Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:34
Static task
static1
Behavioral task
behavioral1
Sample
81ce35652b20a42793957871754de915_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
81ce35652b20a42793957871754de915_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
81ce35652b20a42793957871754de915_JaffaCakes118.exe
-
Size
2.4MB
-
MD5
81ce35652b20a42793957871754de915
-
SHA1
2e819fb982dfb4e7e05fac8c89d0ae63565f7ae9
-
SHA256
7006bd37fe79f2acd4b127506a2787486d5eb2194ae7afeda5f0748937ed2489
-
SHA512
71986250889c28191914f0411713682ba13ddf0d54b256efde36144605c434da7f3e3c329421e7a7d74b00b50b9ba8fdc74533758ae405c921225d75d6adfd97
-
SSDEEP
49152:YzT61fZ5C5n0NJPyOztvmsFd1GEXae05YK6qDl3VzpzD1MVuVR1nvLaAo55NTEdx:Y6CnYpZMs9GhOK6khVRWViR1vLaXEP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-113082768-653872390-2867000172-1000\Control Panel\International\Geo\Nation 81ce35652b20a42793957871754de915_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 4212 ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe 1992 AdobeSFX.log -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe File opened (read-only) \??\O: ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe File opened (read-only) \??\Q: ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe File opened (read-only) \??\S: ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe File opened (read-only) \??\T: ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe File opened (read-only) \??\Y: ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe File opened (read-only) \??\G: ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe File opened (read-only) \??\E: ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe File opened (read-only) \??\J: ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe File opened (read-only) \??\P: ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe File opened (read-only) \??\R: ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe File opened (read-only) \??\V: ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe File opened (read-only) \??\W: ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe File opened (read-only) \??\X: ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe File opened (read-only) \??\A: ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe File opened (read-only) \??\Z: ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe File opened (read-only) \??\I: ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe File opened (read-only) \??\U: ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe File opened (read-only) \??\B: ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe File opened (read-only) \??\L: ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe File opened (read-only) \??\M: ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe File opened (read-only) \??\N: ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe File opened (read-only) \??\H: ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1632 1992 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81ce35652b20a42793957871754de915_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81ce35652b20a42793957871754de915_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeSFX.log -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-113082768-653872390-2867000172-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe Key created \REGISTRY\USER\S-1-5-21-113082768-653872390-2867000172-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe Set value (str) \REGISTRY\USER\S-1-5-21-113082768-653872390-2867000172-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe Key created \REGISTRY\USER\S-1-5-21-113082768-653872390-2867000172-1000\Software\Microsoft\Internet Explorer\IESettingSync ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}\LocalServer32 ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}\LocalServer32\ = "C:\\Windows\\Temp\\¡¶½ðƿ÷¡·£¨³çìõÔ\u00ad°æ×ã±¾´ø²åͼ£©.exe" ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.MyNSHandler\Clsid ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.MyNSHandler\Clsid\ = "{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}" ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC} ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}\ = "this is my ebook" ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.MyNSHandler ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.MyNSHandler\ = "this is my ebook" ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}\ProgID ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}\ProgID\ = "¡¶½ðƿ÷¡·£¨³çìõÔ\u00ad°æ×ã±¾´ø²åͼ£©.MyNSHandler" ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4472 81ce35652b20a42793957871754de915_JaffaCakes118.exe 4472 81ce35652b20a42793957871754de915_JaffaCakes118.exe 4472 81ce35652b20a42793957871754de915_JaffaCakes118.exe 4472 81ce35652b20a42793957871754de915_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 4212 ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe Token: SeCreatePagefilePrivilege 4212 ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4212 ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe 4212 ¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 896 wrote to memory of 4472 896 81ce35652b20a42793957871754de915_JaffaCakes118.exe 83 PID 896 wrote to memory of 4472 896 81ce35652b20a42793957871754de915_JaffaCakes118.exe 83 PID 896 wrote to memory of 4472 896 81ce35652b20a42793957871754de915_JaffaCakes118.exe 83 PID 4472 wrote to memory of 4212 4472 81ce35652b20a42793957871754de915_JaffaCakes118.exe 86 PID 4472 wrote to memory of 4212 4472 81ce35652b20a42793957871754de915_JaffaCakes118.exe 86 PID 4472 wrote to memory of 4212 4472 81ce35652b20a42793957871754de915_JaffaCakes118.exe 86 PID 4472 wrote to memory of 1992 4472 81ce35652b20a42793957871754de915_JaffaCakes118.exe 88 PID 4472 wrote to memory of 1992 4472 81ce35652b20a42793957871754de915_JaffaCakes118.exe 88 PID 4472 wrote to memory of 1992 4472 81ce35652b20a42793957871754de915_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\81ce35652b20a42793957871754de915_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\81ce35652b20a42793957871754de915_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Users\Admin\AppData\Local\Temp\81ce35652b20a42793957871754de915_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\81ce35652b20a42793957871754de915_JaffaCakes118.exe2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\Temp\¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe"C:\Windows\Temp\¡¶½ðƿ÷¡·£¨³çìõÔ°æ×ã±¾´ø²åͼ£©.exe"3⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4212
-
-
C:\Users\Admin\AppData\Local\Temp\AdobeSFX.logC:\Users\Admin\AppData\Local\Temp\\AdobeSFX.log3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1992 -s 5204⤵
- Program crash
PID:1632
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1992 -ip 19921⤵PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
821KB
MD5bdbdbcec830a7700808b8dd554e40797
SHA1ba1e332958bed440e48f06e9d282050052ca67a7
SHA256379e7d300aaea3d06f53cbfa7361c6f6b2ae1a92c5d23fa13ce55ea8e3a9bc81
SHA51256743b7bce71c163067bfc02e442f4c51dc85b61cc5b955d2803c36f1377a233b08ab369a39c6b1704d04c6bfe2c857f203242acc0c85d0580f1389e2b3207a8
-
Filesize
1.9MB
MD5a7afeb863819845cf532b84eb859425e
SHA1c1b9be6d56b3bb0c7203c39b86fd0407bcbac503
SHA2566f038a4a3fb92ed551b240847c92ae9cc3f11d7d028a26a3cdaa8649d6c7c630
SHA512a7a19f23073de97f1318520e06e8ad37c59e9807f134607c2c1c9fdbdd10e83932d6908419e02c0619c27ee4cdb144075972abb91d82853fe7683df7914b4f12