Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
7238f67e8c5cd98b8967b55f761e61c5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7238f67e8c5cd98b8967b55f761e61c5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7238f67e8c5cd98b8967b55f761e61c5_JaffaCakes118.exe
-
Size
14KB
-
MD5
7238f67e8c5cd98b8967b55f761e61c5
-
SHA1
53a65e85416e764d13353d84d6e02c409ac72958
-
SHA256
95fafe1940cc787c0ee93e6ab2590bbbb8e2f2f28d1e209984b5c29ca8abd5ba
-
SHA512
8214b77b91f36d423fb0e6b97c565c2c7c7da10254af91373c0c7b9d056725dd1f8e4a1863e95ee130c22f1103528a6c1582b723ccb7c5474586461ddca6a84e
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhWg:hDXWipuE+K3/SSHgxcg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation DEMC0CF.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation DEM1817.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation DEM6E84.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation DEMC416.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation DEM1A83.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation 7238f67e8c5cd98b8967b55f761e61c5_JaffaCakes118.exe -
Executes dropped EXE 6 IoCs
pid Process 64 DEMC0CF.exe 3804 DEM1817.exe 4892 DEM6E84.exe 3492 DEMC416.exe 468 DEM1A83.exe 4276 DEM70D1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7238f67e8c5cd98b8967b55f761e61c5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMC0CF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM1817.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM6E84.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMC416.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM1A83.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM70D1.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3544 wrote to memory of 64 3544 7238f67e8c5cd98b8967b55f761e61c5_JaffaCakes118.exe 96 PID 3544 wrote to memory of 64 3544 7238f67e8c5cd98b8967b55f761e61c5_JaffaCakes118.exe 96 PID 3544 wrote to memory of 64 3544 7238f67e8c5cd98b8967b55f761e61c5_JaffaCakes118.exe 96 PID 64 wrote to memory of 3804 64 DEMC0CF.exe 101 PID 64 wrote to memory of 3804 64 DEMC0CF.exe 101 PID 64 wrote to memory of 3804 64 DEMC0CF.exe 101 PID 3804 wrote to memory of 4892 3804 DEM1817.exe 104 PID 3804 wrote to memory of 4892 3804 DEM1817.exe 104 PID 3804 wrote to memory of 4892 3804 DEM1817.exe 104 PID 4892 wrote to memory of 3492 4892 DEM6E84.exe 106 PID 4892 wrote to memory of 3492 4892 DEM6E84.exe 106 PID 4892 wrote to memory of 3492 4892 DEM6E84.exe 106 PID 3492 wrote to memory of 468 3492 DEMC416.exe 115 PID 3492 wrote to memory of 468 3492 DEMC416.exe 115 PID 3492 wrote to memory of 468 3492 DEMC416.exe 115 PID 468 wrote to memory of 4276 468 DEM1A83.exe 117 PID 468 wrote to memory of 4276 468 DEM1A83.exe 117 PID 468 wrote to memory of 4276 468 DEM1A83.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\7238f67e8c5cd98b8967b55f761e61c5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7238f67e8c5cd98b8967b55f761e61c5_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\DEMC0CF.exe"C:\Users\Admin\AppData\Local\Temp\DEMC0CF.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Users\Admin\AppData\Local\Temp\DEM1817.exe"C:\Users\Admin\AppData\Local\Temp\DEM1817.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\DEM6E84.exe"C:\Users\Admin\AppData\Local\Temp\DEM6E84.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\DEMC416.exe"C:\Users\Admin\AppData\Local\Temp\DEMC416.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\DEM1A83.exe"C:\Users\Admin\AppData\Local\Temp\DEM1A83.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Local\Temp\DEM70D1.exe"C:\Users\Admin\AppData\Local\Temp\DEM70D1.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4276
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD52fe72c09779503f22106a4c980710c9e
SHA19fc39626dadc783967e12e35ff0d99abbee774c0
SHA256764597f1f7cfc962565e957bc7ca055bc0c4293f6b436c812b9fb4d578e532e4
SHA51225c702555a754c334565761d973f286e7bc178657f66253971df56b0cd8e8d96369d972d676c499f2e501ab04ef25aa400e4389929607364ffdd4ffb40439dd2
-
Filesize
14KB
MD56394bceb5fd1525bb55e4da85b4941de
SHA1ca3f12e7270134410738e5ec8bdc19183bfee694
SHA256db31edd251ed13df07a7a3ce3929282247d1160c15249962e4153d2fa21797ce
SHA51200682427c1e0089da1997c2d680d65f90a9fc57801c58be4fc28a95954b13a3ce2386b0ad9fc26239fda4e2e5f16657d5d40a19326493062d110a58e756c5b98
-
Filesize
14KB
MD55f0bb42ffa52949eeab51c65b8970fad
SHA13e239f84b954484bc009bef5559a43c609dbe80b
SHA256cbe71e18b9830caf2647833b152df1457085bd8db7019e10af868e1b8a89e47a
SHA51224451a6d61fdce41bc753f674723c8ceddb212f97528ca34f2ebb818bb56ff8f7b28732085c54e734ef8ad67b461876c5e6a9534ea09cd7d1f189d24db6935a7
-
Filesize
14KB
MD5004d1df8bc400f9f8f509060891579b7
SHA139484810641f06fbb8cffef6d1e2512bfeda39f8
SHA256fa30e22cbeb939dfed83d4fe35583103e648749252430082c1aee92060e09fb5
SHA512b0a5caad56933e2892e4f264df2ffc0f26d3a08179e8cab81b38cdf7a724257aec8a2c575e57f0223b8f67451127dc91c74c94539c4e8fa1dbf13280ea09e284
-
Filesize
14KB
MD5751c4920c1b5922c120679d05b7935e9
SHA1e78a7c4ef3d5b51a519880137d09c09fe57bd8b9
SHA256d33ab5707b41842b29b4787376ec34f4ca441ce16ec003fd4be21769649305bb
SHA512195c0795b45c9f381c9bbca420274e3ee8d477812b6e7253ae4ed5f2a842f8a1f5c2c757c28fe81b9b885d22916b07d2ad6126186b2cfd2cf24de9b50e8bf54d
-
Filesize
14KB
MD5cb93d77ce03996b1063864d15014ff9b
SHA120303f96f4be3beb878a5dd68b4a8d3dffef185f
SHA256172095b512958e1aa22023014f5a4b93074f87e435a8471d6c9f8670927af458
SHA512db244d57f06a31a8a5e7df31384d8878eafd1b2a21aa925918c06f59e066199e5c906055c12342fbe7c63c8074aaa71c03d3bb46259be0ffe4b878c593825fce