Analysis
-
max time kernel
126s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
30b57f1da8d368cdecd204ecff216cc7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
30b57f1da8d368cdecd204ecff216cc7_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
30b57f1da8d368cdecd204ecff216cc7_JaffaCakes118.exe
-
Size
5.7MB
-
MD5
30b57f1da8d368cdecd204ecff216cc7
-
SHA1
e04aefa6a163b6b2516bc8a1f1c6e5023627a996
-
SHA256
eb2bf143b7eb3cf09e17af4946aec7baf1c7da5ae6f39d1f8b72ff65a5633762
-
SHA512
b14195acf9d61d5d80eae3a3e0773c46f434667841f2f38cb896d75725511cb267b4ef80c8e0be9558b2f2a7c86ece47265c3f5daae7b4650955320701c3b5ec
-
SSDEEP
98304:yL4cwhKaZm98WL2zlbqSNzkSwFCSXMcKGXXxItI/ITPAJhLhHGTsPrCyc9i6Mlgr:4EhKapXbHqJXsOE4XhOUkinlgUGr
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-661257284-3186977026-4220467887-1000\Control Panel\International\Geo\Nation 4021.tmp -
Deletes itself 1 IoCs
pid Process 4808 4021.tmp -
Executes dropped EXE 1 IoCs
pid Process 4808 4021.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-661257284-3186977026-4220467887-1000_Classes\Local Settings 4021.tmp -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1772 WINWORD.EXE 1772 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 1772 WINWORD.EXE 1772 WINWORD.EXE 1772 WINWORD.EXE 1772 WINWORD.EXE 1772 WINWORD.EXE 1772 WINWORD.EXE 1772 WINWORD.EXE 1772 WINWORD.EXE 1772 WINWORD.EXE 1772 WINWORD.EXE 1772 WINWORD.EXE 1772 WINWORD.EXE 1772 WINWORD.EXE 1772 WINWORD.EXE 1772 WINWORD.EXE 1772 WINWORD.EXE 1772 WINWORD.EXE 1772 WINWORD.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2224 wrote to memory of 4808 2224 30b57f1da8d368cdecd204ecff216cc7_JaffaCakes118.exe 89 PID 2224 wrote to memory of 4808 2224 30b57f1da8d368cdecd204ecff216cc7_JaffaCakes118.exe 89 PID 2224 wrote to memory of 4808 2224 30b57f1da8d368cdecd204ecff216cc7_JaffaCakes118.exe 89 PID 4808 wrote to memory of 1772 4808 4021.tmp 93 PID 4808 wrote to memory of 1772 4808 4021.tmp 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\30b57f1da8d368cdecd204ecff216cc7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\30b57f1da8d368cdecd204ecff216cc7_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\4021.tmp"C:\Users\Admin\AppData\Local\Temp\4021.tmp"2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\30b57f1da8d368cdecd204ecff216cc7_JaffaCakes118.doc" /o ""3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1772
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4160,i,18267267250369716772,14567143188126594249,262144 --variations-seed-version --mojo-platform-channel-handle=4388 /prefetch:81⤵PID:2784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD59e446d33e546c8756f04bf31c77f7cc7
SHA13e153d2a879b7d83b7f0d9f5f3ac0d5ffcc2bcbd
SHA256a5cd55b45db10ac6b1e97319f6998e1b4edb3ccc29fb66be10d7ac85a9a91510
SHA5124fd1b3849695c84a62f3a6de9d2e64f8e33c57be9ff57abb2cc4f34d0d5c11d65e083fa397490ac969892207f2ad70132eaf8643a54701e6854c0805e7b53547
-
Filesize
5.7MB
MD540cbdb52bfcc9921c6f3276b8fe19d01
SHA15544ce4d7f9ac5adc25c64ff5c6fb45b1832bd8a
SHA256d49feac9114dd66f3fcb9d6759c202abcbd492145e3e420c12e68656bb53fc4c
SHA5122bdeef9c88d6733dcad8453cbd4988b939149322e577e6b1096f267dd6d83953d0766429d6028a54abd47c5ebd881ce6528cd2033806e83be533716d5b9db0e3
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD588463c72bfc3181610a91cd2bbf587bd
SHA1eb8f14275d4b49c185c0dc4d8f5c7221d0b2125e
SHA256d7b62d3ed7ba5f0d3cc966a3461863a94c17e7743a4b6b5f97695b02ffce21bf
SHA512baff2689ba3af87d5bdcd6b14b371db0ad9364b7160b56f1f4db26616c3a1d0551abc99791204b1928706f6d13f8ed3304a25135eb196f4ca9669440da9b741b