Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 07:12
Static task
static1
Behavioral task
behavioral1
Sample
775336da181d11c262497cb1d171f144_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
775336da181d11c262497cb1d171f144_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
775336da181d11c262497cb1d171f144_JaffaCakes118.exe
-
Size
393KB
-
MD5
775336da181d11c262497cb1d171f144
-
SHA1
daaff16fb08aa47b3c8fc7c3797e0c7da49cd20a
-
SHA256
46c6e596250e0b993f0119e2d619cb4163bc543afc135c956cc196f3c6af0302
-
SHA512
d146b1c711fbedd7d72d9ab1fe91a261adc77a3ff74e30ff060843b76ba6efbcc855308c9f99b2e853a9b4f80ee19b465cb2983671edbc0c73af7705ab41650b
-
SSDEEP
12288:Uutrzh9xOXkYVfkeAlWRURCDSQBOM5TiRz:Uutr5OUYVce2WRURQmQiRz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 775336da181d11c262497cb1d171f144_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 775336da181d11c262497cb1d171f144_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 212 wrote to memory of 5104 212 775336da181d11c262497cb1d171f144_JaffaCakes118.exe 85 PID 212 wrote to memory of 5104 212 775336da181d11c262497cb1d171f144_JaffaCakes118.exe 85 PID 212 wrote to memory of 5104 212 775336da181d11c262497cb1d171f144_JaffaCakes118.exe 85 PID 5104 wrote to memory of 1460 5104 mshta.exe 88 PID 5104 wrote to memory of 1460 5104 mshta.exe 88 PID 5104 wrote to memory of 1460 5104 mshta.exe 88 PID 212 wrote to memory of 2428 212 775336da181d11c262497cb1d171f144_JaffaCakes118.exe 90 PID 212 wrote to memory of 2428 212 775336da181d11c262497cb1d171f144_JaffaCakes118.exe 90 PID 212 wrote to memory of 2428 212 775336da181d11c262497cb1d171f144_JaffaCakes118.exe 90 PID 2428 wrote to memory of 1884 2428 mshta.exe 91 PID 2428 wrote to memory of 1884 2428 mshta.exe 91 PID 2428 wrote to memory of 1884 2428 mshta.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\775336da181d11c262497cb1d171f144_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\775336da181d11c262497cb1d171f144_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" "javascript:new ActiveXObject('WScript.Shell').Run('Devourer_3.0_15025121807012.bat -Open',0);window.close()"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Devourer_3.0_15025121807012.bat" -Open"3⤵
- System Location Discovery: System Language Discovery
PID:1460
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" "javascript:new ActiveXObject('WScript.Shell').Run('Devourer_3.0_15025121807012.bat',0);window.close()"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Devourer_3.0_15025121807012.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:1884
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
286KB
MD538f8fccb9008928261f0545e2079c7fb
SHA1f2ee896cd0a854451269b05a383f46806cba41b7
SHA256f25f2850ae1f03a52a8dbf21ef2f3ed4470d418560e8272b2fefd42fcd74e1af
SHA512991ff7cde6db9cea6e020a00f08f56f45901af8da315ec94ad06f9483af82ff164b9d625ef13235e2b6cbddb1a055739c1b5ce824f775879bb7953216a30dd2c