Analysis
-
max time kernel
93s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
35e0cb0b8dee099906f5805c67b4ea2b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
35e0cb0b8dee099906f5805c67b4ea2b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
35e0cb0b8dee099906f5805c67b4ea2b_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
35e0cb0b8dee099906f5805c67b4ea2b
-
SHA1
303b4ec12d9469ca244af09a9e2c25f7cc0b1028
-
SHA256
09be6e6b52b231cda4a6c6bc92847369b1a2d22df588c4cf2ca83fbd353fca25
-
SHA512
da44217e89b361a93b6f45ea6e1a0c78067dc42b0c085bf7d8510006acf300a8adc0fdfd0da75ce8008384ad726768a7cbe167fcb548873080e02bce50002255
-
SSDEEP
24576:94zGAtt6tP2jLB0EGb7PmcQYZs7zvtGuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuj:jA8PjlyQZUUuuuuuuuuuuuuuuuuuuuub
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 35e0cb0b8dee099906f5805c67b4ea2b_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1220 file1.exe 1224 file2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4508 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4508 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3648 wrote to memory of 1220 3648 35e0cb0b8dee099906f5805c67b4ea2b_JaffaCakes118.exe 84 PID 3648 wrote to memory of 1220 3648 35e0cb0b8dee099906f5805c67b4ea2b_JaffaCakes118.exe 84 PID 3648 wrote to memory of 1220 3648 35e0cb0b8dee099906f5805c67b4ea2b_JaffaCakes118.exe 84 PID 3648 wrote to memory of 1224 3648 35e0cb0b8dee099906f5805c67b4ea2b_JaffaCakes118.exe 85 PID 3648 wrote to memory of 1224 3648 35e0cb0b8dee099906f5805c67b4ea2b_JaffaCakes118.exe 85 PID 3648 wrote to memory of 1224 3648 35e0cb0b8dee099906f5805c67b4ea2b_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\35e0cb0b8dee099906f5805c67b4ea2b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\35e0cb0b8dee099906f5805c67b4ea2b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\file1.exe"C:\Users\Admin\AppData\Local\Temp\file1.exe"2⤵
- Executes dropped EXE
PID:1220
-
-
C:\Users\Admin\AppData\Local\Temp\file2.exe"C:\Users\Admin\AppData\Local\Temp\file2.exe"2⤵
- Executes dropped EXE
PID:1224
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f0 0x4dc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5ccf8d87453a68cb6869011400b0545c1
SHA15d360c58e05d84ca8e782bf2c162011e9ca15ab9
SHA256019867124ee085a7debc66ec60567295399e73d6802133f92ec9324d7a46ee18
SHA5125c8a460162b304be80b1c32835e55a39f4ed06f530b7a37e9c89f41910b69994dd4f4b749541f176481c2959722b442c5810c8c84547ba9a275fc88a195bef6a
-
Filesize
10KB
MD5acaffc518c78e2d9dee4aea29295fffe
SHA11ad0d99f9655684ed93b0cc0cffe753cbe9726f7
SHA256444214c9eda7cabf89c96fd25f199afa872596e07bca6d8adf9b971dc3aa74f0
SHA5129b47a8ccd15d0839107bf3230d0f45aae16a7a68f2cc1b6c07193e5817f77113f8c627ab0fade87b9f2cb34de22d0aa92c335910f12ecc81dc48eaaf8f61662b