Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 12:47
Behavioral task
behavioral1
Sample
41ba112d61481c7ab9a469706ed9525a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
41ba112d61481c7ab9a469706ed9525a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
41ba112d61481c7ab9a469706ed9525a_JaffaCakes118.exe
-
Size
52KB
-
MD5
41ba112d61481c7ab9a469706ed9525a
-
SHA1
f13e62df9a3d6e9d1ec2d83305cbb09e2bb8405d
-
SHA256
1c4c30f7033c33dff3ba4f9ac9a823621ba0d14fb3718d5b55aa6db0171c2610
-
SHA512
7850de9b617fb8901947a18d44e448af8d966c593ed17cb4fbea8e9fda6be5532c974c2d1ecd6fba47e74e6ab72e29271ccf8f04371c3274e94921ed60c388ef
-
SSDEEP
768:OXlDxVg2LypX0oi9RU8ZtsfDF2sjOxoY6iJyQlDrDJPVynrFAiPUPcTPzG:OS2UEpR7ZKF2cOtBpPVyhAlB
Malware Config
Signatures
-
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/1460-1-0x0000000000400000-0x0000000000422000-memory.dmp Nirsoft -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 41ba112d61481c7ab9a469706ed9525a_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1460-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/1460-1-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 17 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0 41ba112d61481c7ab9a469706ed9525a_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components 41ba112d61481c7ab9a469706ed9525a_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Visibility 41ba112d61481c7ab9a469706ed9525a_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata 41ba112d61481c7ab9a469706ed9525a_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\VisibilityRoots 41ba112d61481c7ab9a469706ed9525a_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Software\Microsoft 41ba112d61481c7ab9a469706ed9525a_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Software\Microsoft\Windows 41ba112d61481c7ab9a469706ed9525a_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0 41ba112d61481c7ab9a469706ed9525a_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\ComponentStore_RandomString = "5YQ0O1ZCT5JX5ZRPCCH08QRT" 41ba112d61481c7ab9a469706ed9525a_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Assemblies 41ba112d61481c7ab9a469706ed9525a_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Software\Microsoft\Windows\CurrentVersion 41ba112d61481c7ab9a469706ed9525a_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment 41ba112d61481c7ab9a469706ed9525a_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide 41ba112d61481c7ab9a469706ed9525a_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\ComponentStore_RandomString = "TQ71K6AAV4NJHZ3ZH94VAV6H" 41ba112d61481c7ab9a469706ed9525a_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Installations 41ba112d61481c7ab9a469706ed9525a_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Software 41ba112d61481c7ab9a469706ed9525a_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Categories 41ba112d61481c7ab9a469706ed9525a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41ba112d61481c7ab9a469706ed9525a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\41ba112d61481c7ab9a469706ed9525a_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Modifies registry class
PID:1460
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2448