Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 06:36
Static task
static1
Behavioral task
behavioral1
Sample
8520d5e5112f7b3cedd64ed8b5a52e37_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8520d5e5112f7b3cedd64ed8b5a52e37_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8520d5e5112f7b3cedd64ed8b5a52e37_JaffaCakes118.exe
-
Size
35KB
-
MD5
8520d5e5112f7b3cedd64ed8b5a52e37
-
SHA1
9164bea8ddfaff585146dbbe5ade74650476df4b
-
SHA256
6673878c02f5371fac73ec96109ca401bb51cb10492942197c01c17569de794c
-
SHA512
e740325f94d0df38aeb0d6f72b6981e343d784086f34ef0b805456738acc37ed0ebf6e7d0efd3c920ff1438e686e7267c84e22b437adc35635c64bcef9b341c8
-
SSDEEP
768:zflivXrVKpVhKvtxwYHwVFoeAQWmucwUF:7lqrVKprVuQW2
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 8520d5e5112f7b3cedd64ed8b5a52e37_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4260 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\848cc3e2\jusched.exe 8520d5e5112f7b3cedd64ed8b5a52e37_JaffaCakes118.exe File created C:\Program Files (x86)\848cc3e2\848cc3e2 8520d5e5112f7b3cedd64ed8b5a52e37_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8520d5e5112f7b3cedd64ed8b5a52e37_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe 4260 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3216 wrote to memory of 4260 3216 8520d5e5112f7b3cedd64ed8b5a52e37_JaffaCakes118.exe 89 PID 3216 wrote to memory of 4260 3216 8520d5e5112f7b3cedd64ed8b5a52e37_JaffaCakes118.exe 89 PID 3216 wrote to memory of 4260 3216 8520d5e5112f7b3cedd64ed8b5a52e37_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\8520d5e5112f7b3cedd64ed8b5a52e37_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8520d5e5112f7b3cedd64ed8b5a52e37_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Program Files (x86)\848cc3e2\jusched.exe"C:\Program Files (x86)\848cc3e2\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
35KB
MD5597d9005d1e2238bf5a9a977e0a83d12
SHA1626cbda4f664e56eb75f2e5fd3f53ba49e9da187
SHA2562453037ec64a7833ed84864c665fd9ee53ced57fc79e2fc9b423035a6d4e4558
SHA512cd90b4695bdd376af8ec888a05e00b6b74a3373535904db7cde202ba889d9b30544be0f0d60e28c49c95f58c7bd2daed754f1f10bd9d1a36a1842f167410a30f