Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 12:52
Static task
static1
Behavioral task
behavioral1
Sample
67ab86645a5ebf888f932bb5e4280c87_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
67ab86645a5ebf888f932bb5e4280c87_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
67ab86645a5ebf888f932bb5e4280c87_JaffaCakes118.exe
-
Size
35KB
-
MD5
67ab86645a5ebf888f932bb5e4280c87
-
SHA1
4611d67831df5c54ddabbc93a46067826b89b027
-
SHA256
a3054d1146571a819723c85696d15038cbf1002e9355ec691ebf0a02fad32510
-
SHA512
d815ea3f818c14600a469441a84ca502c7b44a67ba3512d029df7168c4be9ab66e54ab9c3a6ce43760ee29b2e71ec34057bd226072640f20607a64c6b54fa8d8
-
SSDEEP
768:mzQYScGrIubHuYtvdxwYHw5FAe2QtncwxSH:gQTIubHy5wQt2H
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation 67ab86645a5ebf888f932bb5e4280c87_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 664 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\36121aca\jusched.exe 67ab86645a5ebf888f932bb5e4280c87_JaffaCakes118.exe File created C:\Program Files (x86)\36121aca\36121aca 67ab86645a5ebf888f932bb5e4280c87_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe 664 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5116 wrote to memory of 664 5116 67ab86645a5ebf888f932bb5e4280c87_JaffaCakes118.exe 89 PID 5116 wrote to memory of 664 5116 67ab86645a5ebf888f932bb5e4280c87_JaffaCakes118.exe 89 PID 5116 wrote to memory of 664 5116 67ab86645a5ebf888f932bb5e4280c87_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\67ab86645a5ebf888f932bb5e4280c87_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\67ab86645a5ebf888f932bb5e4280c87_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Program Files (x86)\36121aca\jusched.exe"C:\Program Files (x86)\36121aca\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
35KB
MD5ac295d888783d5bac2a1f4969f951145
SHA185ced5f38bf8110f6515fbc987ad5c44846ce234
SHA2568f1adb24e9726598f111875e2d986afd8c2b6267a292762977dd409ffac0b3c5
SHA51223314288cfb57738151f414a9f0f26b9abd3fcc2bbb024765db3c4e6626fb649d51ab790c7de9dc3ca8274449f0e14eb17ebbdd94b40394b82d45dc7ec537efb