Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 17:35
Static task
static1
Behavioral task
behavioral1
Sample
5cf549c049bf768d3348dee19c717b7c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5cf549c049bf768d3348dee19c717b7c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5cf549c049bf768d3348dee19c717b7c_JaffaCakes118.exe
-
Size
68KB
-
MD5
5cf549c049bf768d3348dee19c717b7c
-
SHA1
a2a33a59b49b07c7de156b8a48ae31da5d5f2790
-
SHA256
def88184d5acbfb75a90c9d203feeaf2a0888dbf43709a7991a15a3dbfa1cac5
-
SHA512
d950a036bdd2b87e338f80ebe4a9549c4febe32e8e55401fa4488c8552fa56b2e91bab5d5abb9dab4177680bcb345d915aee8330618c0a1811c9472144e931a0
-
SSDEEP
1536:3n/oYXOWeY7eqORvtn//3z0wR3uDF5wSd9lDoo:3/o0e6eqUvFb0wR3uDFtdLso
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation 5cf549c049bf768d3348dee19c717b7c_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2612 SMSS.EXE -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\Tasks\SMSS.EXE 5cf549c049bf768d3348dee19c717b7c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 5cf549c049bf768d3348dee19c717b7c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2612 2688 5cf549c049bf768d3348dee19c717b7c_JaffaCakes118.exe 85 PID 2688 wrote to memory of 2612 2688 5cf549c049bf768d3348dee19c717b7c_JaffaCakes118.exe 85 PID 2688 wrote to memory of 2612 2688 5cf549c049bf768d3348dee19c717b7c_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cf549c049bf768d3348dee19c717b7c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5cf549c049bf768d3348dee19c717b7c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\WINDOWS\Tasks\SMSS.EXE"C:\WINDOWS\Tasks\SMSS.EXE"2⤵
- Executes dropped EXE
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD546a84d5fd9399ddf2efb8cf176b44fa4
SHA1fff84811b9da3e8f585010ec07bc65cc449c87d9
SHA2566bce52214fd5f3671497e336b20440baf3c57fc07e7959bee9b97e07a2e40b35
SHA5122400cd8ff9d33a5a107f9556d3d5740cc12295a5ea746bfc6715e839f0ecc5d854ea3a6772193257ecf18797c2064de8ba6e18ec166f4b7f4aab3ed67a789638