Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 01:07
Static task
static1
Behavioral task
behavioral1
Sample
3f983f434ea7ffb7848e46b9cb923d1d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3f983f434ea7ffb7848e46b9cb923d1d_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
3f983f434ea7ffb7848e46b9cb923d1d_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
3f983f434ea7ffb7848e46b9cb923d1d
-
SHA1
6a032ea5adf8afa7e247730b35d30d0ebd6f7772
-
SHA256
5ac7cbe150ef2257ae0ade9d5c248b7b32d62f734dfaf6e334659180661398e3
-
SHA512
421a5a3a9dd318915ae7db0309412f5a6646c24980eac5dfc44f7c0b0cc09daf47d6dfec64f7b94f2bf13b429857e3bd2c3ffc3d7365c0b765005b8ed5e29a0e
-
SSDEEP
49152:2KyNuJRerrlMLj87/KKoiTavyqBvMjE8rwhg:2KyNuKf53RayE8rwi
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 3f983f434ea7ffb7848e46b9cb923d1d_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3624 filesystemscan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4804 wrote to memory of 3624 4804 3f983f434ea7ffb7848e46b9cb923d1d_JaffaCakes118.exe 86 PID 4804 wrote to memory of 3624 4804 3f983f434ea7ffb7848e46b9cb923d1d_JaffaCakes118.exe 86 PID 4804 wrote to memory of 3624 4804 3f983f434ea7ffb7848e46b9cb923d1d_JaffaCakes118.exe 86 PID 4804 wrote to memory of 4480 4804 3f983f434ea7ffb7848e46b9cb923d1d_JaffaCakes118.exe 92 PID 4804 wrote to memory of 4480 4804 3f983f434ea7ffb7848e46b9cb923d1d_JaffaCakes118.exe 92 PID 4804 wrote to memory of 4480 4804 3f983f434ea7ffb7848e46b9cb923d1d_JaffaCakes118.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f983f434ea7ffb7848e46b9cb923d1d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3f983f434ea7ffb7848e46b9cb923d1d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\filesystemscan.exe"C:\Users\Admin\AppData\Local\Temp\filesystemscan.exe"2⤵
- Executes dropped EXE
PID:3624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "2⤵PID:4480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD5326b94940f7de63ae804542475bcdaf8
SHA11bf6365703fea037801cbc094fffbd3bb2b6f3c5
SHA256bc0fd2f193663646997b72924944faf77bdceedd0701aed2812c680528c6907f
SHA512e7557339ab8053914900f2ead62af6adf1c93749128e851e9fc06824f069ab257c916c15a8ca12301eb9e0e9362a71bfad85887b771bc0f7294c4774bac99b71
-
Filesize
2.2MB
MD50f67b7094ff20b957f57bf25b356a4bf
SHA120d4155e0b67f0f7c86603b3c3723b65d3d284ba
SHA256a85ba09841ba07704c7ba2f5dd6d05e002e57d20a15ec7ec06b6991ce97eaa64
SHA5120ae4a152fdf502aa24805ae2565c96524ab6228bbc8ec35fb529bf05bd9498442f22c1527a00e72cae8260726a09d330a9a691eb7d138b4bf442a268b7b2dfb7