Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 17:12
Static task
static1
Behavioral task
behavioral1
Sample
3142e5bff1a9d74a024fbd080714fac7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3142e5bff1a9d74a024fbd080714fac7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3142e5bff1a9d74a024fbd080714fac7_JaffaCakes118.exe
-
Size
35KB
-
MD5
3142e5bff1a9d74a024fbd080714fac7
-
SHA1
7c531f6725964d03f92dd3585e219dcc3d31cc9c
-
SHA256
2d94d5491c4de96deed6bf4b10798178470728f2da0c0cd5fb8fcfdf5aaa0707
-
SHA512
354807a3e9657989aa61c48bbe7bf2fd228af7fc8b8dd5312c58efb4663031eb2134c9c3b90a2a6788309a8e3692d43e1b4e9b06762bb7df747147d65bc632e1
-
SSDEEP
384:46NASj10VEnGU1WLIioYZXXPXuXXUXXcXpRMtrb9RBr4UmEh0vboPpdZ6WZKDAfA:tuEnDhYcSb9ROXEyoBdZ67
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation 3142e5bff1a9d74a024fbd080714fac7_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3936 svchosts.exe 3136 svchosts.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2060 set thread context of 1452 2060 3142e5bff1a9d74a024fbd080714fac7_JaffaCakes118.exe 82 PID 3936 set thread context of 3136 3936 svchosts.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2060 3142e5bff1a9d74a024fbd080714fac7_JaffaCakes118.exe 3936 svchosts.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2060 wrote to memory of 1452 2060 3142e5bff1a9d74a024fbd080714fac7_JaffaCakes118.exe 82 PID 2060 wrote to memory of 1452 2060 3142e5bff1a9d74a024fbd080714fac7_JaffaCakes118.exe 82 PID 2060 wrote to memory of 1452 2060 3142e5bff1a9d74a024fbd080714fac7_JaffaCakes118.exe 82 PID 2060 wrote to memory of 1452 2060 3142e5bff1a9d74a024fbd080714fac7_JaffaCakes118.exe 82 PID 2060 wrote to memory of 1452 2060 3142e5bff1a9d74a024fbd080714fac7_JaffaCakes118.exe 82 PID 2060 wrote to memory of 1452 2060 3142e5bff1a9d74a024fbd080714fac7_JaffaCakes118.exe 82 PID 2060 wrote to memory of 1452 2060 3142e5bff1a9d74a024fbd080714fac7_JaffaCakes118.exe 82 PID 2060 wrote to memory of 1452 2060 3142e5bff1a9d74a024fbd080714fac7_JaffaCakes118.exe 82 PID 2060 wrote to memory of 1452 2060 3142e5bff1a9d74a024fbd080714fac7_JaffaCakes118.exe 82 PID 1452 wrote to memory of 3936 1452 3142e5bff1a9d74a024fbd080714fac7_JaffaCakes118.exe 84 PID 1452 wrote to memory of 3936 1452 3142e5bff1a9d74a024fbd080714fac7_JaffaCakes118.exe 84 PID 1452 wrote to memory of 3936 1452 3142e5bff1a9d74a024fbd080714fac7_JaffaCakes118.exe 84 PID 3936 wrote to memory of 3136 3936 svchosts.exe 86 PID 3936 wrote to memory of 3136 3936 svchosts.exe 86 PID 3936 wrote to memory of 3136 3936 svchosts.exe 86 PID 3936 wrote to memory of 3136 3936 svchosts.exe 86 PID 3936 wrote to memory of 3136 3936 svchosts.exe 86 PID 3936 wrote to memory of 3136 3936 svchosts.exe 86 PID 3936 wrote to memory of 3136 3936 svchosts.exe 86 PID 3936 wrote to memory of 3136 3936 svchosts.exe 86 PID 3936 wrote to memory of 3136 3936 svchosts.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3142e5bff1a9d74a024fbd080714fac7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3142e5bff1a9d74a024fbd080714fac7_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\3142e5bff1a9d74a024fbd080714fac7_JaffaCakes118.exe
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Roaming\svchosts.exe"C:\Users\Admin\AppData\Roaming\svchosts.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Roaming\svchosts.exe
- Executes dropped EXE
PID:3136
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD53142e5bff1a9d74a024fbd080714fac7
SHA17c531f6725964d03f92dd3585e219dcc3d31cc9c
SHA2562d94d5491c4de96deed6bf4b10798178470728f2da0c0cd5fb8fcfdf5aaa0707
SHA512354807a3e9657989aa61c48bbe7bf2fd228af7fc8b8dd5312c58efb4663031eb2134c9c3b90a2a6788309a8e3692d43e1b4e9b06762bb7df747147d65bc632e1