Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 02:13
Static task
static1
Behavioral task
behavioral1
Sample
69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.exe
-
Size
77KB
-
MD5
69e1e9e431b2759be7bdd668268dfe78
-
SHA1
da6c6b7b46f17511cdfa6fff6a4e6a41afe65940
-
SHA256
0ff456077cf66d20ef08d5bcd810d6a16f68bdcbcd909a6721672cde5c4a0070
-
SHA512
b1762f5bd9267436c012e894d296835bac64b4dd59554270383039fa56cd947ed7d619103e5b1d16eb3c4e4d21a80aa34ee2361d777f402a93df736ee7a14bf8
-
SSDEEP
1536:uw4zKFY6bW9RX4jIRblotNxSXxRMrUOCA1BF02k+GP7xzeyhAOulU:uw4zKFY6qXuIRcNgwLzF1k1P7xzeVOum
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation 69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1764 morgmgr.exe 3020 morgmgr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\morgmgr = "C:\\Windows\\system32\\morgmgr.exe" 69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\morgmgr.exe 69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\morgmgr.exe 69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4392 set thread context of 4812 4392 69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.exe 84 PID 1764 set thread context of 3020 1764 morgmgr.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language morgmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language morgmgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4812 69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.exe 3020 morgmgr.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4392 wrote to memory of 4812 4392 69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.exe 84 PID 4392 wrote to memory of 4812 4392 69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.exe 84 PID 4392 wrote to memory of 4812 4392 69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.exe 84 PID 4392 wrote to memory of 4812 4392 69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.exe 84 PID 4392 wrote to memory of 4812 4392 69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.exe 84 PID 4392 wrote to memory of 4812 4392 69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.exe 84 PID 4392 wrote to memory of 4812 4392 69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.exe 84 PID 4812 wrote to memory of 656 4812 69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.exe 87 PID 4812 wrote to memory of 656 4812 69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.exe 87 PID 4812 wrote to memory of 656 4812 69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.exe 87 PID 656 wrote to memory of 1764 656 cmd.exe 89 PID 656 wrote to memory of 1764 656 cmd.exe 89 PID 656 wrote to memory of 1764 656 cmd.exe 89 PID 1764 wrote to memory of 3020 1764 morgmgr.exe 91 PID 1764 wrote to memory of 3020 1764 morgmgr.exe 91 PID 1764 wrote to memory of 3020 1764 morgmgr.exe 91 PID 1764 wrote to memory of 3020 1764 morgmgr.exe 91 PID 1764 wrote to memory of 3020 1764 morgmgr.exe 91 PID 1764 wrote to memory of 3020 1764 morgmgr.exe 91 PID 1764 wrote to memory of 3020 1764 morgmgr.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.exe2⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\69e1e9e431b2759be7bdd668268dfe78_JaffaCakes118.bat" 0"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SysWOW64\morgmgr.exeC:\Windows\system32\morgmgr.exe /B4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\morgmgr.exeC:\Windows\SysWOW64\morgmgr.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3020
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
348B
MD5481e8e8def7d977bc6db4b154a52fb2e
SHA1f68e956156b9a4e944e564241fa2d39d6ecbc3e9
SHA25684ddbcf06ccc0da88941825e9613383ddf33b5017588d742a0cfb9322604ef7e
SHA512101e64b429a6c5b5e5338e433462a7bd8a14840d9a92de823c23e530180760ddda756cee6c7f5413e5582c5b4b1afa4775ca830da781316db28d58789906d119
-
Filesize
77KB
MD569e1e9e431b2759be7bdd668268dfe78
SHA1da6c6b7b46f17511cdfa6fff6a4e6a41afe65940
SHA2560ff456077cf66d20ef08d5bcd810d6a16f68bdcbcd909a6721672cde5c4a0070
SHA512b1762f5bd9267436c012e894d296835bac64b4dd59554270383039fa56cd947ed7d619103e5b1d16eb3c4e4d21a80aa34ee2361d777f402a93df736ee7a14bf8