Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2024 22:54
Static task
static1
Behavioral task
behavioral1
Sample
61bd7ba17214e93a5254253f89d92c0e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
61bd7ba17214e93a5254253f89d92c0e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
61bd7ba17214e93a5254253f89d92c0e_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
61bd7ba17214e93a5254253f89d92c0e
-
SHA1
06997b41f31cefb98b9fe27cfa5d08d3501ee925
-
SHA256
e11ea56696aee36f40a7c0bd488e312c98ffdcb1f2d69ae0b567d3137c500211
-
SHA512
102ae3a96d4d058ebfe7fee35d1341aedf2cbe1bd07d6cc14fe36849f47ca80a033c3886ab92829d2b72794f0e028a31d3a2b2cccbfe744e7b3ad2c3f47f8871
-
SSDEEP
24576:0WgxYrrlOhjRQAp5TwQtdAlw0aB29N41WEVSZVs3n8QHw5AL:0WzARd9tdAlw0aB29N41WcSZW38qL
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation 61bd7ba17214e93a5254253f89d92c0e_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 4356 isass.exe 2732 pB0T.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\isass.exe = "\"C:\\Users\\Admin\\AppData\\Local\\isass.exe\" /background" isass.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1788 set thread context of 4356 1788 61bd7ba17214e93a5254253f89d92c0e_JaffaCakes118.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2732 pB0T.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1788 wrote to memory of 4356 1788 61bd7ba17214e93a5254253f89d92c0e_JaffaCakes118.exe 87 PID 1788 wrote to memory of 4356 1788 61bd7ba17214e93a5254253f89d92c0e_JaffaCakes118.exe 87 PID 1788 wrote to memory of 4356 1788 61bd7ba17214e93a5254253f89d92c0e_JaffaCakes118.exe 87 PID 1788 wrote to memory of 4356 1788 61bd7ba17214e93a5254253f89d92c0e_JaffaCakes118.exe 87 PID 1788 wrote to memory of 4356 1788 61bd7ba17214e93a5254253f89d92c0e_JaffaCakes118.exe 87 PID 1788 wrote to memory of 4356 1788 61bd7ba17214e93a5254253f89d92c0e_JaffaCakes118.exe 87 PID 1788 wrote to memory of 4356 1788 61bd7ba17214e93a5254253f89d92c0e_JaffaCakes118.exe 87 PID 1788 wrote to memory of 4356 1788 61bd7ba17214e93a5254253f89d92c0e_JaffaCakes118.exe 87 PID 1788 wrote to memory of 4356 1788 61bd7ba17214e93a5254253f89d92c0e_JaffaCakes118.exe 87 PID 1788 wrote to memory of 4356 1788 61bd7ba17214e93a5254253f89d92c0e_JaffaCakes118.exe 87 PID 1788 wrote to memory of 4356 1788 61bd7ba17214e93a5254253f89d92c0e_JaffaCakes118.exe 87 PID 1788 wrote to memory of 4356 1788 61bd7ba17214e93a5254253f89d92c0e_JaffaCakes118.exe 87 PID 1788 wrote to memory of 4356 1788 61bd7ba17214e93a5254253f89d92c0e_JaffaCakes118.exe 87 PID 1788 wrote to memory of 2732 1788 61bd7ba17214e93a5254253f89d92c0e_JaffaCakes118.exe 88 PID 1788 wrote to memory of 2732 1788 61bd7ba17214e93a5254253f89d92c0e_JaffaCakes118.exe 88 PID 1788 wrote to memory of 2732 1788 61bd7ba17214e93a5254253f89d92c0e_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\61bd7ba17214e93a5254253f89d92c0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\61bd7ba17214e93a5254253f89d92c0e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\isass.exe"C:\Users\Admin\AppData\Local\isass.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4356
-
-
C:\Users\Admin\AppData\Local\pB0T.exe"C:\Users\Admin\AppData\Local\pB0T.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD561bd7ba17214e93a5254253f89d92c0e
SHA106997b41f31cefb98b9fe27cfa5d08d3501ee925
SHA256e11ea56696aee36f40a7c0bd488e312c98ffdcb1f2d69ae0b567d3137c500211
SHA512102ae3a96d4d058ebfe7fee35d1341aedf2cbe1bd07d6cc14fe36849f47ca80a033c3886ab92829d2b72794f0e028a31d3a2b2cccbfe744e7b3ad2c3f47f8871
-
Filesize
852KB
MD5b551c9565a4fb8aa0038c11d54d08d25
SHA1b2fc2103c79cbb5601c9bd49aca66f7183103aea
SHA256ff878d602805191fda1da9cfc44ce72af0d11e027acd8e46f6ec20e7af5dd1ec
SHA51217f586068a88b5e6fd6c4f6f5a4332b6580f8d8af45592556bc9bc8193a4340c3f03ddc199871d7976fb15d43c90279f00981d51ed71d3af91ecc18da71ccafe