Analysis
-
max time kernel
2s -
max time network
3s -
platform
windows10-2004_x64 -
resource
win10v2004-20240729-en -
resource tags
arch:x64arch:x86image:win10v2004-20240729-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe
Resource
win10v2004-20240729-en
Errors
General
-
Target
77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe
-
Size
20KB
-
MD5
77c5926ee5d55e427ef100d9861f784c
-
SHA1
e3c112a4a2217d0efb836de73f067442a4f40967
-
SHA256
122e0727a8fa54dd69820b8262754c2125c3d4e2458fd71bc4413743a7b71662
-
SHA512
cf7ea7567524a0c26b51125ab52dae2c3c057d8320783b871185ab07760eb867a5f175d224b90f00a736298dcb35621e58a3715f7da114bfb2b9fef7884ad5ff
-
SSDEEP
96:etJE33kf8J4UncxuWqCYqBddnl9SEvVc4MV9yVmEi2:KwPdIqeBR99rS9yPi
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-735441492-2964205366-2526932795-1000\Control Panel\International\Geo\Nation 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3512 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3512 wrote to memory of 3856 3512 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe 84 PID 3512 wrote to memory of 3856 3512 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe 84 PID 3512 wrote to memory of 3856 3512 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe 84 PID 3512 wrote to memory of 2476 3512 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe 86 PID 3512 wrote to memory of 2476 3512 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe 86 PID 3512 wrote to memory of 2476 3512 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe 86 PID 3856 wrote to memory of 2996 3856 cmd.exe 88 PID 3856 wrote to memory of 2996 3856 cmd.exe 88 PID 3856 wrote to memory of 2996 3856 cmd.exe 88 PID 2476 wrote to memory of 4012 2476 cmd.exe 90 PID 2476 wrote to memory of 4012 2476 cmd.exe 90 PID 2476 wrote to memory of 4012 2476 cmd.exe 90 PID 2996 wrote to memory of 3584 2996 net.exe 89 PID 2996 wrote to memory of 3584 2996 net.exe 89 PID 2996 wrote to memory of 3584 2996 net.exe 89 PID 4012 wrote to memory of 536 4012 net.exe 91 PID 4012 wrote to memory of 536 4012 net.exe 91 PID 4012 wrote to memory of 536 4012 net.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop sharedaccess2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\SysWOW64\net.exenet stop sharedaccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess4⤵
- System Location Discovery: System Language Discovery
PID:3584
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop KAVStart2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\net.exenet stop KAVStart3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop KAVStart4⤵
- System Location Discovery: System Language Discovery
PID:536
-
-
-