Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 17:36
Static task
static1
Behavioral task
behavioral1
Sample
3153884cd334230ae7f903658f3c53a8_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3153884cd334230ae7f903658f3c53a8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3153884cd334230ae7f903658f3c53a8_JaffaCakes118.exe
-
Size
209KB
-
MD5
3153884cd334230ae7f903658f3c53a8
-
SHA1
30a81d50e92c5d668a3745eddfa8670f0b50dd00
-
SHA256
ebd613a73935411e5e313bc0759192b4b803c1cdc83a82640c0549cd4da94ea4
-
SHA512
0068e53e354ffd0f982cf17fed768cd254907feb58da1e4841d38584f2a2b2f76c55a717382c06d78f8f9a0f8699fd16187edcbed922d8935940d55fd947250b
-
SSDEEP
3072:PGbQlkUxuTQRmHhJtG+ETFmGvbq+pCja4KQGvZYAiXu8yDKTaxl2mnMLTYAQpC3c:ePKF1vbq+cWvZ+XuZ+WsCS5ojbam
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6151A1C6-330F-4F2F-86FB-E7AC53C4DAD0} DiVx.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6151A1C6-330F-4F2F-86FB-E7AC53C4DAD0}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\DiVx.EXE" DiVx.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation 3153884cd334230ae7f903658f3c53a8_JaffaCakes118.EXE -
Executes dropped EXE 2 IoCs
pid Process 1220 DiVx.exe 4944 DiVx.EXE -
resource yara_rule behavioral2/memory/1688-20-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral2/memory/1688-21-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral2/memory/1688-24-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral2/memory/1688-25-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral2/memory/1688-26-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral2/memory/1688-38-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral2/memory/4944-66-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral2/memory/4944-65-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral2/memory/4944-64-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral2/memory/4944-68-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral2/memory/4944-69-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral2/memory/4944-70-0x0000000000400000-0x0000000000465000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Direct9x = "C:\\Users\\Admin\\AppData\\Local\\DiVx.EXE" DiVx.EXE -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4468 set thread context of 1688 4468 3153884cd334230ae7f903658f3c53a8_JaffaCakes118.exe 84 PID 1220 set thread context of 4944 1220 DiVx.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4468 3153884cd334230ae7f903658f3c53a8_JaffaCakes118.exe 1220 DiVx.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4468 wrote to memory of 1688 4468 3153884cd334230ae7f903658f3c53a8_JaffaCakes118.exe 84 PID 4468 wrote to memory of 1688 4468 3153884cd334230ae7f903658f3c53a8_JaffaCakes118.exe 84 PID 4468 wrote to memory of 1688 4468 3153884cd334230ae7f903658f3c53a8_JaffaCakes118.exe 84 PID 4468 wrote to memory of 1688 4468 3153884cd334230ae7f903658f3c53a8_JaffaCakes118.exe 84 PID 4468 wrote to memory of 1688 4468 3153884cd334230ae7f903658f3c53a8_JaffaCakes118.exe 84 PID 4468 wrote to memory of 1688 4468 3153884cd334230ae7f903658f3c53a8_JaffaCakes118.exe 84 PID 4468 wrote to memory of 1688 4468 3153884cd334230ae7f903658f3c53a8_JaffaCakes118.exe 84 PID 4468 wrote to memory of 1688 4468 3153884cd334230ae7f903658f3c53a8_JaffaCakes118.exe 84 PID 1688 wrote to memory of 1220 1688 3153884cd334230ae7f903658f3c53a8_JaffaCakes118.EXE 85 PID 1688 wrote to memory of 1220 1688 3153884cd334230ae7f903658f3c53a8_JaffaCakes118.EXE 85 PID 1688 wrote to memory of 1220 1688 3153884cd334230ae7f903658f3c53a8_JaffaCakes118.EXE 85 PID 1220 wrote to memory of 4944 1220 DiVx.exe 86 PID 1220 wrote to memory of 4944 1220 DiVx.exe 86 PID 1220 wrote to memory of 4944 1220 DiVx.exe 86 PID 1220 wrote to memory of 4944 1220 DiVx.exe 86 PID 1220 wrote to memory of 4944 1220 DiVx.exe 86 PID 1220 wrote to memory of 4944 1220 DiVx.exe 86 PID 1220 wrote to memory of 4944 1220 DiVx.exe 86 PID 1220 wrote to memory of 4944 1220 DiVx.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3153884cd334230ae7f903658f3c53a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3153884cd334230ae7f903658f3c53a8_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\3153884cd334230ae7f903658f3c53a8_JaffaCakes118.EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\DiVx.exe"C:\Users\Admin\AppData\Local\DiVx.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\DiVx.EXE
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
PID:4944
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD53153884cd334230ae7f903658f3c53a8
SHA130a81d50e92c5d668a3745eddfa8670f0b50dd00
SHA256ebd613a73935411e5e313bc0759192b4b803c1cdc83a82640c0549cd4da94ea4
SHA5120068e53e354ffd0f982cf17fed768cd254907feb58da1e4841d38584f2a2b2f76c55a717382c06d78f8f9a0f8699fd16187edcbed922d8935940d55fd947250b