Analysis
-
max time kernel
138s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 07:03
Static task
static1
Behavioral task
behavioral1
Sample
5aea67a02a6b56373d3d1e76e242b954_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5aea67a02a6b56373d3d1e76e242b954_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5aea67a02a6b56373d3d1e76e242b954_JaffaCakes118.exe
-
Size
230KB
-
MD5
5aea67a02a6b56373d3d1e76e242b954
-
SHA1
b89bc3981a5c7227815ec448422494df963e4f77
-
SHA256
5ccd1e41b61e1b817ffb6a77165b856e5f28fbd6f69920bea9a99a398bf46766
-
SHA512
b84762eb8ee6a7d1f93577178c72fb8502a1607e04043fd18bc534e893325ee3a8704c50191a7451549dc37fd1218187da0400251e59be40917ce740eec0c5bf
-
SSDEEP
6144:+Rgym92YGB+40vPLGPA49dachomI69VaxYc:+6fu+40vPE19Vjc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation winvnc.exe -
Executes dropped EXE 2 IoCs
pid Process 1288 winvnc.exe 2200 winvnc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1288 winvnc.exe 1288 winvnc.exe 1288 winvnc.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1288 winvnc.exe 1288 winvnc.exe 1288 winvnc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3224 wrote to memory of 1288 3224 5aea67a02a6b56373d3d1e76e242b954_JaffaCakes118.exe 86 PID 3224 wrote to memory of 1288 3224 5aea67a02a6b56373d3d1e76e242b954_JaffaCakes118.exe 86 PID 3224 wrote to memory of 1288 3224 5aea67a02a6b56373d3d1e76e242b954_JaffaCakes118.exe 86 PID 1288 wrote to memory of 2200 1288 winvnc.exe 95 PID 1288 wrote to memory of 2200 1288 winvnc.exe 95 PID 1288 wrote to memory of 2200 1288 winvnc.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\5aea67a02a6b56373d3d1e76e242b954_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5aea67a02a6b56373d3d1e76e242b954_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\7zS9952.tmp\winvnc.exe.\winvnc.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\7zS9952.tmp\winvnc.exe"C:\Users\Admin\AppData\Local\Temp\7zS9952.tmp\winvnc.exe" -en_auc 993⤵
- Executes dropped EXE
PID:2200
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD504e85705e55fdce220278ebb75331baa
SHA1f8da5272ebdfd32239eed0374feb9d8a51d44c50
SHA256160191cc57be4f87d48284c12159308b7a59dbb0b062f9ae830c66b820eba662
SHA5121d35c18bde5776e9f575d3ff1cd867e0f986cb77db9a589733ff3671f6fa4fc874d25490515186534410965f1909b8a47bd9368cf36274792e143777d760c975
-
Filesize
50KB
MD5ef0f9d392c3d60187e2ddc415fae81eb
SHA16b9ecdb9795165a26ba1276bf9dbb2b738023373
SHA256deddf323de1af35d7d7ff4b135a820b459810387fcf7576cf5bd117a48e00de7
SHA51219976ba5c25047ef1762b62a44f5c3aaa0f48c9c930ea23a32a3a571f9c5486281ee94d60d112bed42e7c7c1098cfd564d9b05170f729e7ceb708714746486fb
-
Filesize
887B
MD5d333f8f9b469b23d840a825e3f8b259c
SHA1367fc4b51e74d664a5b16233d4a21ea2db39a87f
SHA256b29a45f18ac15f8d04b13138d6ee43fe7b9a2f7084b3b75a8d44686a1b57c13a
SHA512e06c8462c88cb6d86c95c0ff02e828eca5773f02c4ce2d6e5ca4ef7edf52ee80112261d2a3e08f153a007c22e33257e373121110d4f486874b9086720ee36ce7
-
Filesize
2KB
MD50ccb749da57a00a45a2b8282fb025421
SHA113cf4fa7f6bc745c3dbf3e59f49c64f086c06149
SHA25659afeda5ff0bdb4f24afceb1d291fb5310321aafb6f46f8e8e3c36419f00ad36
SHA51211afb94f8960b71621c2cdcd608153743f0320dcc7581bae057749a41faffae063f6e14ee830ac18f8170b7f34baec29b30fafb6bea3c4795f2d097d4de76d3e
-
Filesize
3KB
MD57f903fdbf772c460ba2bb90e7296109a
SHA1c13f93f5ca954fc60ae4393319a4acfda8aa7214
SHA2569d14b07630313d7473ef72974d3cc27f85bc34dbe74814431eadc1b698478108
SHA5124bb0f6859e83320caab4cddb22c6d9432febaf1e2c44ca49a97c24cbb472a8aa2f22545ca57fb6ee29b187b8c779087259d7c72f3784495f86f5605b2cd620ee
-
Filesize
240KB
MD5b4c64a5fda48e9c4ff91d7e7d93ddf5b
SHA1264dc61352a26ca136d8206ee40b58824a63ade7
SHA256d7a8b19d476c351b7f04b0582494b4153a2580d89af233d1f1db7ad46b9a947f
SHA5126e39c5432b064cfe190d14fe7bfc4b1ccfc3008bd18b1b98c10bcd666724a6a00650250055eea082ff5bc0007024dd0cc131aa109ed606952492f051e25f8c63