Analysis
-
max time kernel
140s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2024 23:43
Static task
static1
Behavioral task
behavioral1
Sample
8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe
-
Size
771KB
-
MD5
8406c8b731646404dd9613dddb972cbb
-
SHA1
b310d1a6ca066e9d0c212130933aa48c4ed40b9d
-
SHA256
8bebd54edfffa8cbd4769982178f1cb04df9b89eaaa8ba972c985a65668e1897
-
SHA512
2e0630b31a5485bbd9061bdf25410b1e72d037b842ce94459bb4a2209bb0944167f5f00fdcbd1d2fd9cd371c60b9877902f8071d202541381f942960f01741d8
-
SSDEEP
24576:q3nZqfbhTY+xfLKxVSZKrVf3B7YG01hX85WnBYHATuM68a:qGxfLKxVyqVfx7euYB+AT08a
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 916 5.EXE -
resource yara_rule behavioral2/files/0x0007000000023440-6.dat upx behavioral2/memory/916-14-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/916-16-0x0000000000400000-0x00000000004A9000-memory.dmp upx -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\%system%\5.exe 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\%system%\5.exe 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\%system% 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe File created C:\Program Files (x86)\%system%\__tmp_rar_sfx_access_check_240632500 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe File created C:\Program Files (x86)\%system%\aaa.jpg 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\%system%\aaa.jpg 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1904 916 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1492 wrote to memory of 916 1492 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe 85 PID 1492 wrote to memory of 916 1492 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe 85 PID 1492 wrote to memory of 916 1492 8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8406c8b731646404dd9613dddb972cbb_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Program Files (x86)\%system%\5.EXE"C:\Program Files (x86)\%system%\5.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 5443⤵
- Program crash
PID:1904
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 916 -ip 9161⤵PID:2924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
591KB
MD5fab4606dfa5e3ffd33c436c53c1e07b6
SHA170bd8e2dde60b1d13bba0e4309cf98c0ba10806c
SHA256a4a5107092f4ef640a2dcf0dc5cc8a8e6c161b1f9bbc272d06c70b38556e043a
SHA512db692b94d207cc6669ed14c534f3ad309fc5ce95e1dc4336d377a929a027a8c30095c60f91ef92d274f8340adf3785ad226cadf606e630f833587ddefd47f53d