Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 04:55
Static task
static1
Behavioral task
behavioral1
Sample
44636e6e9b81704c92d0a8cea0a77b8e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
44636e6e9b81704c92d0a8cea0a77b8e_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
44636e6e9b81704c92d0a8cea0a77b8e_JaffaCakes118.exe
-
Size
88KB
-
MD5
44636e6e9b81704c92d0a8cea0a77b8e
-
SHA1
ade55c26b2b2d0d5666a978a7ed1a4b6d3a0ae49
-
SHA256
5d1c429a007814e75ea8e22367a894b5cc9203df3d1a5be3a915798f2396389c
-
SHA512
5b95bfbc36f488a73f2ae0293c79954ace08a6d0d64df4f20f83fc51c59217d92cc65c4173c172d3fbb29d6bb4659e4954d01eb300f18b3d91e79f202a578ef5
-
SSDEEP
768:xg3+1mTlezZEatuHqLPkhEryY5USTMSuHcj19lmVWUE2q7NRbCxX5HoL3/QZZHwq:xu+1meZmhtYhUKLPyQH2xEAAwT
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 44636e6e9b81704c92d0a8cea0a77b8e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2304 wrote to memory of 1472 2304 44636e6e9b81704c92d0a8cea0a77b8e_JaffaCakes118.exe 84 PID 2304 wrote to memory of 1472 2304 44636e6e9b81704c92d0a8cea0a77b8e_JaffaCakes118.exe 84 PID 2304 wrote to memory of 1472 2304 44636e6e9b81704c92d0a8cea0a77b8e_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\44636e6e9b81704c92d0a8cea0a77b8e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\44636e6e9b81704c92d0a8cea0a77b8e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\44636e6e9b81704c92d0a8cea0a77b8e_JaffaCakes118.exe" >> NUL2⤵PID:1472
-