Analysis
-
max time kernel
94s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 04:11
Behavioral task
behavioral1
Sample
7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe
-
Size
185KB
-
MD5
7f1fda5c3e6515b61fa48f5744572b5c
-
SHA1
f5e5283f511c4e6e7ff1ba4bb91acfc17653a58f
-
SHA256
2c25e31ddcb7ce79670b67ce57d5e6a4b0c7e13d870ee25a8bbdd18807ee5d32
-
SHA512
e123298022c743f8b675c93fd2d112af7cccee6c0fae75fbeeb2c6b20df446a582a8b09ee52b788638b9ebb69e6319bf4fb95865ca6989ef254b18d9111fb5cf
-
SSDEEP
1536:TPwN8ukP5sZK20EGIBpwW6NeleEQ77nuUWXJmU2Ajpf8oI4KEAUg2uI:Thuk8QsH47nW5ppkoI4KEAUg2p
Malware Config
Extracted
urelas
112.175.88.207
112.175.88.208
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-807826884-2440573969-3755798217-1000\Control Panel\International\Geo\Nation 7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
huter.exepid process 3028 huter.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exehuter.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language huter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exedescription pid process target process PID 348 wrote to memory of 3028 348 7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe huter.exe PID 348 wrote to memory of 3028 348 7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe huter.exe PID 348 wrote to memory of 3028 348 7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe huter.exe PID 348 wrote to memory of 4196 348 7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe cmd.exe PID 348 wrote to memory of 4196 348 7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe cmd.exe PID 348 wrote to memory of 4196 348 7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD5ede6388dfbb03ff576508b085d03e793
SHA171d2e779ac6ed074b5698651a8c7fa3b047ccb50
SHA256779c0d78580692dadb2978ddfcd44d68f8282bb3453c638c9a4c2feecc1b96f8
SHA512097e3b9b2ad80944e542785db3a9062ecb2c657192d96659dcc5267f362b186c91722f2bc103f19ef895e6d9821cf33d262569fae23605888d75f38d2e30093b
-
Filesize
185KB
MD500e9e250f4ac7da49fda44ea1877bf17
SHA1c67cec8c58173384b4db1587ce38968d2a710677
SHA25618b93caa32065cfbf11bed1c6092115d830a4719e373179ba0d3da27169cf25c
SHA512d3862058fd57a4fe0b90a0d654118e7a15b53cd7e1d3383aa35ad22e922524bc3e88ac5f88af2fa4f3158a895823760b65a3d76062d38fd564cbe4b96107c02b
-
Filesize
302B
MD5e41ea93eca438a829239de74778164d8
SHA1e8c7977b3f2a2576203367a4261c6c0c304973b7
SHA256b8db3e9caa1afbf59716814ed8fe2bafe499241db7bf4178ff7ea0623fc74fd4
SHA512071ad2968d8b3a1fe3c5a6e454fc16868d3cb1273857f28a063971a39e17350aa82ac46e98e82637dc61c299ccf9265c74b36bc4f0382840ca33468fed391bd3