Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 21:44
Static task
static1
Behavioral task
behavioral1
Sample
75d8cca59d95bcf0fdc8f3b7faa49e0b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
75d8cca59d95bcf0fdc8f3b7faa49e0b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
75d8cca59d95bcf0fdc8f3b7faa49e0b_JaffaCakes118.exe
-
Size
14KB
-
MD5
75d8cca59d95bcf0fdc8f3b7faa49e0b
-
SHA1
1d158865a8f7d96e4fe2a77e50036755926c58e3
-
SHA256
e8948f67724fe3b474fc68f7dd82f1fab6ce2ed3191a0f0e90d981878de4b7c6
-
SHA512
163fc0b45dde925f1688884a123bfdd71e91d64a08431ed6928da2118318546e258b3c569002c144a354d65c3cab51ab61c62a1d070d6df4cd80de9787cabc0a
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4Yhz:hDXWipuE+K3/SSHgx9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation 75d8cca59d95bcf0fdc8f3b7faa49e0b_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation DEM9F1E.exe Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation DEMFA9C.exe Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation DEM51C5.exe Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation DEMAA74.exe Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation DEM2C5.exe -
Executes dropped EXE 6 IoCs
pid Process 2868 DEM9F1E.exe 1420 DEMFA9C.exe 4780 DEM51C5.exe 2316 DEMAA74.exe 1780 DEM2C5.exe 4236 DEM5A4B.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75d8cca59d95bcf0fdc8f3b7faa49e0b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM9F1E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMFA9C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM51C5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMAA74.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM2C5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM5A4B.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 388 wrote to memory of 2868 388 75d8cca59d95bcf0fdc8f3b7faa49e0b_JaffaCakes118.exe 95 PID 388 wrote to memory of 2868 388 75d8cca59d95bcf0fdc8f3b7faa49e0b_JaffaCakes118.exe 95 PID 388 wrote to memory of 2868 388 75d8cca59d95bcf0fdc8f3b7faa49e0b_JaffaCakes118.exe 95 PID 2868 wrote to memory of 1420 2868 DEM9F1E.exe 100 PID 2868 wrote to memory of 1420 2868 DEM9F1E.exe 100 PID 2868 wrote to memory of 1420 2868 DEM9F1E.exe 100 PID 1420 wrote to memory of 4780 1420 DEMFA9C.exe 102 PID 1420 wrote to memory of 4780 1420 DEMFA9C.exe 102 PID 1420 wrote to memory of 4780 1420 DEMFA9C.exe 102 PID 4780 wrote to memory of 2316 4780 DEM51C5.exe 105 PID 4780 wrote to memory of 2316 4780 DEM51C5.exe 105 PID 4780 wrote to memory of 2316 4780 DEM51C5.exe 105 PID 2316 wrote to memory of 1780 2316 DEMAA74.exe 114 PID 2316 wrote to memory of 1780 2316 DEMAA74.exe 114 PID 2316 wrote to memory of 1780 2316 DEMAA74.exe 114 PID 1780 wrote to memory of 4236 1780 DEM2C5.exe 116 PID 1780 wrote to memory of 4236 1780 DEM2C5.exe 116 PID 1780 wrote to memory of 4236 1780 DEM2C5.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\75d8cca59d95bcf0fdc8f3b7faa49e0b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\75d8cca59d95bcf0fdc8f3b7faa49e0b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\DEM9F1E.exe"C:\Users\Admin\AppData\Local\Temp\DEM9F1E.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\DEMFA9C.exe"C:\Users\Admin\AppData\Local\Temp\DEMFA9C.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\DEM51C5.exe"C:\Users\Admin\AppData\Local\Temp\DEM51C5.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\DEMAA74.exe"C:\Users\Admin\AppData\Local\Temp\DEMAA74.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\DEM2C5.exe"C:\Users\Admin\AppData\Local\Temp\DEM2C5.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\DEM5A4B.exe"C:\Users\Admin\AppData\Local\Temp\DEM5A4B.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4236
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD50bea51261381b775f31ab6d71b928bd6
SHA1a86c352b5024614f504056c928f2198d3f4dc209
SHA256c14e8cbaebb572cd65c997d34c065e791e24a567637b4251d2b9112cb75f8fee
SHA5128591424301a30c27c7c93242ba20371e2b4122032bf282a5347541642e8d31b2bde6da2374577638d4c796e2a23a33fda3d9d0224bd3bbbfa6eed4d0dcb5ef57
-
Filesize
14KB
MD5e55c112e6307d54fcd2161ce38442d92
SHA1e9f3f83da79e05ef833c05cc6608e342db9efb2e
SHA2569c754c6f222860d61e91088d9cc93ef5a2f239873aa8ce8ef14630eb2c819ba8
SHA5123a1d2c295602d15f8b701d5e569f41dd68b4878aa81fba2d771fb3931eb978a54a2defcc909481958ff79dd32b1fd7e6a935753e79b198764a7b4bf451ec88e9
-
Filesize
14KB
MD551bb433250c251b1e1737821f92b8a6f
SHA17f2188271d0d231cffad7c8c393eabb84678a610
SHA256a5e27a859f330b7f7bf8c8402b76bd9ad2c1aa025c0ea152b18512a5b5ebd737
SHA5125035a2e7f5f4dfdb509f2b3e3ba07057bf7ef546485776d382458355c7cbde1fec4582956233e6517d5605cd6c0fcfe85377646762d5ac262fc6c43ed0ef5087
-
Filesize
14KB
MD5e00128d9a8f06f0e526cec3ae48370a1
SHA126928e427af2683b2162115724571015addb82ed
SHA25679eb361e53696d2dca09907c929db3f856cbfe5162871ee610887d40d6105694
SHA512d53e68453a5fa6c7a2f1b0e1f4df94465013c9ada2b36d73c572de98e407abf148e0e3f4fa35558c1368842c25ca4440b358918cad9ebd2d27ab150e6abd78b0
-
Filesize
14KB
MD5ef1cca69657cf4d26b222a24cc75142c
SHA1dbb356e0df50121a621a6b44e2bece76126248ce
SHA256db3c76456334432cf72caeef25407e7e996c8200643a05ed871dd7c56ddd1456
SHA512b7e55b0cf97961a4f7164aa25a5f5870cd5aa8b45cd1798ad286836bebea0e22345b1dda87661590ae9d1f6f8b2e5e71c856036ebd293c1e7db0a2f68334bee4
-
Filesize
14KB
MD5766126efb1166905560931b8519b4c65
SHA1b11bd03234551bcce37bd3a0c4712ab9c172cac5
SHA25643f1c8681f8c2c16bbe3e9295fa16d161a964b15c63f9f013c21176d110e9187
SHA51228530a07282381bdabc0d0bdbaa8973d388abd2627c9c2cb1a54960fa149221e4cc7df4e218e8a85ad56d0b118e7a4386d38f84b70c4cafd26c98858e10019a1