Analysis
-
max time kernel
94s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2024 11:32
Static task
static1
Behavioral task
behavioral1
Sample
38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe
-
Size
259KB
-
MD5
38f151b5164d18158be1d6e3493a897d
-
SHA1
b3dd8da39983db5e8f582e1715e36b80eb51aaba
-
SHA256
516935769ce832ae4e31e38ae0764009f90b55208710b29987f9289bd4fafc3d
-
SHA512
94b73294bb46c4ecfd2ca32a27885c9f5ac99cfc7bce758e89d1dc7719c7dccaeef9558f96c94bfa734d603266397fa202e6f5a56401e1c497f9ce4a59fe3131
-
SSDEEP
6144:S16bnUWDUqJDdfMixNz9z+LS0X8W3Yp/UTxNbt0O4xy4qjqYq4lH:S16bULqFdEixN0j6/Oh0nxBgqYPH
Malware Config
Signatures
-
Event Triggered Execution: AppCert DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppCert DLLs loaded into processes.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation 38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe -
Loads dropped DLL 4 IoCs
pid Process 3924 38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe 2040 Process not Found 2528 rundll32.exe 4124 cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\findpugc.dll 38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe File created C:\Windows\system32\findpugc64.dll 38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1536 4124 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3924 38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe 3924 38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3924 wrote to memory of 2528 3924 38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe 86 PID 3924 wrote to memory of 2528 3924 38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe 86 PID 3924 wrote to memory of 4124 3924 38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe 91 PID 3924 wrote to memory of 4124 3924 38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe 91 PID 3924 wrote to memory of 4124 3924 38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe 91 PID 4124 wrote to memory of 3056 4124 cmd.exe 94 PID 4124 wrote to memory of 3056 4124 cmd.exe 94 PID 4124 wrote to memory of 3056 4124 cmd.exe 94 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3056 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\system32\findpugc64.dll",CreateProcessNotify2⤵
- Loads dropped DLL
PID:2528
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240636390.bat" "C:\Users\Admin\AppData\Local\Temp\38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\attrib.exeattrib -s -r -h"C:\Users\Admin\AppData\Local\Temp\38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe"3⤵
- Views/modifies file attributes
PID:3056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 4243⤵
- Program crash
PID:1536
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3924 -ip 39241⤵PID:2960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 4124 -ip 41241⤵PID:4740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97B
MD5d226a657b279c5fc0a892748230a56ff
SHA1fa7e4fb6d6de3c4769001cbfce0a00ba02ef28a5
SHA2569dae2767b8e3499d37418a75ddd04d457c7ec8d6c8f312ee109c95a8a97e7761
SHA51207d55ccf3b511c3be64f6dcd05cea3feaafb286196e5d7ba30016ab6d9c0d656fb7cde8eb1ce0ef28a41f1f3f00f0e29020c92479619fd43e4ed47b829f8bf2a
-
Filesize
88KB
MD5bbf62c6be49d997b450c940afb342de4
SHA1368d62826a0c24c60df60f4fa2a8ee29f5bce85b
SHA256f16332e20ace5a4610cb9ee1ca0fcea41bcbf6136224ba7fafc6d1d7d4fffd6d
SHA512745e718abfe25469436a30f12de77c65cec5f79d6552d98409d40f097130d1c3818f435200c6d34e46191e8fc687f42240d11b29bffbaf38a11cb5468d51f2f3
-
Filesize
97KB
MD5d3794ac0ee31e37e43a0f603051fe600
SHA1e4967d81ee19f2b947e7808031cb356a80248534
SHA256d183d2922fce4964f86c352f276241d2b4be1330c12b25491b6c668ff0c10989
SHA512c34725feb906ad23f96f1e12499df8c119707509d17b745f8f9ba6755c9caab82f1aee47048987dfd1b35c3337ddb63acb02cfe551797069b28ac3ccc9870551