Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 13:55
Static task
static1
Behavioral task
behavioral1
Sample
5c3933693bb1f8e91a45288d8f37c66d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5c3933693bb1f8e91a45288d8f37c66d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5c3933693bb1f8e91a45288d8f37c66d_JaffaCakes118.exe
-
Size
4.1MB
-
MD5
5c3933693bb1f8e91a45288d8f37c66d
-
SHA1
bf724a7e8abedd20d0cacc3907d9127aa8ff964d
-
SHA256
60fe3c6c3b037ec554e2aabf4072837a4b2b908828cc30c528469f89d9be7a00
-
SHA512
b4973f5079727ba54c8a1c42a17801034a8530d6e380640ccebcb8a702299ea9cb73ed2268ffa8e2a88398f9ef7426f7c8834ec692cc193001859200170a0b02
-
SSDEEP
24576:OHXnCvcFNbUPZj9DtYs3eDA+h7RF9Lc48:0p/byB8R4b
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation 5c3933693bb1f8e91a45288d8f37c66d_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1988 dfds.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Roaming\\dfds.exe" dfds.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1988 dfds.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1988 dfds.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1988 1660 5c3933693bb1f8e91a45288d8f37c66d_JaffaCakes118.exe 87 PID 1660 wrote to memory of 1988 1660 5c3933693bb1f8e91a45288d8f37c66d_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c3933693bb1f8e91a45288d8f37c66d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5c3933693bb1f8e91a45288d8f37c66d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Roaming\dfds.exe"C:\Users\Admin\AppData\Roaming\dfds.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD5bf03edd0432c980e79920e1b4ab3dcd7
SHA1a05d07904fd7b07ffc9572d58468c6457ab48a91
SHA256dbb9cba62865ffd36ed5b8872ee451e5f8eb4a0c2382b4730ed98087346fb2dc
SHA5122c153e9c5f90e01561f92e95253f404ffb8a54f004a135fbadaae50964af686cf3c419526ecf50040f2ce5560cfbb73c323b10461a5f8e4a37a373d3a1460ebd