Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 22:07
Behavioral task
behavioral1
Sample
8c29162a35c887542da910569bc74314_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
8c29162a35c887542da910569bc74314_JaffaCakes118.exe
-
Size
6.5MB
-
MD5
8c29162a35c887542da910569bc74314
-
SHA1
33ae196bddeeb1e09f0ecd7fedb0746b40c9ac57
-
SHA256
35fb32dd4a994d171a52ecb3863c9f7f63ec4c46ea7360f6f5d404ad03185bb2
-
SHA512
d693b1f072774abf10e325707f13f17a4e09883e96e1a54daecd2eee24206c42bfa14b76460e48a3ba2367cce426e6bb88e1a6afde685a6b73fe007c01498207
-
SSDEEP
196608:HGDISTVy4uQCrCqKfgGkDItMVLFDgNe64ETDHFqdiN:HGLTkovIGkoMlF9ElqW
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x00070000000234d5-17.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation 8c29162a35c887542da910569bc74314_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2412 setup.exe -
resource yara_rule behavioral2/memory/5016-0-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/5016-22-0x0000000000400000-0x0000000000425000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c29162a35c887542da910569bc74314_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5016 wrote to memory of 2412 5016 8c29162a35c887542da910569bc74314_JaffaCakes118.exe 87 PID 5016 wrote to memory of 2412 5016 8c29162a35c887542da910569bc74314_JaffaCakes118.exe 87 PID 5016 wrote to memory of 2412 5016 8c29162a35c887542da910569bc74314_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c29162a35c887542da910569bc74314_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8c29162a35c887542da910569bc74314_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\setup\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup\setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD5015f22e749b2e64f696379e6e8850d06
SHA1a52050140b871bfc1a9ba935ac132830535fc6a4
SHA256bb504bc01a8abe545d82b691f4ece9d34abde9464ba36473068fc06e261f363d
SHA512f23b59a7e00b09aef67f14e0f98a600578fc1b2536a080933df5dbb672dd5d6cfba36bb8241f1dbd133c1113ca06abfa66232fa79322ab845891f8810348c67c