Analysis
-
max time kernel
94s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
330ed0a5fd573ab43152090bc60042b1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
330ed0a5fd573ab43152090bc60042b1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
330ed0a5fd573ab43152090bc60042b1_JaffaCakes118.exe
-
Size
98KB
-
MD5
330ed0a5fd573ab43152090bc60042b1
-
SHA1
1081201a7abe23f1ec664c2e6bd4cb19b60b8c9a
-
SHA256
ad51bc901b607800615a8b76bc8fcd2f437c9b336c65981864b2fa4589ad7313
-
SHA512
bbfa2a425b96cfa4fbef0bb4baeafecab6b6cf1b412249283aeeaf7abd844ddd6850d77f2886a6c172d8e92588343c3ed89bdac5d4214d6b5f4b3c869cdf1af5
-
SSDEEP
3072:n26XBfNtRGduJfr6Wl1eAkqTDw9iP9IJ:n26pRkUF9Ts9iP9I
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation 330ed0a5fd573ab43152090bc60042b1_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1588 wrote to memory of 1332 1588 330ed0a5fd573ab43152090bc60042b1_JaffaCakes118.exe 84 PID 1588 wrote to memory of 1332 1588 330ed0a5fd573ab43152090bc60042b1_JaffaCakes118.exe 84 PID 1588 wrote to memory of 1332 1588 330ed0a5fd573ab43152090bc60042b1_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\330ed0a5fd573ab43152090bc60042b1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\330ed0a5fd573ab43152090bc60042b1_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\6E4A.tmp.bat" > nul 2> nul2⤵PID:1332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD518bb922b1b8ea405d36bad3fc48236f4
SHA1672272427a840cea7ea17a1a599f730d2adc34c4
SHA256d21474649b9ee667ad05ccedaa50748583691958de781fef6935c8399823b037
SHA512500d921e9b7e31cddff76a836abfdba3f5ec116e36c47b57d395027b09208f85f58e6c0077f547db2df3deb07606b090f81f297da9f921032c5c2da491c64b65