Analysis
-
max time kernel
140s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 05:57
Static task
static1
Behavioral task
behavioral1
Sample
37f409f1c229cebe24cad14e404920b8_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
37f409f1c229cebe24cad14e404920b8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
37f409f1c229cebe24cad14e404920b8_JaffaCakes118.exe
-
Size
387KB
-
MD5
37f409f1c229cebe24cad14e404920b8
-
SHA1
9004f1372b154dbb5eca25fcaec86b9c66725ee5
-
SHA256
e68a0886bd7f68410f34eb935a4affa38eb7828d0b0ec0a889e56b4ef400578c
-
SHA512
4b57a9c659348dc0403bc76aeaebdb1b8294469ea52795e12829d27f4402dcc3c39bfaf04c1dc3a8a2734da1d5f8fd2e13a6910406ad216f4ad9ea010011da18
-
SSDEEP
12288:uI0lhjFzMa3SOuo8xuWW/taUNdXYF3EyRl:uHlhdMESOuo8jwt79m0yD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation 37f409f1c229cebe24cad14e404920b8_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3640 pkh.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ian = "\"c:\\windows\\pla\\pkh.exe\"" 37f409f1c229cebe24cad14e404920b8_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created \??\c:\windows\pla\pkh.exe 37f409f1c229cebe24cad14e404920b8_JaffaCakes118.exe File created C:\Windows\b3577d2ef.log 37f409f1c229cebe24cad14e404920b8_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4148 37f409f1c229cebe24cad14e404920b8_JaffaCakes118.exe 4148 37f409f1c229cebe24cad14e404920b8_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4148 37f409f1c229cebe24cad14e404920b8_JaffaCakes118.exe 3640 pkh.exe 3640 pkh.exe 4148 37f409f1c229cebe24cad14e404920b8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4148 wrote to memory of 3640 4148 37f409f1c229cebe24cad14e404920b8_JaffaCakes118.exe 89 PID 4148 wrote to memory of 3640 4148 37f409f1c229cebe24cad14e404920b8_JaffaCakes118.exe 89 PID 4148 wrote to memory of 3640 4148 37f409f1c229cebe24cad14e404920b8_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\37f409f1c229cebe24cad14e404920b8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\37f409f1c229cebe24cad14e404920b8_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\windows\pla\pkh.exe"C:\windows\pla\pkh.exe" /i2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
387KB
MD537f409f1c229cebe24cad14e404920b8
SHA19004f1372b154dbb5eca25fcaec86b9c66725ee5
SHA256e68a0886bd7f68410f34eb935a4affa38eb7828d0b0ec0a889e56b4ef400578c
SHA5124b57a9c659348dc0403bc76aeaebdb1b8294469ea52795e12829d27f4402dcc3c39bfaf04c1dc3a8a2734da1d5f8fd2e13a6910406ad216f4ad9ea010011da18
-
Filesize
64B
MD5c5b97177ae610ef7929bfebaa6d043e6
SHA1f3184c324e50d19b4c50c597adba63d883227850
SHA256a7715db111c4d7eaf11cfc9b40fe8a1c32fd709476af5c653c03acfd4be592b9
SHA512365664f30389c2341755fbe6cfaa44deb242cdd00c7aa77c0e8041f75a9eb851522922c7bb43b46bb5af179ab74474386626c481eb6669fb9c3f664a4b1f5570