Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2024 10:30
Static task
static1
Behavioral task
behavioral1
Sample
3d02a8825e22cadbdc22a23b1a6ac0b0_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3d02a8825e22cadbdc22a23b1a6ac0b0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3d02a8825e22cadbdc22a23b1a6ac0b0_JaffaCakes118.exe
-
Size
41KB
-
MD5
3d02a8825e22cadbdc22a23b1a6ac0b0
-
SHA1
98573fa90b3152ba25424739e2cb8d4f9be81ee5
-
SHA256
028575ff56abc6babc165ee7089a506fb48bcfba3c796350dc2b353fbb19b99a
-
SHA512
3a0c600a5e0a23fa9a8cf53238dc1a851ec2f4e916ac86f04a7345e05a5b4aaf860d1ea1483dea4841b8e6c8a1c58868f1c6979b407d9cd4a0a0b6f80d9651ed
-
SSDEEP
768:QIBar1ZIZYnfI9opm6AIHIjaI7g9mVmUnUoNE/W5dRV8:pW1ZIZqI9opm6AIHIjzmUdNzd
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation sxhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation 3d02a8825e22cadbdc22a23b1a6ac0b0_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4924 sxhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2980 wrote to memory of 4924 2980 3d02a8825e22cadbdc22a23b1a6ac0b0_JaffaCakes118.exe 86 PID 2980 wrote to memory of 4924 2980 3d02a8825e22cadbdc22a23b1a6ac0b0_JaffaCakes118.exe 86 PID 2980 wrote to memory of 4924 2980 3d02a8825e22cadbdc22a23b1a6ac0b0_JaffaCakes118.exe 86 PID 2980 wrote to memory of 208 2980 3d02a8825e22cadbdc22a23b1a6ac0b0_JaffaCakes118.exe 87 PID 2980 wrote to memory of 208 2980 3d02a8825e22cadbdc22a23b1a6ac0b0_JaffaCakes118.exe 87 PID 2980 wrote to memory of 208 2980 3d02a8825e22cadbdc22a23b1a6ac0b0_JaffaCakes118.exe 87 PID 4924 wrote to memory of 3788 4924 sxhost.exe 89 PID 4924 wrote to memory of 3788 4924 sxhost.exe 89 PID 4924 wrote to memory of 3788 4924 sxhost.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d02a8825e22cadbdc22a23b1a6ac0b0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3d02a8825e22cadbdc22a23b1a6ac0b0_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\sxhost.exe"C:\Users\Admin\sxhost.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del C:\Users\Admin\sxhost.exe >> NUL3⤵PID:3788
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\3D02A8~1.EXE >> NUL2⤵PID:208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD53d02a8825e22cadbdc22a23b1a6ac0b0
SHA198573fa90b3152ba25424739e2cb8d4f9be81ee5
SHA256028575ff56abc6babc165ee7089a506fb48bcfba3c796350dc2b353fbb19b99a
SHA5123a0c600a5e0a23fa9a8cf53238dc1a851ec2f4e916ac86f04a7345e05a5b4aaf860d1ea1483dea4841b8e6c8a1c58868f1c6979b407d9cd4a0a0b6f80d9651ed