5⤵PID:4412
-
-
-
C:\Windows\SysWOW64\net.exenet stop ICMON4⤵
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ICMON5⤵PID:1964
-
-
-
C:\Windows\SysWOW64\net.exenet stop SAFEWEB4⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SAFEWEB5⤵PID:1368
-
-
-
C:\Windows\SysWOW64\net.exenet stop WEBSCANX4⤵
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WEBSCANX5⤵PID:3364
-
-
-
C:\Windows\SysWOW64\net.exenet stop ANTIVIR4⤵
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ANTIVIR5⤵PID:3376
-
-
-
C:\Windows\SysWOW64\net.exenet stop MCAFEE4⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MCAFEE5⤵PID:3276
-
-
-
C:\Windows\SysWOW64\net.exenet stop NORTON4⤵PID:2496
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NORTON5⤵PID:1940
-
-
-
C:\Windows\SysWOW64\net.exenet stop NVC954⤵PID:2408
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NVC955⤵PID:968
-
-
-
C:\Windows\SysWOW64\net.exenet stop FP-WIN4⤵PID:4312
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop FP-WIN5⤵PID:4128
-
-
-
C:\Windows\SysWOW64\net.exenet stop IOMON984⤵PID:4692
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop IOMON985⤵PID:4644
-
-
-
C:\Windows\SysWOW64\net.exenet stop PCCWIN984⤵PID:4980
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop PCCWIN985⤵PID:692
-
-
-
C:\Windows\SysWOW64\net.exenet stop F-PROT954⤵PID:4572
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop F-PROT955⤵PID:3660
-
-
-
C:\Windows\SysWOW64\net.exenet stop F-STOPW4⤵PID:3460
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop F-STOPW5⤵PID:1728
-
-
-
C:\Windows\SysWOW64\net.exenet stop PVIEW954⤵
- Discovers systems in the same network
PID:1204 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop PVIEW955⤵PID:2056
-
-
-
C:\Windows\SysWOW64\net.exenet stop NAVWNT4⤵PID:1764
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NAVWNT5⤵PID:5088
-
-
-
C:\Windows\SysWOW64\net.exenet stop NAVRUNR4⤵PID:4056
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NAVRUNR5⤵PID:2144
-
-
-
C:\Windows\SysWOW64\net.exenet stop NAVLU324⤵PID:3604
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NAVLU325⤵PID:1932
-
-
-
C:\Windows\SysWOW64\net.exenet stop NAVAPSVC4⤵PID:2448
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NAVAPSVC5⤵PID:1540
-
-
-
C:\Windows\SysWOW64\net.exenet stop NISUM4⤵PID:4340
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NISUM5⤵PID:4364
-
-
-
C:\Windows\SysWOW64\net.exenet stop SYMPROXYSVC4⤵PID:836
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SYMPROXYSVC5⤵PID:3812
-
-
-
C:\Windows\SysWOW64\net.exenet stop RESCUE324⤵PID:1188
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop RESCUE325⤵PID:3236
-
-
-
C:\Windows\SysWOW64\net.exenet stop NISSERV4⤵PID:4708
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NISSERV5⤵PID:4992
-
-
-
C:\Windows\SysWOW64\net.exenet stop ATRACK4⤵PID:712
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ATRACK5⤵PID:4448
-
-
-
C:\Windows\SysWOW64\net.exenet stop IAMAPP4⤵PID:228
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop IAMAPP5⤵PID:3044
-
-
-
C:\Windows\SysWOW64\net.exenet stop LUCOMSERVER4⤵PID:4796
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop LUCOMSERVER5⤵PID:1740
-
-
-
C:\Windows\SysWOW64\net.exenet stop LUALL4⤵PID:3892
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop LUALL5⤵PID:4528
-
-
-
C:\Windows\SysWOW64\net.exenet stop NMAIN4⤵PID:3520
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NMAIN5⤵PID:436
-
-
-
C:\Windows\SysWOW64\net.exenet stop NAVW324⤵PID:4912
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NAVW325⤵PID:3496
-
-
-
C:\Windows\SysWOW64\net.exenet stop NAVAPW324⤵PID:3580
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NAVAPW325⤵PID:4072
-
-
-
C:\Windows\SysWOW64\net.exenet stop VSSTAT4⤵PID:3288
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VSSTAT5⤵PID:2008
-
-
-
C:\Windows\SysWOW64\net.exenet stop VSHWIN324⤵PID:3488
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VSHWIN325⤵PID:4172
-
-
-
C:\Windows\SysWOW64\net.exenet stop AVSYNMGR4⤵PID:3300
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AVSYNMGR5⤵PID:3640
-
-
-
C:\Windows\SysWOW64\net.exenet stop AVCONSOL4⤵PID:4804
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AVCONSOL5⤵PID:1160
-
-
-
C:\Windows\SysWOW64\net.exenet stop WEBTRAP4⤵PID:432
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WEBTRAP5⤵PID:4284
-
-
-
C:\Windows\SysWOW64\net.exenet stop POP3TRAP4⤵PID:4468
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop POP3TRAP5⤵PID:2044
-
-
-
C:\Windows\SysWOW64\net.exenet stop PCCMAIN4⤵PID:3340
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop PCCMAIN5⤵PID:3584
-
-
-
C:\Windows\SysWOW64\net.exenet stop PCCIOMON4⤵PID:1040
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop PCCIOMON5⤵PID:2988
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\selfdel0.bat" "3⤵PID:4736
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD55a262bdbb95238e659b5d47b0c899f0f
SHA19516fe585ec9904e57531968176abc8f495ef8c6
SHA256d68d4351820b88cb4d3a6a716f7f47d6054b803bf07692f4fce3a3cfe4b9a08a
SHA512388e7c67bb26670cd879eb259ed786744a63e9320f71c79e95a5ff4af723a7f90e6b30e51b399c24475d64612eb17bf1552ffeb48ca62cc183222080b94d82f0
-
Filesize
805B
MD53b3cc418f39107db71ee89e847e1f261
SHA11e1d7c5a213bbb917c76e91d9845b1895d4b2a78
SHA256d3612244d686c4db9dcf66b29e9b13687420f41b792d8633fcdd823bf2f63aca
SHA512b3c698dbe2b120c0857b7d97d1d5cbf3c8b1c220526ed82a347716220a3a3060140ee4fefbeec4a2d0d3d2cd4ac98e8ae850ad2bb7b350519ea6b05432206c14
-
Filesize
158B
MD5630cac92034741b92319f5eaf70502e6
SHA1420e6b8a3492babd58db00d4758814b0b5d085f1
SHA256bb634dd95493c7baaa3f498e70f038707ea139a8a5345e93662f7e52e10a8eef
SHA51295038b8655188f4a5f3b136558b6ee5b097ae686e19d9b15aa0675bbeee12310e34d1c14cddbd13ccb0fa5171925d738562a90cd3afa95ea6eb32858fe79c668