Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 00:05
Static task
static1
Behavioral task
behavioral1
Sample
764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe
-
Size
835KB
-
MD5
764e0300f06558b76f6b81c588b953ed
-
SHA1
1a6778b0ac7844c1826cfaedec3dbca2debd4448
-
SHA256
0561f4160b4b9b9ddac818d5fcaac38c4f1e6ad823d97ee103d33a2ef5b02d7b
-
SHA512
638220572d47c42e748c116dbef458f2a6bcaa00e08473b1707dcaeb56aadeecc1d47c0af51b4a78a86f94723f90dc75e59c795799c7c6893454c04853736fec
-
SSDEEP
24576:D2VHWLRaYmMg8Huu8VKuuDFtHImWmQ/UEoIcyNI:DFam8VJukqP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation 764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Users\\Admin\\AppData\\Local\\dllhost.exe\"" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000_Classes\Local Settings 764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000_Classes\Local Settings OpenWith.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3948 reg.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2500 764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe 2500 764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe 2500 764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe 2500 764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3836 OpenWith.exe 3012 OpenWith.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2500 wrote to memory of 4876 2500 764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe 84 PID 2500 wrote to memory of 4876 2500 764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe 84 PID 2500 wrote to memory of 4876 2500 764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe 84 PID 4876 wrote to memory of 1820 4876 cmd.exe 87 PID 4876 wrote to memory of 1820 4876 cmd.exe 87 PID 4876 wrote to memory of 1820 4876 cmd.exe 87 PID 1820 wrote to memory of 3948 1820 cmd.exe 88 PID 1820 wrote to memory of 3948 1820 cmd.exe 88 PID 1820 wrote to memory of 3948 1820 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\run.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V dllhost /D "\"C:\Users\Admin\AppData\Local\dllhost.exe\"" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V dllhost /D "\"C:\Users\Admin\AppData\Local\dllhost.exe\"" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3948
-
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3836
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD587b7f8ab243669deb60ef571f05e17a4
SHA1b9e20abe8e7bb4ff6b00c20695d88c2b7410d386
SHA256b19841d19d8dffc21449458e64fa279128c289c5e394fdbbb1efc43e7809f794
SHA5126524187cd49b7080813cdd4a1a5301f0393c0a3e2e161a813249e9389ee773dbce38eecf8f0cbf54ccbdfb39915afc2df9c675e176465546beab2b9336b5cf5e