Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2024 18:27
Static task
static1
Behavioral task
behavioral1
Sample
46ff96f5af8ef17d5cc8e5a79dbfb40b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
46ff96f5af8ef17d5cc8e5a79dbfb40b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
46ff96f5af8ef17d5cc8e5a79dbfb40b_JaffaCakes118.exe
-
Size
17KB
-
MD5
46ff96f5af8ef17d5cc8e5a79dbfb40b
-
SHA1
239957f49617bb4de5c41bc20babb0638855b35d
-
SHA256
e0af586859b8acb210706bf8e31c7f06e83505ef96f3a0b696a97e38a032ed0f
-
SHA512
82b8fc1085b154df5ee97dfb69f619a7db0f2fdfd2ca0e6c6f078c3a337eed0d0930c8978042bcfa316fc1c5f24fd00de0ee6f328fc58a2932fadb7bcc4b46f9
-
SSDEEP
384:0edQZBSx4hO2fCRHDXEutzk0cSnCpacoqj771KZx5jI0/JGO+AxTr6+I9PfYUDrV:Pd6xnC9DUSzkPSCVzrx0/JGOJxqLoI4+
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation 46ff96f5af8ef17d5cc8e5a79dbfb40b_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 4432 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Darkbomb.dll 46ff96f5af8ef17d5cc8e5a79dbfb40b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4432 rundll32.exe 4432 rundll32.exe 4432 rundll32.exe 4432 rundll32.exe 4432 rundll32.exe 4432 rundll32.exe 4432 rundll32.exe 4432 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2556 2976 46ff96f5af8ef17d5cc8e5a79dbfb40b_JaffaCakes118.exe 86 PID 2976 wrote to memory of 2556 2976 46ff96f5af8ef17d5cc8e5a79dbfb40b_JaffaCakes118.exe 86 PID 2976 wrote to memory of 2556 2976 46ff96f5af8ef17d5cc8e5a79dbfb40b_JaffaCakes118.exe 86 PID 2556 wrote to memory of 4432 2556 cmd.exe 88 PID 2556 wrote to memory of 4432 2556 cmd.exe 88 PID 2556 wrote to memory of 4432 2556 cmd.exe 88 PID 2976 wrote to memory of 2804 2976 46ff96f5af8ef17d5cc8e5a79dbfb40b_JaffaCakes118.exe 89 PID 2976 wrote to memory of 2804 2976 46ff96f5af8ef17d5cc8e5a79dbfb40b_JaffaCakes118.exe 89 PID 2976 wrote to memory of 2804 2976 46ff96f5af8ef17d5cc8e5a79dbfb40b_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\46ff96f5af8ef17d5cc8e5a79dbfb40b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\46ff96f5af8ef17d5cc8e5a79dbfb40b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "c:\support338945a0.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe Darkbomb.dll FunctionStart3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4432
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\46FF96~1.EXE >> NUL2⤵PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD57de66c5ded87e8c7e46b1bc9ee2c5db2
SHA1ea9db0f6c616732e88b60e2339dea25ae3b4d109
SHA2565318c5930266539909563b14eec3b9a4ab8996bbdae808a94b51261546aeebf5
SHA5124c56dc2501244cd2b562aef18344fca823a72ac92e2619d8ead0a6714b159fdc14125018c63072c12a956c0501eef9b4e51563e4f4f01768805950b32aa31c9f
-
Filesize
39B
MD5d6ad254c75599ac9ceb317d261cfe354
SHA1f9c9bae9bdba0ea9d3c486e13cb554ec9b010909
SHA2563142a7859b079df4a8fd3daf7a9d0057dd2c18ca302c69a6f9526ee543c9a655
SHA512b05820cab51f66b5b8213359f0a0ddde125e3eab5fdfd196393dc805fc02fd9e72bdb1704cc0718131fc55a8b3d7cd7e54f53fa8140a187b508c443f6d85b473