Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 07:40
Static task
static1
Behavioral task
behavioral1
Sample
7767331daa805f22feef52c1b6c13581_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7767331daa805f22feef52c1b6c13581_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7767331daa805f22feef52c1b6c13581_JaffaCakes118.exe
-
Size
28KB
-
MD5
7767331daa805f22feef52c1b6c13581
-
SHA1
83f1b74a428b75da87f8d77d590800d415db629f
-
SHA256
713297785ea311453c4a0341a8deca3bb31e53d4437cc55d195681d69121fe93
-
SHA512
be6acd556309674aed54c920b841431a77c9833562541035425beca26f3d916a1c2f8d64f3ded245b4f99445cfcbf091e9c41f1e1bd7f7991dff00250785f1b4
-
SSDEEP
384:bleGfhKB76kSvTSPSmDMjdfd6ZzlodATLo:RXfoB7wvTeWe1li
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation 7767331daa805f22feef52c1b6c13581_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2040 server.exe 4980 server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2584 4980 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2040 2720 7767331daa805f22feef52c1b6c13581_JaffaCakes118.exe 87 PID 2720 wrote to memory of 2040 2720 7767331daa805f22feef52c1b6c13581_JaffaCakes118.exe 87 PID 2720 wrote to memory of 2040 2720 7767331daa805f22feef52c1b6c13581_JaffaCakes118.exe 87 PID 2040 wrote to memory of 4980 2040 server.exe 88 PID 2040 wrote to memory of 4980 2040 server.exe 88 PID 2040 wrote to memory of 4980 2040 server.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\7767331daa805f22feef52c1b6c13581_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7767331daa805f22feef52c1b6c13581_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\server.exeStubPath3⤵
- Executes dropped EXE
PID:4980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 4604⤵
- Program crash
PID:2584
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4980 -ip 49801⤵PID:4104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5cdf5cf0e177cddb54e0541dfdc420b2b
SHA1827558e383091ab11a4bae0251ad436fa98f9580
SHA2561a2eb5e057e80535603601b298507a1ee30dca5318b47100776446e6b3fe44be
SHA5127f1016b733facf0cb8382dc5546a2f7c67e13a36e2308319e0651ecabc9eba1caf3b3f1facbdff36918d385fea896f0d6319e4b5f977b8ef85c7626bd0b72a71