Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2024 03:23
Static task
static1
Behavioral task
behavioral1
Sample
3785bf5aaf0d569feafcb95524065310_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3785bf5aaf0d569feafcb95524065310_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3785bf5aaf0d569feafcb95524065310_JaffaCakes118.exe
-
Size
2.3MB
-
MD5
3785bf5aaf0d569feafcb95524065310
-
SHA1
73b44de602508ed824a303823bf8038c591bd2d5
-
SHA256
f68b0a4144bccde0de22748573b63944731399f7dfd177cfcc879948ae67aefd
-
SHA512
218d1471043f078ec6bf45493aa7b14e2c0cfac7d698eb94d400f46d5b8dd763a49d767382c4f73667d8b6ea5a6647728ad2f9b060f12a51519476924358b79f
-
SSDEEP
49152:C8ze6dKC1muTGm4woezLyXRbvG+w8+zeeUDM:1hKC1m8AwogLWg8+AM
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation 3785bf5aaf0d569feafcb95524065310_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2732 DiskTrix UltimateDefrag.exe 1216 UDefrag.exe -
resource yara_rule behavioral2/memory/1216-52-0x0000000000400000-0x0000000000907000-memory.dmp upx behavioral2/memory/1216-50-0x0000000000400000-0x0000000000907000-memory.dmp upx behavioral2/memory/1216-76-0x0000000000400000-0x0000000000907000-memory.dmp upx -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: UDefrag.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1216 UDefrag.exe 1216 UDefrag.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 1216 UDefrag.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1216 UDefrag.exe 1216 UDefrag.exe 1216 UDefrag.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1652 wrote to memory of 2732 1652 3785bf5aaf0d569feafcb95524065310_JaffaCakes118.exe 86 PID 1652 wrote to memory of 2732 1652 3785bf5aaf0d569feafcb95524065310_JaffaCakes118.exe 86 PID 1652 wrote to memory of 2732 1652 3785bf5aaf0d569feafcb95524065310_JaffaCakes118.exe 86 PID 2732 wrote to memory of 1216 2732 DiskTrix UltimateDefrag.exe 87 PID 2732 wrote to memory of 1216 2732 DiskTrix UltimateDefrag.exe 87 PID 2732 wrote to memory of 1216 2732 DiskTrix UltimateDefrag.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\3785bf5aaf0d569feafcb95524065310_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3785bf5aaf0d569feafcb95524065310_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\DiskTrix UltimateDefrag.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\DiskTrix UltimateDefrag.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\DiskTrix UltimateDefrag\40000050700002i\UDefrag.exe
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1216
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD58dd53b7971d765297a1edf5993807f0b
SHA1a3c58d222c710c3126daf0607dbe3c550780a7a1
SHA2569f0cb6725b0aea15fd27e6e6d8e9eb12b5c4f03bcc6e05c79dc2a45f9933eb9f
SHA512415bd0761e84fb974574412384b38b6c8ecd3a78f7dc7fde1930583ac5569143cceb7d6222c45955012fbe9906bbf0380c8f8c3aa92b7ec9c11eee0f28954465
-
Filesize
7KB
MD54d6943ba4c97bcd917a0859b11c319fb
SHA1275554b3d17bea300b9a0ab05a37bc281e0d96f4
SHA256bf414de86b92c7c68c7cfe28c1ed63a829177eaef7ae2f8db580514f610e26dd
SHA512748b1090350a82b37aaf0da28dfa98e142ab28c07e21620907ca9bf4cedb05757ecdb74e99672351645c5fc2d3c06d72018ff55dfd0e570bf09ee1db9b7a0152
-
Filesize
36B
MD5ba84f28aed1570a0d51c6ab4090b5fea
SHA15c774ccefa8f1a5a22837bdca7a28d0f3958d8ef
SHA25614d84edde7937fb20d6f2114cad12584290a5934ed29d60b58d798348e6ec74f
SHA5122e58a692aeb9897e874731e663c45c8c92be6cf9ac53e199f1f101ba9887888e55c6717ef47d8ab400da1b82af1debb8a100a567836e9da121c2dd1daddc5080
-
Filesize
4KB
MD54ca350082ac8a8135124aed516af5721
SHA1b64ce0f99d1c8b3ebf9dfbc337beb0e03b3a4546
SHA2561f589592a73f77b3a9fdd1f247ac3a78685306eeac0d5939c9fbcb1213859f9d
SHA51289180752f759f960de41a8e6976a057c39b05772407d1c567f001e8fb38c1373efcf97b85937cc061db5ac50d6251aaa925548bfd21456d7327a1e4c158a5906