Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2024 19:31
Static task
static1
Behavioral task
behavioral1
Sample
611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe
-
Size
282KB
-
MD5
611a201b2c055dca0d15916bd60b6ab1
-
SHA1
b665fa95b797e91ccc8bdd1e2228fc5112cb27c3
-
SHA256
69ef9064f92006a1beafec2f55f1f686dd9dafe4864ec8c5279384d78977086e
-
SHA512
5c335d5855b3b3ba07d6e791be9d61dfbbcd8f719ac1cc614a5d914cca94dc2cf70fed07aff87726e9c33231529611b6b6a80ea21269c636a57fc3c3b61561ed
-
SSDEEP
6144:ZLwSv3A6hlVbPG9usjTSKoXVOdgFyVbi2HtoQzb1pBVUjWO:ZMSY8lNPYHw85qWbUj3
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00070000000234cb-2.dat acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation 611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1936 qnpjwia.exe -
Loads dropped DLL 1 IoCs
pid Process 3936 611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe -
resource yara_rule behavioral2/files/0x00070000000234cb-2.dat upx behavioral2/memory/3936-7-0x0000000074EF0000-0x0000000074F14000-memory.dmp upx behavioral2/memory/3936-19-0x0000000074EF0000-0x0000000074F14000-memory.dmp upx behavioral2/memory/3936-20-0x0000000074EF0000-0x0000000074F14000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\xitdpit 611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe File opened for modification C:\Windows\xitdpit 611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1504 1936 WerFault.exe 106 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3936 wrote to memory of 1936 3936 611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe 106 PID 3936 wrote to memory of 1936 3936 611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe 106 PID 3936 wrote to memory of 1936 3936 611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\qnpjwia.exe"C:\Users\Admin\AppData\Local\Temp\qnpjwia.exe"2⤵
- Executes dropped EXE
PID:1936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 3643⤵
- Program crash
PID:1504
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1936 -ip 19361⤵PID:4804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD5d36d8859f9b974d49d4b837d373d1674
SHA1b7e995a5e809b8beca970b189c460b66f3d99935
SHA25645d0873050b62c11da8c090b835bc47edcdb35f50de40fa0c2387e1c1c4fcdad
SHA51296a955d825fa175b10ba3d8e4bbc56252f8ec40d287b73b11fb2f2217d0866b3214e81ae6fc2db110799a352ed033fa5c38b8dfa92d5c1658b67ed070008c9ae
-
Filesize
51KB
MD591a804e7b75d591f33cd58bf28c23f20
SHA1182b6847f12f7193552bf05392b193643e21d085
SHA256346aca2c18c86babaea64d15684bfac4ba601654dbc07cd9aac9e3e311024276
SHA512062b6e4fbfcf51f6731537132a25f3a370260d6d6aedbba9f7d9271dfde63533e71ebdd9f5042170796fb491c40cfae543fe488f5b338b0be3669a747eb76cc4