Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 12:30
Static task
static1
Behavioral task
behavioral1
Sample
49c9f67f8d9feb5659126fcfff84b6d9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
49c9f67f8d9feb5659126fcfff84b6d9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
49c9f67f8d9feb5659126fcfff84b6d9_JaffaCakes118.exe
-
Size
160KB
-
MD5
49c9f67f8d9feb5659126fcfff84b6d9
-
SHA1
8398b9e7557403a604a522a8b9d9d2a0058b29c0
-
SHA256
8c30b9555c2fd0adf894a2b7bab272cdee27b507dcf0c2909c4b079716095a92
-
SHA512
95d32090db3238c37c9bab00b0f5425b3cc6730ba123b7d703ffeb55a0f215ae0a227d19265a0123b45a13fc308f25b753e6e384a3b2c67ed69649e75350edfc
-
SSDEEP
3072:7kKZpCS0uj/jn8R6BgBwJfZqH7mTNbap2VftOphUh:7kaUSXzjGBGfYbQOp4fW
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation 49c9f67f8d9feb5659126fcfff84b6d9_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2412 2920 49c9f67f8d9feb5659126fcfff84b6d9_JaffaCakes118.exe 86 PID 2920 wrote to memory of 2412 2920 49c9f67f8d9feb5659126fcfff84b6d9_JaffaCakes118.exe 86 PID 2920 wrote to memory of 2412 2920 49c9f67f8d9feb5659126fcfff84b6d9_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\49c9f67f8d9feb5659126fcfff84b6d9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\49c9f67f8d9feb5659126fcfff84b6d9_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Dfb..bat" > nul 2> nul2⤵PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD5f5da462149cf788e97f2c6f5d4cbfdef
SHA1dcab1228c6d298e6ce4aa41556d6c167f995321a
SHA256b88e1c2f7c96ed9c9cc241bd1d0ede04c61b927ebed249de580f12e6cd08f245
SHA512560ef5874d238c89f372d1bb2e948b50928c868ffbd337042da438ae32789a9b345e200c9fd2b4e8bec8ad106701977e103f40e47caab6b9864070b1503747db