Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 01:33
Static task
static1
Behavioral task
behavioral1
Sample
7215a779fc6e0554b7d9fef9737e56ec_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7215a779fc6e0554b7d9fef9737e56ec_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7215a779fc6e0554b7d9fef9737e56ec_JaffaCakes118.exe
-
Size
15KB
-
MD5
7215a779fc6e0554b7d9fef9737e56ec
-
SHA1
74aac8a6e9befcf41551a134ac402904d51fc92f
-
SHA256
45f71649cd81394ee497c2b16f82c1126275b689181b062a25a3d8276e4e36b2
-
SHA512
fff2fe442a392830cc194fe2ea16cc2771025b6878e609730eff165c873918407b6221fa0ed93f65496c704fada54228b50e32d2bd501d86280d36edf1b44e9d
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYlcU:hDXWipuE+K3/SSHgxmlcU
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation 7215a779fc6e0554b7d9fef9737e56ec_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation DEMB575.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation DEMC40.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation DEM62AD.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation DEMB8EB.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation DEMF0A.exe -
Executes dropped EXE 6 IoCs
pid Process 2752 DEMB575.exe 3880 DEMC40.exe 2788 DEM62AD.exe 3464 DEMB8EB.exe 324 DEMF0A.exe 2732 DEM6548.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMB8EB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMF0A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM6548.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7215a779fc6e0554b7d9fef9737e56ec_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMB575.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMC40.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM62AD.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3448 wrote to memory of 2752 3448 7215a779fc6e0554b7d9fef9737e56ec_JaffaCakes118.exe 95 PID 3448 wrote to memory of 2752 3448 7215a779fc6e0554b7d9fef9737e56ec_JaffaCakes118.exe 95 PID 3448 wrote to memory of 2752 3448 7215a779fc6e0554b7d9fef9737e56ec_JaffaCakes118.exe 95 PID 2752 wrote to memory of 3880 2752 DEMB575.exe 106 PID 2752 wrote to memory of 3880 2752 DEMB575.exe 106 PID 2752 wrote to memory of 3880 2752 DEMB575.exe 106 PID 3880 wrote to memory of 2788 3880 DEMC40.exe 108 PID 3880 wrote to memory of 2788 3880 DEMC40.exe 108 PID 3880 wrote to memory of 2788 3880 DEMC40.exe 108 PID 2788 wrote to memory of 3464 2788 DEM62AD.exe 111 PID 2788 wrote to memory of 3464 2788 DEM62AD.exe 111 PID 2788 wrote to memory of 3464 2788 DEM62AD.exe 111 PID 3464 wrote to memory of 324 3464 DEMB8EB.exe 113 PID 3464 wrote to memory of 324 3464 DEMB8EB.exe 113 PID 3464 wrote to memory of 324 3464 DEMB8EB.exe 113 PID 324 wrote to memory of 2732 324 DEMF0A.exe 115 PID 324 wrote to memory of 2732 324 DEMF0A.exe 115 PID 324 wrote to memory of 2732 324 DEMF0A.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\7215a779fc6e0554b7d9fef9737e56ec_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7215a779fc6e0554b7d9fef9737e56ec_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\DEMB575.exe"C:\Users\Admin\AppData\Local\Temp\DEMB575.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\DEMC40.exe"C:\Users\Admin\AppData\Local\Temp\DEMC40.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\DEM62AD.exe"C:\Users\Admin\AppData\Local\Temp\DEM62AD.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\DEMB8EB.exe"C:\Users\Admin\AppData\Local\Temp\DEMB8EB.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\DEMF0A.exe"C:\Users\Admin\AppData\Local\Temp\DEMF0A.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Admin\AppData\Local\Temp\DEM6548.exe"C:\Users\Admin\AppData\Local\Temp\DEM6548.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2732
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5389015384f81671edeb0553bf784b00f
SHA11953f62df62e78bdbf92b8a3879bad9c148a360a
SHA256c5e67f1f4ccf1be2b7149444766782a1ea0388e75743ad850304f140f7105378
SHA51274e3329777074e708d052f09d57f6954928054535b0dfc83d4643e7a0b629021ecc7557be003415d5e08c45c60124682f3aa21230b31215ce6f03c9f4f3b5ba2
-
Filesize
15KB
MD5290e1efb0b63c5c51fb3a79a867e4c1b
SHA14e24b883bde87509745b46a8f03513b7c073bb4c
SHA256995a6f197f471203b4a5782d4b34db2e23199beabe4dd943317cc0f21577c490
SHA512be2779a201cf3881f3c89b9aa8e3f5335ef835a88eb7b260cba4c111d57ed4b6d52ecf0c25aa686cd946a802f96a3352057655efb9918f31811fceaa1b3ea827
-
Filesize
15KB
MD503258f39c24563dd3bd769b209497ca6
SHA1466205126cffcc53faf8bf702da7028c002facca
SHA256816a429f414eb22c1b93237cdb33e0b2bfef34e0e2ed97849878e15d470548a2
SHA512f4e4347cdeed1aa827aa9c7692c6e7e3e4a8b71b93eaf14c18b8f58cc8217e9e0fb247aba0aece549f4304289d1f15ff8196764b3b3fe7de309f70b9745dac61
-
Filesize
15KB
MD5f248cd5f2efbeed4090b2bd9d37695b4
SHA1b1c068f116fdfb4b079478c457a5b9d4fc86c83b
SHA256f7c7e77442abf9a1f403405934cbadee7f99313577331f4ae1d97a0a1d4a761a
SHA512618b1beac2d7283b2cd9e916d24d846e8bca6a162d1db683b65fc8d3ee5e7814202d05a73e594046412d2bc6fc8e3fd55f058f5f6a50486a2cbe9dcbe0b882c3
-
Filesize
15KB
MD5a5dbbba1a7d80a56e1c521e55b7b26f4
SHA120b102d180b2d94c5fb54d22d80e2071d4b6ea88
SHA256e64d58a175f43facc359d35e2d5263e27451e27623bed8aea711643fd7925368
SHA512db8dc452d863f6c3c0ec25c6927f8416021d0e28fd62e48b54f2dc07b96cfb63b8647da95101c0ac067bb292b75a120b4274c49bccfe592e2569a325f050927e
-
Filesize
15KB
MD5972a22b7e31e47fe85d3706629a83698
SHA1ce73d7287329152c557f36b80b2b06913cac1895
SHA256ec82a82998390c0146b99d3a02d51ce87bcbabbdf2a0e8db4a68aaa1e8e81dee
SHA512f2ea013fe639f38bfbae25f6b3dc876fbbc937d0350aad58a5f57d4c9bf7702401cf4c7ebf00f6551a9c6a7ae011d6976318583efcb546ba1cca1a7636529c1e