Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2024 03:50
Behavioral task
behavioral1
Sample
7b265e33408651503993728ef02b990d_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
7b265e33408651503993728ef02b990d_JaffaCakes118.exe
-
Size
436KB
-
MD5
7b265e33408651503993728ef02b990d
-
SHA1
e04b5c90c5fd84b42d279ad6ad487f3f6246219d
-
SHA256
4424fa680a988afb5defe2afc22eb4b2d367823de222d0708502c957e4e0d1ed
-
SHA512
d7f1817f4cde6e0b8e73549e085cbb2ad2d956afa3bf81b78fe0d493fa5760ce00ebbf0d5bf91688fce37d6f72989406e183ce1bf275a96001a45669874ec8c8
-
SSDEEP
6144:2zU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInOtsvFwfMHAXj:4U7M5ijWh0XOW4sEfeOSJHAz
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\kavoq.exe aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7b265e33408651503993728ef02b990d_JaffaCakes118.exebyogg.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2927035347-1736702767-189270196-1000\Control Panel\International\Geo\Nation 7b265e33408651503993728ef02b990d_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2927035347-1736702767-189270196-1000\Control Panel\International\Geo\Nation byogg.exe -
Executes dropped EXE 2 IoCs
Processes:
byogg.exekavoq.exepid process 808 byogg.exe 936 kavoq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
kavoq.exe7b265e33408651503993728ef02b990d_JaffaCakes118.exebyogg.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kavoq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b265e33408651503993728ef02b990d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byogg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
kavoq.exepid process 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe 936 kavoq.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
7b265e33408651503993728ef02b990d_JaffaCakes118.exebyogg.exedescription pid process target process PID 4712 wrote to memory of 808 4712 7b265e33408651503993728ef02b990d_JaffaCakes118.exe byogg.exe PID 4712 wrote to memory of 808 4712 7b265e33408651503993728ef02b990d_JaffaCakes118.exe byogg.exe PID 4712 wrote to memory of 808 4712 7b265e33408651503993728ef02b990d_JaffaCakes118.exe byogg.exe PID 4712 wrote to memory of 4832 4712 7b265e33408651503993728ef02b990d_JaffaCakes118.exe cmd.exe PID 4712 wrote to memory of 4832 4712 7b265e33408651503993728ef02b990d_JaffaCakes118.exe cmd.exe PID 4712 wrote to memory of 4832 4712 7b265e33408651503993728ef02b990d_JaffaCakes118.exe cmd.exe PID 808 wrote to memory of 936 808 byogg.exe kavoq.exe PID 808 wrote to memory of 936 808 byogg.exe kavoq.exe PID 808 wrote to memory of 936 808 byogg.exe kavoq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b265e33408651503993728ef02b990d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7b265e33408651503993728ef02b990d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\byogg.exe"C:\Users\Admin\AppData\Local\Temp\byogg.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\kavoq.exe"C:\Users\Admin\AppData\Local\Temp\kavoq.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD516c800767fa0b88587402e883ff60426
SHA1b82215a563de8c85af9f9acb2566cf9695b5bafa
SHA256d83b393b3ff1b8e84c7348f9f1e5a147145fea1af6a7c9ab4659799358974d1f
SHA5121517df0b00992237d755be140bf0d80912792fe9deda0fa33cd321a73e1808bf61586d3472c7dadb470f61e9608038448c2ff621eedc3ea16b403bec20faaf35
-
Filesize
436KB
MD5f3922e96907358ca62f13f3b69b77587
SHA165131e06e18715dca08c2c7c04da5463f8ec0237
SHA2567ff99245ea65d5802e2b982449b10c8ee7c688e73fa144600906e80a64a6fb05
SHA5124f8418c7d549195ceff9cca2d81967285f9e84b1745209b15e59859c8becaccd00829c52e60261c81816ca899e1445a2c03db6622db0004f747526370c9a7994
-
Filesize
512B
MD5b103e3b934175942ebec0f984a60c1db
SHA1b29161a0ab43020f03c3658be7f6babba4914057
SHA2568a441fc07c9e4c0b595390940508204f183a70efe8c7184d88b4f260632a842f
SHA512afa203e01510d0207ab7998d8d9cbb0851b4855893afc72125166f801780eea1c86022da322d3ee2d70d731b26b203425baa09095e73945cef2bc28dd907bc01
-
Filesize
212KB
MD57203bb420b08f700dc755a326a486334
SHA103c2efbce166239606bbc9d3642373c9fa80168c
SHA2569c7d7ab4ca12e07a0481c0ba09e88f727f02992472e1afde560090f2fa2218cf
SHA512aaebae67cb492986d48f095c8a4701c5d4918efdb3c99bcec43877df9092664a785d59dca02edcd57d86d3cb343b1c3f4f1b0668ecff5cca85d1e606f60612b0