Analysis
-
max time kernel
132s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:16
Static task
static1
Behavioral task
behavioral1
Sample
81c646d8ddcefdd19ffc59ef544e347d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
81c646d8ddcefdd19ffc59ef544e347d_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
81c646d8ddcefdd19ffc59ef544e347d_JaffaCakes118.exe
-
Size
14KB
-
MD5
81c646d8ddcefdd19ffc59ef544e347d
-
SHA1
7789ad718510327f5cd805596255efc3f60ca95a
-
SHA256
20528dfc5de0de67868b776213f64340f1c2c24002d37a30c961f8ca6efb1b22
-
SHA512
f8ca05b13405ad9ed2ad8f42c03a82ac5e5095f596897135d70d7b4c42b191fdbed45d92cddddee412d28b503f3f36ac451747904aec97fdf98c3a33ba65d579
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhZ:hDXWipuE+K3/SSHgxz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\Control Panel\International\Geo\Nation 81c646d8ddcefdd19ffc59ef544e347d_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\Control Panel\International\Geo\Nation DEME501.exe Key value queried \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\Control Panel\International\Geo\Nation DEM3BBC.exe Key value queried \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\Control Panel\International\Geo\Nation DEM91CB.exe Key value queried \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\Control Panel\International\Geo\Nation DEME819.exe Key value queried \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\Control Panel\International\Geo\Nation DEM3E96.exe -
Executes dropped EXE 6 IoCs
pid Process 4552 DEME501.exe 4680 DEM3BBC.exe 4244 DEM91CB.exe 3712 DEME819.exe 4344 DEM3E96.exe 3260 DEM94C4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM3E96.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM94C4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81c646d8ddcefdd19ffc59ef544e347d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEME501.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM3BBC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM91CB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEME819.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4088 wrote to memory of 4552 4088 81c646d8ddcefdd19ffc59ef544e347d_JaffaCakes118.exe 87 PID 4088 wrote to memory of 4552 4088 81c646d8ddcefdd19ffc59ef544e347d_JaffaCakes118.exe 87 PID 4088 wrote to memory of 4552 4088 81c646d8ddcefdd19ffc59ef544e347d_JaffaCakes118.exe 87 PID 4552 wrote to memory of 4680 4552 DEME501.exe 93 PID 4552 wrote to memory of 4680 4552 DEME501.exe 93 PID 4552 wrote to memory of 4680 4552 DEME501.exe 93 PID 4680 wrote to memory of 4244 4680 DEM3BBC.exe 95 PID 4680 wrote to memory of 4244 4680 DEM3BBC.exe 95 PID 4680 wrote to memory of 4244 4680 DEM3BBC.exe 95 PID 4244 wrote to memory of 3712 4244 DEM91CB.exe 97 PID 4244 wrote to memory of 3712 4244 DEM91CB.exe 97 PID 4244 wrote to memory of 3712 4244 DEM91CB.exe 97 PID 3712 wrote to memory of 4344 3712 DEME819.exe 99 PID 3712 wrote to memory of 4344 3712 DEME819.exe 99 PID 3712 wrote to memory of 4344 3712 DEME819.exe 99 PID 4344 wrote to memory of 3260 4344 DEM3E96.exe 101 PID 4344 wrote to memory of 3260 4344 DEM3E96.exe 101 PID 4344 wrote to memory of 3260 4344 DEM3E96.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\81c646d8ddcefdd19ffc59ef544e347d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\81c646d8ddcefdd19ffc59ef544e347d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\DEME501.exe"C:\Users\Admin\AppData\Local\Temp\DEME501.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\DEM3BBC.exe"C:\Users\Admin\AppData\Local\Temp\DEM3BBC.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\DEM91CB.exe"C:\Users\Admin\AppData\Local\Temp\DEM91CB.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\DEME819.exe"C:\Users\Admin\AppData\Local\Temp\DEME819.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\DEM3E96.exe"C:\Users\Admin\AppData\Local\Temp\DEM3E96.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\DEM94C4.exe"C:\Users\Admin\AppData\Local\Temp\DEM94C4.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3260
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5e1b19d91c29cefab81bdcde8d3cfccd6
SHA18e2070b53151ab9229ed48096798a36ddb35892a
SHA2564605966be5089b735e606a3c0a5d999e2d154eabcc4b038cd8fd40b68b9b9aa8
SHA5127822d31b3d6e1dd6025891b34fe86e63e0cdddac57e45affc79e37d2c992fb0a5cda38075c5bdc66d97b136a9a4e91da7635bb83a1aba987bfb6d25bf91d90e5
-
Filesize
14KB
MD5b2e808c6c889e38e7e371210e1ba27ad
SHA1339d043a9055bf1092a0f8fbfc10595009e9e884
SHA2563a8635132dde9a652fbbf911a6fec40ceec0f310784c474619eed89a8a71e029
SHA512b84250434896dceef4d423375a9ac671c8b182f50d7ba21ca749fee6924b4d242af939a608d36923869f5d77b8bfcb9ebdded1ae60d1389fec96bec125a170ff
-
Filesize
14KB
MD5273ae10d32011909b8deec7088c97894
SHA1ca61a0825a517292a3139d18fe15e0bdcc615ccd
SHA25682042def786868b73d9745d09b40336a94dfbe38f77f70e8dc3c0d4c5d65742f
SHA512b829f6623f8a4ef39fbf9551c80c850786ebd0045a7f0d5c5e6be2140663567fd6a6ba2ac948646a25a21da23cf56fdd8b6203d8e4232a95a9a5f18c359f5c1c
-
Filesize
14KB
MD5a22899caf97860655b72561c8f868e41
SHA143d9ab47ce36ebe6194994c9c5fb250406ae1253
SHA25689fd645dc450a7a433da11312c7452df2a266770a2b035bcbc37f19d5bc5c8ec
SHA512b2e9d0e911049dafca808ab9123cfd7496b067e89380aaa2fc8aef7ca65a6f9865065b1cb0b2474be95843edebbebb7a95206bbf35d2602c90e7092b07e03aee
-
Filesize
14KB
MD5cb679c6c9446d571a64fd254da6c1acc
SHA103364702074c1e5bf92f229e1c74e6902ba833e7
SHA256cb112c7068d3b280b2d7dd78f9826eb05599aef7c5ec3ed8dbf6bd260f770f7e
SHA5123f0e37c0f0d364895349afcbc75ffe8617b4e3f984d95c6a3da308ad65423174c626282b5ccd923f3acf97b0945283872e98aab133cb0ac1e1753feb46f79c08
-
Filesize
14KB
MD54b4f54d0605cf61908ffd7af5d57d0f6
SHA1c4b7e3b9cdc2ecc390bfaf9711e421a01a81fd31
SHA256e25f7b4ad5b745149c1c45a9072e4f93c8238343e2378cda9e44acefd0ce2367
SHA512a1ac59c7f7d0aae127597fe3e3ece4edb4726a82946ae6358b16c9631fe72f1de28311ece07eb29da9194c80aa7e6da5d93a703d3cda8f9c244a5e068f0e6a82