Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 13:49
Behavioral task
behavioral1
Sample
786108dd67caea8c93afb8814751e30b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
786108dd67caea8c93afb8814751e30b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
786108dd67caea8c93afb8814751e30b_JaffaCakes118.exe
-
Size
18KB
-
MD5
786108dd67caea8c93afb8814751e30b
-
SHA1
4ae556cec29e6544c2341bac146fd8467dfb0b36
-
SHA256
95ede52ec77a666c2a47e95b2fdac86532404121cc21cbe43ffa40bc5927ed88
-
SHA512
6c9b93c483059c31d2c19b2379564e8ea39f8de775a60a2bbe6da691b69f98bf64cce1ffc781208c3eed4b8e293b47e68bb9ad23c867376c59b4d42b016c8227
-
SSDEEP
384:Kpj0XRqAO7gvEA+HzI03u521luTfbTHC4WaJ3+NKEnM+gd5Chfa0T:Kh0XRdO7YiUGuc2ffi4WaxjEKkT
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation 786108dd67caea8c93afb8814751e30b_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 4832 FileName.exe 1764 FileName.exe -
resource yara_rule behavioral2/memory/3744-0-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/files/0x000b000000023405-11.dat upx behavioral2/memory/3744-19-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/4832-24-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Key Name = "C:\\Users\\Admin\\AppData\\Roaming\\Directory\\FileName.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4832 set thread context of 1764 4832 FileName.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4784 1764 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 786108dd67caea8c93afb8814751e30b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileName.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3744 786108dd67caea8c93afb8814751e30b_JaffaCakes118.exe 4832 FileName.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3744 wrote to memory of 5016 3744 786108dd67caea8c93afb8814751e30b_JaffaCakes118.exe 87 PID 3744 wrote to memory of 5016 3744 786108dd67caea8c93afb8814751e30b_JaffaCakes118.exe 87 PID 3744 wrote to memory of 5016 3744 786108dd67caea8c93afb8814751e30b_JaffaCakes118.exe 87 PID 5016 wrote to memory of 4492 5016 cmd.exe 90 PID 5016 wrote to memory of 4492 5016 cmd.exe 90 PID 5016 wrote to memory of 4492 5016 cmd.exe 90 PID 3744 wrote to memory of 4832 3744 786108dd67caea8c93afb8814751e30b_JaffaCakes118.exe 93 PID 3744 wrote to memory of 4832 3744 786108dd67caea8c93afb8814751e30b_JaffaCakes118.exe 93 PID 3744 wrote to memory of 4832 3744 786108dd67caea8c93afb8814751e30b_JaffaCakes118.exe 93 PID 4832 wrote to memory of 1764 4832 FileName.exe 94 PID 4832 wrote to memory of 1764 4832 FileName.exe 94 PID 4832 wrote to memory of 1764 4832 FileName.exe 94 PID 4832 wrote to memory of 1764 4832 FileName.exe 94 PID 4832 wrote to memory of 1764 4832 FileName.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\786108dd67caea8c93afb8814751e30b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\786108dd67caea8c93afb8814751e30b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TsyJD.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Key Name" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Directory\FileName.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4492
-
-
-
C:\Users\Admin\AppData\Roaming\Directory\FileName.exe"C:\Users\Admin\AppData\Roaming\Directory\FileName.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Roaming\Directory\FileName.exeFalse3⤵
- Executes dropped EXE
PID:1764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1764 -s 804⤵
- Program crash
PID:4784
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1764 -ip 17641⤵PID:2072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146B
MD547c24e63751101d4702852578dca9fe0
SHA1438ac9e25d51faa7ac1f6b5a1b3bbc2fb2f02404
SHA256459bfe7d375cf90cc7064791441935950ed8994ed81bb95ed03153e5ea27e4bb
SHA512d24c03a9bdf549e30da4e6297297b55b313e88280c0444fe801ed3b43a4ad08107a0a1cc6790ff256cbc6c770dd2dd5220c16376cb9e6a53d66475fc0d7e0520
-
Filesize
18KB
MD5786108dd67caea8c93afb8814751e30b
SHA14ae556cec29e6544c2341bac146fd8467dfb0b36
SHA25695ede52ec77a666c2a47e95b2fdac86532404121cc21cbe43ffa40bc5927ed88
SHA5126c9b93c483059c31d2c19b2379564e8ea39f8de775a60a2bbe6da691b69f98bf64cce1ffc781208c3eed4b8e293b47e68bb9ad23c867376c59b4d42b016c8227