Analysis
-
max time kernel
145s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 09:36
Static task
static1
Behavioral task
behavioral1
Sample
670b7603e0735ffe60b79c980b560b43_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
670b7603e0735ffe60b79c980b560b43_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
670b7603e0735ffe60b79c980b560b43_JaffaCakes118.exe
-
Size
29KB
-
MD5
670b7603e0735ffe60b79c980b560b43
-
SHA1
3a29b388f81180254cefd3fba21b1a15d640cb89
-
SHA256
ae81aade7c386630977e933fb01185808c3d99b8f36d41f68a9eec574477149e
-
SHA512
b121049fdba56598f515c4f7bf63bea6bee2f879f624ce720ab88a2c3b65f9b7cce2e75ad608729d516ef909a1ec6def0a01efb940c7065ad219b39684056a3c
-
SSDEEP
384:KZZZzKeMFrPKOakHXlXrK+y3FmfdC8TywvZlyzjXeh0ru5ESdUrbABWSG86VR:KZZZz5MG3X8TjvZlyzjTrwdoA9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation 670b7603e0735ffe60b79c980b560b43_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2284 K4hostElSvc.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\K4hostElSvc.exe 670b7603e0735ffe60b79c980b560b43_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\K4hostElSvc.exe 670b7603e0735ffe60b79c980b560b43_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\temp.vbs 670b7603e0735ffe60b79c980b560b43_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings 670b7603e0735ffe60b79c980b560b43_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1704 wrote to memory of 3796 1704 670b7603e0735ffe60b79c980b560b43_JaffaCakes118.exe 84 PID 1704 wrote to memory of 3796 1704 670b7603e0735ffe60b79c980b560b43_JaffaCakes118.exe 84 PID 1704 wrote to memory of 3796 1704 670b7603e0735ffe60b79c980b560b43_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\670b7603e0735ffe60b79c980b560b43_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\670b7603e0735ffe60b79c980b560b43_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\temp.vbs"2⤵PID:3796
-
-
C:\Windows\SysWOW64\K4hostElSvc.exeC:\Windows\SysWOW64\K4hostElSvc.exe1⤵
- Executes dropped EXE
PID:2284
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5670b7603e0735ffe60b79c980b560b43
SHA13a29b388f81180254cefd3fba21b1a15d640cb89
SHA256ae81aade7c386630977e933fb01185808c3d99b8f36d41f68a9eec574477149e
SHA512b121049fdba56598f515c4f7bf63bea6bee2f879f624ce720ab88a2c3b65f9b7cce2e75ad608729d516ef909a1ec6def0a01efb940c7065ad219b39684056a3c
-
Filesize
399B
MD5d7b283daabf0795298236756398341c4
SHA1eb7381ddbab5cdcbcd793faaf90acbe16f0467e3
SHA2567bda7f5c2a024115c33a3be7d2d307b9e8f23ca1ed0c47f25ffe82245f69c43e
SHA5124d491681d605284b81f8cafbfb4f84d72dc76e12e833a4e4308e9283a9f75078e67453a6a92890a7e0d1b5624382f6fa8eb3c6c8331a99c16058305413c88278