Analysis
-
max time kernel
139s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 09:05
Static task
static1
Behavioral task
behavioral1
Sample
62a020ee8d44cf0883c8546e1073908d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
62a020ee8d44cf0883c8546e1073908d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
62a020ee8d44cf0883c8546e1073908d_JaffaCakes118.exe
-
Size
170KB
-
MD5
62a020ee8d44cf0883c8546e1073908d
-
SHA1
0965a1e28221d0460491833527d89e40fcea075f
-
SHA256
b7c4ada5b543303b5e144339e84dd6f6e6c61430e7d81bbde1eb091263c4f9c0
-
SHA512
f54d74d567b689af47f643fdab5daf708a74ec5eb7c06660e2cf6b48c4786a1a149588ba4238d486dfb5e8665dba4b2d06b0f8d1cc006918a1419026b4b0387d
-
SSDEEP
3072:OYP2XerzhOUxu/XUtauWULTJK5WS1tRwANho7OtkjcL:Ou2urzh9xu/XkauvLTJFSeAc7kkjc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation 62a020ee8d44cf0883c8546e1073908d_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4328 server.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\System\__tmp_rar_sfx_access_check_240630296 62a020ee8d44cf0883c8546e1073908d_JaffaCakes118.exe File created C:\Windows\System\moi en dos nus!!!!.jpg 62a020ee8d44cf0883c8546e1073908d_JaffaCakes118.exe File opened for modification C:\Windows\System\moi en dos nus!!!!.jpg 62a020ee8d44cf0883c8546e1073908d_JaffaCakes118.exe File created C:\Windows\System\server.exe 62a020ee8d44cf0883c8546e1073908d_JaffaCakes118.exe File opened for modification C:\Windows\System\server.exe 62a020ee8d44cf0883c8546e1073908d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4328 server.exe 4328 server.exe 4328 server.exe 4328 server.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3520 wrote to memory of 4328 3520 62a020ee8d44cf0883c8546e1073908d_JaffaCakes118.exe 85 PID 3520 wrote to memory of 4328 3520 62a020ee8d44cf0883c8546e1073908d_JaffaCakes118.exe 85 PID 3520 wrote to memory of 4328 3520 62a020ee8d44cf0883c8546e1073908d_JaffaCakes118.exe 85 PID 4328 wrote to memory of 3392 4328 server.exe 56 PID 4328 wrote to memory of 3392 4328 server.exe 56 PID 4328 wrote to memory of 3392 4328 server.exe 56 PID 4328 wrote to memory of 3392 4328 server.exe 56 PID 4328 wrote to memory of 3392 4328 server.exe 56 PID 4328 wrote to memory of 3392 4328 server.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\62a020ee8d44cf0883c8546e1073908d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\62a020ee8d44cf0883c8546e1073908d_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\windows\system\server.exe"C:\windows\system\server.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4328
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD5aeabe6eace45188dc0addd8fdd8b7b91
SHA1d3968da2753c3068c446324a3021f7a4b529f6c8
SHA2567e8f6084604c2a70a6414887fb022304ca9614639a5bada6e3fdd697544d9bb1
SHA5129914e6787a6dcfae167824dc05f23344ea1dd58d5f24dcb089c6d95c950d6173be56ce93a51d893916a662977f3a97246a047796ccd5fdbf67b33df9cfa1f13c