Analysis
-
max time kernel
93s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2024 17:10
Static task
static1
Behavioral task
behavioral1
Sample
4298ca87055d12bac2e27723962997c6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4298ca87055d12bac2e27723962997c6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4298ca87055d12bac2e27723962997c6_JaffaCakes118.exe
-
Size
547KB
-
MD5
4298ca87055d12bac2e27723962997c6
-
SHA1
ca9a61b64e480f342a41c2ed39e70541ff0a5b24
-
SHA256
85f74e82a9804b8686169c13c6ef7ffef014f6cd156cd98a13851fe05c3fbc7b
-
SHA512
aa118d914adae972941c2066bbdafcdb5c08a7d7adf2ca1bec13fabac6653d2dc58a764f8a517ddbfa0da420f12bb5bb1fbe5e5ae87f5d0fd7eaa5a704979ee2
-
SSDEEP
6144:+8fd93ZBZMbqYgomHkMhEXeyp3PjroT2ORzuZ8MK5wWhxpH+2chSaeXfnCH:+cr3ZBIRxey3Pjg2k45KiWjkVFMCH
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation Set7D4E.tmp -
Executes dropped EXE 2 IoCs
pid Process 1420 Set7D4E.tmp 2900 SmartInstaller.exe -
Loads dropped DLL 1 IoCs
pid Process 2900 SmartInstaller.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SmartInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz SmartInstaller.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Software\Microsoft\Internet Explorer\IESettingSync SmartInstaller.exe Set value (int) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" SmartInstaller.exe Key created \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch SmartInstaller.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" SmartInstaller.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2900 SmartInstaller.exe 2900 SmartInstaller.exe 2900 SmartInstaller.exe 2900 SmartInstaller.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2460 wrote to memory of 1420 2460 4298ca87055d12bac2e27723962997c6_JaffaCakes118.exe 84 PID 2460 wrote to memory of 1420 2460 4298ca87055d12bac2e27723962997c6_JaffaCakes118.exe 84 PID 2460 wrote to memory of 1420 2460 4298ca87055d12bac2e27723962997c6_JaffaCakes118.exe 84 PID 1420 wrote to memory of 2900 1420 Set7D4E.tmp 87 PID 1420 wrote to memory of 2900 1420 Set7D4E.tmp 87 PID 1420 wrote to memory of 2900 1420 Set7D4E.tmp 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\4298ca87055d12bac2e27723962997c6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4298ca87055d12bac2e27723962997c6_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\Set7D4E.tmp"C:\Users\Admin\AppData\Local\Temp\Set7D4E.tmp"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\WPTPoker_Installer\SmartInstaller.exe"C:\Users\Admin\AppData\Local\Temp\WPTPoker_Installer\SmartInstaller.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2900
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
499KB
MD523b5f1d13ac22e8579b4ae56e3417111
SHA152092550102bf18ebd7ea37d1b687d9842e34feb
SHA25672a0138ed9c11a07826a955fdeaa2ca6cce324819c76a200196f00ac144ddb1d
SHA512e578bf90faef4ceb451a2e0706790c6cfe552be9df502a3d7d527b5b825d618e29408d2f155fe168f80141857ab77162ce94e28f078126b6c6721492e4944143
-
Filesize
25KB
MD5c24d9f52dbb034a480342551ab8a5c08
SHA151a7a0ac3e9bbfe573c186225610b113942bd8bf
SHA2569b369792fc959786f5b6b8aa55c0ae3e72daa597f38b29b18c54f378d22ee410
SHA512c80e24b8b6fbd62fda6a79f0dc24e9c0fb53077444f08add51fb5d80b6b70c97d19bbb52358896cad5074c9e067db3fd3a14506c6c56a470c5366396d87ff288
-
Filesize
1KB
MD5f3ac3c3da70135e5c545f14d4de896bd
SHA13cca4a3f37b681f9b72d85b5c3f613055fda0813
SHA2566efab541b9374af5a33f357770f16b51d3764a375b42262738ecd3ff5aa92f83
SHA512dd6df4cd3cc46f248d92a6466bd5b4d6a5467320bd598d2c414f0a2a7e756beb9a6e77e2e0a536f081b3a07b553940fc76ab7de08059f3591628559bbc2a0656
-
Filesize
56KB
MD55252ca1ec0ac7c5597c94ab77d3c3337
SHA19ead3438df9f5b4cf7085625d92e41e10e837820
SHA256cebac778cd3c979fad52940b4c0d06b20efc09745f1652a63ca03df837119d7a
SHA512aa25ed3270eef20debc14f8428e9dbaf6b32a54fd1376163771a40effa231eab33d67cd9f7a003ffd29ff3a9897cb06c4db28b1feef43114ac24e126fc582d7f
-
Filesize
23KB
MD59e24d0b9982b61afc80a2e864e12c86f
SHA150776d36efdb0a660f5781f63a2884e53becd884
SHA256f15140546b8464c59a3fa0fe8991d7132bab87465015a276c34966d995ab3020
SHA51242bcb36bcffc8ce08d78fcb930da5324ac8afa10c085a7f2ff6360db87483c1ea072fd54fb94f3a44a5669245b6ba59e966a62a716f3c33b021b3e05398947f9
-
Filesize
662KB
MD51ef40c198298e80630632e16e6a61d6c
SHA17463ec10a1f96aa3ae0356f056ccca0b2ef3618e
SHA2560eec8a0fb86c6968a18044cf0cee964dae1941c19b47f1314649d3bf5278c40a
SHA5123bf65a84091182d0b92c1c180e5e442462af15e264e249378adc7fe301ea8146d5329067203a679efc61f26fb8d24bcb8c432df0043a110deb8bb78e605cc9b4
-
Filesize
52KB
MD54965107d112666d3835308a831a29274
SHA150439b99ce525ecb74c554e1dc43ddb39481dfa4
SHA256105280995cd5746078d67b8651dfe4ad2abcd532d7ad528d3100c535b0b538af
SHA51238fa8f0eeadd75bf212eaab458833cfd3445d00f3d77f1f8a86b7c3ba99376231c8b3fc3cfdff6f02f2ca9c90956c76f9055717712d35a7ca7b30172a0010b59