Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
18-07-2024 22:48
Behavioral task
behavioral1
Sample
59685132fd93ce55b04909b98deb752b_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
59685132fd93ce55b04909b98deb752b_JaffaCakes118.exe
-
Size
512KB
-
MD5
59685132fd93ce55b04909b98deb752b
-
SHA1
c5cdffe58a6c163d72af5e5dbc6c8bd243ea994b
-
SHA256
6c91bcf1fdcf127a063b2193ffc1c270fbec464950136ce16f7f76738fd86812
-
SHA512
019fe8142ecba7c6a843b1c6f5747e4e0fc01a42e6b79e48d8986b4f89b05e7c08a28d274ec2feb8bf697edf7f72103df39a07ad3436c88670dd2dc415ea35ae
-
SSDEEP
12288:kdBNKTCqqwXCcdgT89+MvA+BisqYpxHtMe:kLjQC+fs0/
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
59685132fd93ce55b04909b98deb752b_JaffaCakes118.execeuzd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation 59685132fd93ce55b04909b98deb752b_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation ceuzd.exe -
Executes dropped EXE 2 IoCs
Processes:
ceuzd.exetymux.exepid process 3656 ceuzd.exe 3532 tymux.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
tymux.exepid process 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe 3532 tymux.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
59685132fd93ce55b04909b98deb752b_JaffaCakes118.execeuzd.exedescription pid process target process PID 1528 wrote to memory of 3656 1528 59685132fd93ce55b04909b98deb752b_JaffaCakes118.exe ceuzd.exe PID 1528 wrote to memory of 3656 1528 59685132fd93ce55b04909b98deb752b_JaffaCakes118.exe ceuzd.exe PID 1528 wrote to memory of 3656 1528 59685132fd93ce55b04909b98deb752b_JaffaCakes118.exe ceuzd.exe PID 1528 wrote to memory of 1268 1528 59685132fd93ce55b04909b98deb752b_JaffaCakes118.exe cmd.exe PID 1528 wrote to memory of 1268 1528 59685132fd93ce55b04909b98deb752b_JaffaCakes118.exe cmd.exe PID 1528 wrote to memory of 1268 1528 59685132fd93ce55b04909b98deb752b_JaffaCakes118.exe cmd.exe PID 3656 wrote to memory of 3532 3656 ceuzd.exe tymux.exe PID 3656 wrote to memory of 3532 3656 ceuzd.exe tymux.exe PID 3656 wrote to memory of 3532 3656 ceuzd.exe tymux.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59685132fd93ce55b04909b98deb752b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\59685132fd93ce55b04909b98deb752b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ceuzd.exe"C:\Users\Admin\AppData\Local\Temp\ceuzd.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tymux.exe"C:\Users\Admin\AppData\Local\Temp\tymux.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_uinsey.batFilesize
304B
MD5745542790b95eb6628a91b4b733fe4d7
SHA1c3e07d996a8f38a420a9df15465ae8c07b1e2e0b
SHA2564389db0a4a50ea52bdb6b6493abc58970b19a2740d8d7165e78979335b7a872e
SHA5121cd2df444684e55db760fcef25e7ead5fda6234ca3b756d1fee90599b2ea8bd42687d66d166abd944c49294a5d97702b0fb44c6bb77b70b6072df32078ed6fe2
-
C:\Users\Admin\AppData\Local\Temp\ceuzd.exeFilesize
512KB
MD57e3e720211e380baf86c74d913122701
SHA1dd93460ba6a3444b0275eb8531034ec4638379e6
SHA256977295e8125700ff72704bef5319cea3feda487a3a4c09016eb3fe9c5bc375a6
SHA5126edc54c87d539b5315fb7eeab4d8a9a4ff628c9d7d8c4c8096f0e902188ef32ee61c62de3830b38843af196e245f53e15efd7d29c4b11d623e72d99422e75590
-
C:\Users\Admin\AppData\Local\Temp\golfinfo.iniFilesize
512B
MD579ce130f95900fc20651a4e9c851460e
SHA1468789f42b0be69711d499850a274aca562240ee
SHA256a03a8732ed4fc67888bdab3b30c7328d2901889d58d49a3ab332ffb168e280de
SHA512397370d10c02eb953778e8be3d9a7a3c19d19b359a4b5900259207bd409ebf316a363e842752eb40c12f863a9ae8e7d27c0f297af1fb44fdb8ee7c0da8188797
-
C:\Users\Admin\AppData\Local\Temp\tymux.exeFilesize
241KB
MD55ae48984242db53a2f6dd1e5ac0c5c80
SHA1de12d1326e4942a806764db24efb5661f7a94583
SHA25642d18df577d1f1a435345716099d4f1f882ce129a643fb4003b00abab11e65a7
SHA5125760c2e13e179dc5c87aec0703ef510002512276a4b2668b2e173d513e5ed1019a75db2a34a9f8978e58bef129e3f34bf33539135c6f069de1a9fe2ea0fa4552
-
memory/1528-0-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/3532-25-0x0000000000E80000-0x0000000000E81000-memory.dmpFilesize
4KB
-
memory/3532-24-0x0000000000830000-0x00000000008E6000-memory.dmpFilesize
728KB
-
memory/3532-27-0x0000000000830000-0x00000000008E6000-memory.dmpFilesize
728KB
-
memory/3532-28-0x0000000000830000-0x00000000008E6000-memory.dmpFilesize
728KB
-
memory/3532-29-0x0000000000830000-0x00000000008E6000-memory.dmpFilesize
728KB
-
memory/3532-30-0x0000000000830000-0x00000000008E6000-memory.dmpFilesize
728KB
-
memory/3532-31-0x0000000000830000-0x00000000008E6000-memory.dmpFilesize
728KB
-
memory/3656-12-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB