Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
3b7bc7f492cfd473ec461c8b455357de_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3b7bc7f492cfd473ec461c8b455357de_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3b7bc7f492cfd473ec461c8b455357de_JaffaCakes118.exe
-
Size
77KB
-
MD5
3b7bc7f492cfd473ec461c8b455357de
-
SHA1
98bb125be79e458465d3a5ea356d3e9aaff1e636
-
SHA256
ec82bee3e40e707878d0c7618b864a7276cce64ff2783e9a7118fdf3700c1d53
-
SHA512
f606c7b1659cfa0fa8ce213c1da36be9cad8a788fdaf84b475b9592fbc85df129977418b07e382d3c3877dc6c7293833c91b544cdfcf51bdc77647e56435bb96
-
SSDEEP
1536:BRTi+Bwyj+ElS9DanycPgfT72aj53/KCY3L3RiAfLiZaK+Q:Ti0wE+El8DMdPgf1N3/VefLib
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation 3b7bc7f492cfd473ec461c8b455357de_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 904 wmplayer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1200 3580 WerFault.exe 82 3812 904 WerFault.exe 92 -
Runs net.exe
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3580 wrote to memory of 3676 3580 3b7bc7f492cfd473ec461c8b455357de_JaffaCakes118.exe 85 PID 3580 wrote to memory of 3676 3580 3b7bc7f492cfd473ec461c8b455357de_JaffaCakes118.exe 85 PID 3580 wrote to memory of 3676 3580 3b7bc7f492cfd473ec461c8b455357de_JaffaCakes118.exe 85 PID 3676 wrote to memory of 4148 3676 net.exe 88 PID 3676 wrote to memory of 4148 3676 net.exe 88 PID 3676 wrote to memory of 4148 3676 net.exe 88 PID 3580 wrote to memory of 904 3580 3b7bc7f492cfd473ec461c8b455357de_JaffaCakes118.exe 92 PID 3580 wrote to memory of 904 3580 3b7bc7f492cfd473ec461c8b455357de_JaffaCakes118.exe 92 PID 3580 wrote to memory of 904 3580 3b7bc7f492cfd473ec461c8b455357de_JaffaCakes118.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b7bc7f492cfd473ec461c8b455357de_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3b7bc7f492cfd473ec461c8b455357de_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\windows\SysWOW64\net.exe"C:\windows\system32\net.exe" stop wscsvc2⤵
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc3⤵PID:4148
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3580 -s 11122⤵
- Program crash
PID:1200
-
-
C:\Users\Admin\AppData\Local\Temp\wmplayer.exe"C:\Users\Admin\AppData\Local\Temp\wmplayer.exe"2⤵
- Executes dropped EXE
PID:904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 904 -s 2203⤵
- Program crash
PID:3812
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3580 -ip 35801⤵PID:4572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 904 -ip 9041⤵PID:4356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5c63a0a6d0379b60480c0e69f2647e97e
SHA1ec4d1e2d97ff5e062f614af611265a471e05b167
SHA2565a07b07b5c9d87db4e4340035b7315e52d9e9b7114662acb02d38f70f32067fd
SHA512be0d154fa7b3e9e967a6b593bcb41be4457d976b1f375289f9fa99d2f0dc9e45e82a1a542ba798edaab6b47ae0c5f61553942071a0753f6990e698cb3597e961