Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2024 12:38
Behavioral task
behavioral1
Sample
41b1a972205a513bad7d2968ad841452_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
41b1a972205a513bad7d2968ad841452_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
41b1a972205a513bad7d2968ad841452_JaffaCakes118.exe
-
Size
200KB
-
MD5
41b1a972205a513bad7d2968ad841452
-
SHA1
fcf05750508beccecb4804627ae061d0f1062da2
-
SHA256
d855def96303fe7aa3c65760d6583ad821ff75e38dcb3e880147132ef0ebefe5
-
SHA512
fb581c63dab1d0d580c6bb0723e51f7666139d7deb87fb35185f8ed30f2326f433ead435ae5c02e52d8e6ff195fefe03212c0618fe9f7e12dab76f162b7d7dec
-
SSDEEP
3072:z06hibes47Knd9KNx2gMRBvc457TkoWhZAybh4m5m:z06he3nnnMx2gcvx57YoWPr4mg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation 41b1a972205a513bad7d2968ad841452_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation a.exe -
Executes dropped EXE 2 IoCs
pid Process 696 a.exe 1104 1.exe -
resource yara_rule behavioral2/memory/1168-0-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/files/0x00090000000234f9-5.dat upx behavioral2/memory/696-10-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/1168-12-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/696-23-0x0000000000400000-0x0000000000437000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1168 wrote to memory of 696 1168 41b1a972205a513bad7d2968ad841452_JaffaCakes118.exe 86 PID 1168 wrote to memory of 696 1168 41b1a972205a513bad7d2968ad841452_JaffaCakes118.exe 86 PID 1168 wrote to memory of 696 1168 41b1a972205a513bad7d2968ad841452_JaffaCakes118.exe 86 PID 696 wrote to memory of 1104 696 a.exe 87 PID 696 wrote to memory of 1104 696 a.exe 87 PID 696 wrote to memory of 1104 696 a.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\41b1a972205a513bad7d2968ad841452_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\41b1a972205a513bad7d2968ad841452_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\a.exe"C:\a.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Documents and Settings\1.exe"C:\Documents and Settings\1.exe"3⤵
- Executes dropped EXE
PID:1104
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5ed15f2b4113204402c46a0e516165715
SHA1c034ec5fe281494f933ed6bb312b9e607b1f9ff1
SHA256a2ff51aed42c85af59e18d576095be46eb8b45e43ba97e70f86c4df99bc74deb
SHA512413efb2c3f562bea358a1e4f34e6366216ff8eac7aa5e8cb346265fb7db7a31fba897f6d743d90becca261f318980ac0822ca3b4adfb34f892ebcd08fce4311c
-
Filesize
96KB
MD557dc599041e7caa1903cb728c24bdecf
SHA185a96ce06c1ed514f854c26d5e9cae3d01d06c02
SHA25651c5917ddcaa159c4cad91a18f54d9bda8d8ca2072350d48e18c93c957229a7a
SHA51270f592561929dbcf31c23b0a6fc43ef5173193ef09b6f56ada800dfd547221e88cc72dbe58cb3a47b5a7a062ef52c0fb1663ba45ca2a9bc69717e533469e88e6