Analysis
-
max time kernel
133s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 16:57
Static task
static1
Behavioral task
behavioral1
Sample
39fbc835735faed7d9ec207e38116c7a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
39fbc835735faed7d9ec207e38116c7a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
39fbc835735faed7d9ec207e38116c7a_JaffaCakes118.exe
-
Size
14KB
-
MD5
39fbc835735faed7d9ec207e38116c7a
-
SHA1
eba077abcc661cc033720a7fbace4add7f3e036e
-
SHA256
07cba4942c05fc9362f7bc54e8cc45a744238967e353c385f0cf2fd3c91e05c8
-
SHA512
febf30d977276ff6e86aae62f178cb0e35f2d548be5d93bbecf306e19b5e259247158c88186abef2538d119cdb03c7a47f59eb4680173a4545835de65c375b6b
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhY53:hDXWipuE+K3/SSHgxmh
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation DEM55AD.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation DEMAC39.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation DEM2C5.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation 39fbc835735faed7d9ec207e38116c7a_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation DEMA846.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation DEMFF11.exe -
Executes dropped EXE 6 IoCs
pid Process 4992 DEMA846.exe 2376 DEMFF11.exe 1460 DEM55AD.exe 2788 DEMAC39.exe 4824 DEM2C5.exe 5024 DEM58E4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4056 wrote to memory of 4992 4056 39fbc835735faed7d9ec207e38116c7a_JaffaCakes118.exe 87 PID 4056 wrote to memory of 4992 4056 39fbc835735faed7d9ec207e38116c7a_JaffaCakes118.exe 87 PID 4056 wrote to memory of 4992 4056 39fbc835735faed7d9ec207e38116c7a_JaffaCakes118.exe 87 PID 4992 wrote to memory of 2376 4992 DEMA846.exe 92 PID 4992 wrote to memory of 2376 4992 DEMA846.exe 92 PID 4992 wrote to memory of 2376 4992 DEMA846.exe 92 PID 2376 wrote to memory of 1460 2376 DEMFF11.exe 94 PID 2376 wrote to memory of 1460 2376 DEMFF11.exe 94 PID 2376 wrote to memory of 1460 2376 DEMFF11.exe 94 PID 1460 wrote to memory of 2788 1460 DEM55AD.exe 96 PID 1460 wrote to memory of 2788 1460 DEM55AD.exe 96 PID 1460 wrote to memory of 2788 1460 DEM55AD.exe 96 PID 2788 wrote to memory of 4824 2788 DEMAC39.exe 98 PID 2788 wrote to memory of 4824 2788 DEMAC39.exe 98 PID 2788 wrote to memory of 4824 2788 DEMAC39.exe 98 PID 4824 wrote to memory of 5024 4824 DEM2C5.exe 100 PID 4824 wrote to memory of 5024 4824 DEM2C5.exe 100 PID 4824 wrote to memory of 5024 4824 DEM2C5.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\39fbc835735faed7d9ec207e38116c7a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\39fbc835735faed7d9ec207e38116c7a_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\DEMA846.exe"C:\Users\Admin\AppData\Local\Temp\DEMA846.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\DEMFF11.exe"C:\Users\Admin\AppData\Local\Temp\DEMFF11.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\DEM55AD.exe"C:\Users\Admin\AppData\Local\Temp\DEM55AD.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\DEMAC39.exe"C:\Users\Admin\AppData\Local\Temp\DEMAC39.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\DEM2C5.exe"C:\Users\Admin\AppData\Local\Temp\DEM2C5.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\DEM58E4.exe"C:\Users\Admin\AppData\Local\Temp\DEM58E4.exe"7⤵
- Executes dropped EXE
PID:5024
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD57cc8c32bb10462082495218a5e3aa1a7
SHA1e8e4542dc4cf23d0b975f7f78a5be17452db2aa7
SHA25631bbdeb4bf18912eb56dc94d9e277fd27ebb668801c12a52c0befbfa07f704e1
SHA512417609e404d782fad0ec270e35706a17640f67e4365ce3e6e4d9b9954155b4dae7515e0ab5a82339b0e73eb1658cfb77352fecebab92ec2ee454e873d17b217a
-
Filesize
14KB
MD506466615c143c8cd94371fc258589fe8
SHA10453a7934c895555a95119d500cf92b0d743f3fc
SHA2569758420786145dc373d9b9aab9015a971eb3173daaf3fe1540ffd9201a4e4eb4
SHA512d8ba7fb703060de1d8254168c55f681c946c9e8f8a70803c69b3f56f66a48fe96544a2105f5153209821d830b660669f8aabf5223716d443e623388828ed48db
-
Filesize
14KB
MD569d2e940062116bbb08652e84c797574
SHA1a13a160acd6f9892c1efb885fcde2a5f83808351
SHA2568823dbcb7483c7cd6ab8880389c06607459990e7f4b8ccad41153841e8d6dc46
SHA512d52b5bc1601f336b9ee5e32a479d146339cb5682ae31aa2cd08592bf7d590d3617b64fde4d3350b62dc26873b23a63c4c019ad9367a235b86a08d2940a4787cd
-
Filesize
14KB
MD577d36b2357fb73b97043aae807089c61
SHA1a11a3836b8b891eabfd77a3e7e3a1a465d972a3c
SHA256d4c6b0680d17aa861d01d0f2ba17e67bd9477b53e6644684f8bb2392b472f504
SHA5125e4e4fac1fc46e4e6bf67e9f73ad968e3e381d2cfac0f30c7f4d3421e3e36e6c5467223bb8b40960aad169ea9ae0bad10752832d541bf3cf51af400a4a2c5015
-
Filesize
14KB
MD58b684c2c094414f83943db185b69fdb4
SHA1eee66622c510d8e627cbde38a2b049e42c446b93
SHA25685cef6b4424f89df5d6f9b2c4cf2292c0af9abec48b6ceb2995bf5b0f4b9dc42
SHA51202fdd535bb3047fae216da39ee628b9f5b8f858de1a7fbd5c510d7a1ea3a6fc8e78e543ff6704f517227eb5b22ae559053529a32f69c8379529110e1d2ea52bb
-
Filesize
14KB
MD5158f6d9395d14bbd50a52742e7bc889e
SHA17523aae43498f11e71f63b56b6258afc3897039a
SHA256fac490d7b581577c60dea5d58dceaa3af5b2f92fa7c8c10a5040858a3cda6d7d
SHA5126bb68adb9ea41222eddf3bc45be3b1823128e70e068b19a4bc8f11b496dc39794af01c3b0a7eba7f097ea2d5881900e8f6995e2c0d923a273b15f08a0e1f1fdf