Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 05:17
Static task
static1
Behavioral task
behavioral1
Sample
8923375f2d0a7d312b80c4caffc6fa98_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
8923375f2d0a7d312b80c4caffc6fa98_JaffaCakes118.exe
-
Size
24KB
-
MD5
8923375f2d0a7d312b80c4caffc6fa98
-
SHA1
ffc25e678190cbd31a74fc1a82a1317c784e0885
-
SHA256
085abfef94f2419b4e157ac363c15dddefc419fdeda4bf3e17b9dce122e51d6b
-
SHA512
2ee618a2df3b6ad14b8a2d02928d9a4be2f4e080d73c0c49b594d6d1290388ca1b515677df134e208eebc2b9871bbf3f4c977b55f9e47741f05f2f7bbb4774d2
-
SSDEEP
384:6nSIdMYJpdYtd7wfp2XsWra7ybseEuoYzzumoAoSaQuWJEHFYPwLp3:yvMYWf7X/oYzzu7HDQuXl3
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" 8923375f2d0a7d312b80c4caffc6fa98_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" 8923375f2d0a7d312b80c4caffc6fa98_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 8923375f2d0a7d312b80c4caffc6fa98_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4808 set thread context of 3664 4808 8923375f2d0a7d312b80c4caffc6fa98_JaffaCakes118.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3700 3664 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8923375f2d0a7d312b80c4caffc6fa98_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4808 wrote to memory of 1828 4808 8923375f2d0a7d312b80c4caffc6fa98_JaffaCakes118.exe 84 PID 4808 wrote to memory of 1828 4808 8923375f2d0a7d312b80c4caffc6fa98_JaffaCakes118.exe 84 PID 4808 wrote to memory of 1828 4808 8923375f2d0a7d312b80c4caffc6fa98_JaffaCakes118.exe 84 PID 4808 wrote to memory of 940 4808 8923375f2d0a7d312b80c4caffc6fa98_JaffaCakes118.exe 85 PID 4808 wrote to memory of 940 4808 8923375f2d0a7d312b80c4caffc6fa98_JaffaCakes118.exe 85 PID 4808 wrote to memory of 940 4808 8923375f2d0a7d312b80c4caffc6fa98_JaffaCakes118.exe 85 PID 4808 wrote to memory of 3664 4808 8923375f2d0a7d312b80c4caffc6fa98_JaffaCakes118.exe 86 PID 4808 wrote to memory of 3664 4808 8923375f2d0a7d312b80c4caffc6fa98_JaffaCakes118.exe 86 PID 4808 wrote to memory of 3664 4808 8923375f2d0a7d312b80c4caffc6fa98_JaffaCakes118.exe 86 PID 4808 wrote to memory of 3664 4808 8923375f2d0a7d312b80c4caffc6fa98_JaffaCakes118.exe 86 PID 4808 wrote to memory of 3664 4808 8923375f2d0a7d312b80c4caffc6fa98_JaffaCakes118.exe 86 PID 4808 wrote to memory of 3664 4808 8923375f2d0a7d312b80c4caffc6fa98_JaffaCakes118.exe 86 PID 4808 wrote to memory of 3664 4808 8923375f2d0a7d312b80c4caffc6fa98_JaffaCakes118.exe 86 PID 940 wrote to memory of 4980 940 net.exe 90 PID 940 wrote to memory of 4980 940 net.exe 90 PID 940 wrote to memory of 4980 940 net.exe 90 PID 1828 wrote to memory of 2032 1828 net.exe 91 PID 1828 wrote to memory of 2032 1828 net.exe 91 PID 1828 wrote to memory of 2032 1828 net.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\8923375f2d0a7d312b80c4caffc6fa98_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8923375f2d0a7d312b80c4caffc6fa98_JaffaCakes118.exe"1⤵
- Modifies security service
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop wscsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc3⤵
- System Location Discovery: System Language Discovery
PID:2032
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:4980
-
-
-
C:\Users\Admin\AppData\Local\Temp\8923375f2d0a7d312b80c4caffc6fa98_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8923375f2d0a7d312b80c4caffc6fa98_JaffaCakes118.exe"2⤵PID:3664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3664 -s 4683⤵
- Program crash
PID:3700
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3664 -ip 36641⤵PID:5088