Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 06:37
Static task
static1
Behavioral task
behavioral1
Sample
5f671024e75422085dc41e41db5cdebc_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5f671024e75422085dc41e41db5cdebc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5f671024e75422085dc41e41db5cdebc_JaffaCakes118.exe
-
Size
196KB
-
MD5
5f671024e75422085dc41e41db5cdebc
-
SHA1
20a03e68a15eaaca7b662cc76aec66826f0cf035
-
SHA256
b4ff7c67db257bdb7ca593001665d2b405a827c17ff28eb3a19d4792a86aece9
-
SHA512
de7ab2e765a5796cf8da420766998d3f89ba49b61e811392f1ec84b8bc92357f0616572713e77ebe8fd01d80d6e6dc059621924bf1dbd7fdaa64c804f0080bb8
-
SSDEEP
3072:/pnNl+1h28o4j8ROcN7P1qPh2XxhkPzztiihyJHovpC7a6us4zQ0QIIbVaUdxv0q:Um84scBIs/k70IvpGTuJc0QI2aCl
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation 1.exe -
Executes dropped EXE 2 IoCs
pid Process 2540 1.exe 244 tmp1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5f671024e75422085dc41e41db5cdebc_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 244 tmp1.exe 244 tmp1.exe 244 tmp1.exe 244 tmp1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2540 1.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2540 2500 5f671024e75422085dc41e41db5cdebc_JaffaCakes118.exe 84 PID 2500 wrote to memory of 2540 2500 5f671024e75422085dc41e41db5cdebc_JaffaCakes118.exe 84 PID 2500 wrote to memory of 2540 2500 5f671024e75422085dc41e41db5cdebc_JaffaCakes118.exe 84 PID 2540 wrote to memory of 244 2540 1.exe 86 PID 2540 wrote to memory of 244 2540 1.exe 86 PID 2540 wrote to memory of 244 2540 1.exe 86 PID 244 wrote to memory of 3428 244 tmp1.exe 55 PID 244 wrote to memory of 3428 244 tmp1.exe 55 PID 244 wrote to memory of 3428 244 tmp1.exe 55 PID 244 wrote to memory of 3428 244 tmp1.exe 55
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\5f671024e75422085dc41e41db5cdebc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5f671024e75422085dc41e41db5cdebc_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\tmp1.exe"C:\Users\Admin\AppData\Local\Temp\tmp1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:244
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5922afb010474416d3eee7a7c963cf526
SHA193b52223888f28be2c779c508e17cec6d4694cbe
SHA25626d972ca7a8a94ae876581325097e9d69b8df3aacf076c0e1a8109565859e35a
SHA512986d313d22a316a959ca08c76b14d68e7b9ab825785be7dbf2d62a3a92cd9c0d2dee32ce6bf4761bbb8b2c10411f9dc9995486997b7f9eb14974eb8d2f50bda7
-
Filesize
31KB
MD54b818e975f37d13e27aa9e7fec7a3c2a
SHA131c4c4261a17fbefca336062f48e7c6537ab30d5
SHA256c08386ecdaec2f4b0fd82b934d5a87413e8dcc212df49874817296ce74fdd9c8
SHA51295a9d3fea5288a74f56a068393253ab7bf8903591156c454b8a008192c2e6a4c025f35d0d2cd5d579ff210c27ba2f4171abd3a9c2c750516a397b23dc5bd8e77