Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 21:45
Static task
static1
Behavioral task
behavioral1
Sample
8c17952e2f45fd866063b76d298aaa47_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8c17952e2f45fd866063b76d298aaa47_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8c17952e2f45fd866063b76d298aaa47_JaffaCakes118.exe
-
Size
2.0MB
-
MD5
8c17952e2f45fd866063b76d298aaa47
-
SHA1
2cbfddee5766f4846541662eda0189c3e7c99764
-
SHA256
62db603bede85c0ee03a8978ebe00648b5b3a57e54583304d74b66a383fc9e0c
-
SHA512
324081666b8581d16d8b3cfd9d0c503c98094c7086ac2ddeb3d5d72cac2d6d9fb5fbb1d4ce2d72b490e99764b558327546e33348229de6131c6cde58e83a4a9c
-
SSDEEP
24576:qr5DBCssPSW8QHpVyzlCDJRlnei29C5yU2mY5YtylkPnBsxL9AAMyQmV/8hQzDA/:q7wSHzlmlneiPAYcl8B330V/2mixtWK
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation 8c17952e2f45fd866063b76d298aaa47_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation install.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation isass.exe -
Executes dropped EXE 2 IoCs
pid Process 880 install.exe 5052 isass.exe -
Loads dropped DLL 2 IoCs
pid Process 5052 isass.exe 5052 isass.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Users\\Admin\\AppData\\Local\\isass.exe \"" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c17952e2f45fd866063b76d298aaa47_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isass.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4516 reg.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 880 install.exe 880 install.exe 880 install.exe 880 install.exe 880 install.exe 880 install.exe 880 install.exe 880 install.exe 880 install.exe 880 install.exe 880 install.exe 880 install.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5052 isass.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3736 wrote to memory of 880 3736 8c17952e2f45fd866063b76d298aaa47_JaffaCakes118.exe 88 PID 3736 wrote to memory of 880 3736 8c17952e2f45fd866063b76d298aaa47_JaffaCakes118.exe 88 PID 3736 wrote to memory of 880 3736 8c17952e2f45fd866063b76d298aaa47_JaffaCakes118.exe 88 PID 880 wrote to memory of 5052 880 install.exe 89 PID 880 wrote to memory of 5052 880 install.exe 89 PID 880 wrote to memory of 5052 880 install.exe 89 PID 5052 wrote to memory of 4404 5052 isass.exe 90 PID 5052 wrote to memory of 4404 5052 isass.exe 90 PID 5052 wrote to memory of 4404 5052 isass.exe 90 PID 4404 wrote to memory of 2552 4404 cmd.exe 92 PID 4404 wrote to memory of 2552 4404 cmd.exe 92 PID 4404 wrote to memory of 2552 4404 cmd.exe 92 PID 2552 wrote to memory of 4516 2552 cmd.exe 93 PID 2552 wrote to memory of 4516 2552 cmd.exe 93 PID 2552 wrote to memory of 4516 2552 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c17952e2f45fd866063b76d298aaa47_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8c17952e2f45fd866063b76d298aaa47_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\isass.exe"C:\Users\Admin\AppData\Local\isass.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\setup.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V lsass /D "\"C:\Users\Admin\AppData\Local\isass.exe \"" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V lsass /D "\"C:\Users\Admin\AppData\Local\isass.exe \"" /f6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4516
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD57905782b19842e3b1a84a9d1f7bd7189
SHA1642b3b96a5219bca2115790415600a9c9d56c72d
SHA2569de88816bfeaa59da3e2e8a703c38fa7d51afe5f2a5b9f0c1c619e26d5d721f8
SHA512674096ca4a84be6a4bf0f4a3c51cf4100db165c0e2d1051c14a6e6707111fab40c252ce276b64b206070c4d473964686a610b2da0d8672d2eab5ef0ae0a74f1f
-
Filesize
143B
MD5330d9a81f808b287b999c76c1d932ed6
SHA195146f6f084c39395e2fae892af065e85fddb8d1
SHA2564e2ba5afae8aedfb7664f479ff30667dbabee99f63c922206df98ff56456a03f
SHA5124abd3d3c6b40ae046366604fdfabdc2c97a54cd4c4046452014fb1087353d216b2920650cc2d147fd6c1a79fd7d73d7cd46a8ada0a5c70de70b87b480034e812
-
Filesize
540KB
MD5bdfd0629a0af77719b00970ffa5d5146
SHA1e063bcc4d303a4677fcd1280f124a99ae04ffdab
SHA2561043d67d9303502c3b8de7912d825388d1177d841b3dc8ec7ae94002c1005e98
SHA5127bb605ca3e6689a98d65cc46e3afb7d6f21ac052b9d5ac8f6339f930ffa8ce4dc7c44914171037a2cbbb101e073a2baef3ad2f1b3e6e043c004e3f8ed23a9e77
-
Filesize
186KB
MD53b3f633865e78b077471b52a8e08c7ae
SHA149867697fe9f6dd2025ec2081e0c8606257e008a
SHA25676230baac105470e82f2fdedc13865d9f46c7349ffcc66e239b95893ea433fd4
SHA51277b9d6eaf413ecb24d552fbe7985ed6d277123eee1b4294db0dc52d5bc396de9c445dc53254f964dfe0ade21e2c54cba17ac6e3008c6935387fbd3e8f1442a1b