Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2024 16:50
Static task
static1
Behavioral task
behavioral1
Sample
35918a863217dfc0451e2ba7d26d6380_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
35918a863217dfc0451e2ba7d26d6380_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
35918a863217dfc0451e2ba7d26d6380_JaffaCakes118.exe
-
Size
631KB
-
MD5
35918a863217dfc0451e2ba7d26d6380
-
SHA1
5bfdd0fb5c41e177a05daba0285f1ec69d4e1271
-
SHA256
0690017b4af7a1c3aa237e5902d21e38f91d68f2d9036c191e4756cd66b762cc
-
SHA512
b1781779f4b0469f44b7562858fdff1cdd624a04235451cbe4e77ac857d60e28bbfd7178168ba021633a0af130b7ff2c307585ea651eda34778f86d853defb8c
-
SSDEEP
12288:UXFz23RuYQXkPtaqZ8bDS59aeqw+kQEaxol19VofYZuYg:/gr0PtaG59aaBQgl13rrg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation 35918a863217dfc0451e2ba7d26d6380_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 2772 СпмцйЛьЕша.exe 4288 СпмцйЛьЕша.exe 3132 СпмцйЛьЕша.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 3132 СпмцйЛьЕша.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 520 35918a863217dfc0451e2ba7d26d6380_JaffaCakes118.exe 2772 СпмцйЛьЕша.exe 4288 СпмцйЛьЕша.exe 3132 СпмцйЛьЕша.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 520 wrote to memory of 2772 520 35918a863217dfc0451e2ba7d26d6380_JaffaCakes118.exe 85 PID 520 wrote to memory of 2772 520 35918a863217dfc0451e2ba7d26d6380_JaffaCakes118.exe 85 PID 520 wrote to memory of 2772 520 35918a863217dfc0451e2ba7d26d6380_JaffaCakes118.exe 85 PID 2772 wrote to memory of 4288 2772 СпмцйЛьЕша.exe 86 PID 2772 wrote to memory of 4288 2772 СпмцйЛьЕша.exe 86 PID 2772 wrote to memory of 4288 2772 СпмцйЛьЕша.exe 86 PID 4288 wrote to memory of 3952 4288 СпмцйЛьЕша.exe 87 PID 4288 wrote to memory of 3952 4288 СпмцйЛьЕша.exe 87 PID 4288 wrote to memory of 3952 4288 СпмцйЛьЕша.exe 87 PID 4288 wrote to memory of 3952 4288 СпмцйЛьЕша.exe 87 PID 3132 wrote to memory of 3700 3132 СпмцйЛьЕша.exe 92 PID 3132 wrote to memory of 3700 3132 СпмцйЛьЕша.exe 92 PID 3132 wrote to memory of 3700 3132 СпмцйЛьЕша.exe 92 PID 3132 wrote to memory of 3700 3132 СпмцйЛьЕша.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\35918a863217dfc0451e2ba7d26d6380_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\35918a863217dfc0451e2ba7d26d6380_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:520 -
C:\ProgramData\СпмцйЛьЕша.exe"C:\ProgramData\СпмцйЛьЕша.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Roaming\speedlink\СпмцйЛьЕша.exeC:\Users\Admin\AppData\Roaming\speedlink\СпмцйЛьЕша.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe4⤵PID:3952
-
-
-
-
C:\Users\Admin\AppData\Roaming\speedlink\СпмцйЛьЕша.exeC:\Users\Admin\AppData\Roaming\speedlink\СпмцйЛьЕша.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
631KB
MD535918a863217dfc0451e2ba7d26d6380
SHA15bfdd0fb5c41e177a05daba0285f1ec69d4e1271
SHA2560690017b4af7a1c3aa237e5902d21e38f91d68f2d9036c191e4756cd66b762cc
SHA512b1781779f4b0469f44b7562858fdff1cdd624a04235451cbe4e77ac857d60e28bbfd7178168ba021633a0af130b7ff2c307585ea651eda34778f86d853defb8c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3419463127-3903270268-2580331543-1000\0f5007522459c86e95ffcc62f32308f1_da80f27c-12da-4232-b66b-1e1207d248ba
Filesize1KB
MD5bbe25c2da41e6d8dfa7ccfb8faa77e83
SHA1a6bdb7898ca04678aef607485e272e8e65528c9b
SHA2568727015fc15e0d68b2bc10f6c1667893721c94f2a72368995d95e3390e88933b
SHA5128c4144cfcbfa2cd0df7322d0e1202b164e8cbccd1ac16b6719f41116f0022d481cc1e2dc8c67a18ce2641d426b6fbf22cdb64d54cbd0db093f099040cbbe1f06