Analysis
-
max time kernel
56s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 22:36
Static task
static1
Behavioral task
behavioral1
Sample
0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe
-
Size
182KB
-
MD5
0177e67dfee61f990472e22859b9caee
-
SHA1
a7b06f425a6d77af315de240f78073064cdd3d38
-
SHA256
2dabd77f0095c4f8856142c94f41561f4484b8fe7ad0daa012bb98024f1b695a
-
SHA512
997e87e05c0703fb8880429f2875ef99bff84a116e099dafa92cc2602850c686bdda28fb36a5eb92c701bf87ca40c96ea27a9dace3bbf7cf3facfc66a4dae727
-
SSDEEP
768:r/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJMU60+ppQ1TTGfLTb:rRsvcdcQjosnvnZ6LQ1E3
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation 0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2432 jusched.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-09\bin\UF 0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe 0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe 0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe 2432 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3196 wrote to memory of 2432 3196 0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe 88 PID 3196 wrote to memory of 2432 3196 0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe 88 PID 3196 wrote to memory of 2432 3196 0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182KB
MD51d509875a1b50ada2c39b0e4e4d61c2c
SHA1f6298fc0d4a754b38216819978366beeef9b0fab
SHA2564468cc6d4a573dc5ae24c7fe8fd68d4f810672ca38af6c292ef625d8dcc8335d
SHA512e8b1f54ed1291a70050f2c7a254a1d388bb18f113e51553f0f342f6db011a9df6227bfc02c09d03f95bdd5879dd529479c5ed2b064a007950ef2bf1b7130fae6