Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 09:45
Static task
static1
Behavioral task
behavioral1
Sample
89e53685c475862961ab500610d14602_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
89e53685c475862961ab500610d14602_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$_3_.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$_3_.exe
Resource
win10v2004-20240802-en
General
-
Target
89e53685c475862961ab500610d14602_JaffaCakes118.exe
-
Size
968KB
-
MD5
89e53685c475862961ab500610d14602
-
SHA1
00dc1695397b804264654e1eef7df072f1144515
-
SHA256
0ace954b2268b9c7c12b15cda24af0610ccbd7aeb2bc2faf0a717bc0ba4dca8e
-
SHA512
89e708e0fdbde360ff6fe866c203742148f54c438a963e56fa1517caec65da51781532ee9a2007a7f25b5f1d46e0b96049c139532b9143de1e8646708231bcf4
-
SSDEEP
24576:AtXCT35bEN60Yc/rMegvH6RK1aeGokgwHsJ:AKBtV6MjvH6RIrDCA
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation internal89e53685c475862961ab500610d14602_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3172 internal89e53685c475862961ab500610d14602_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language internal89e53685c475862961ab500610d14602_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89e53685c475862961ab500610d14602_JaffaCakes118.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4968 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4968 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3172 internal89e53685c475862961ab500610d14602_JaffaCakes118.exe 3172 internal89e53685c475862961ab500610d14602_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3172 internal89e53685c475862961ab500610d14602_JaffaCakes118.exe 3172 internal89e53685c475862961ab500610d14602_JaffaCakes118.exe 3172 internal89e53685c475862961ab500610d14602_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 32 wrote to memory of 3172 32 89e53685c475862961ab500610d14602_JaffaCakes118.exe 85 PID 32 wrote to memory of 3172 32 89e53685c475862961ab500610d14602_JaffaCakes118.exe 85 PID 32 wrote to memory of 3172 32 89e53685c475862961ab500610d14602_JaffaCakes118.exe 85 PID 3172 wrote to memory of 4844 3172 internal89e53685c475862961ab500610d14602_JaffaCakes118.exe 93 PID 3172 wrote to memory of 4844 3172 internal89e53685c475862961ab500610d14602_JaffaCakes118.exe 93 PID 3172 wrote to memory of 4844 3172 internal89e53685c475862961ab500610d14602_JaffaCakes118.exe 93 PID 4844 wrote to memory of 4968 4844 cmd.exe 95 PID 4844 wrote to memory of 4968 4844 cmd.exe 95 PID 4844 wrote to memory of 4968 4844 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\89e53685c475862961ab500610d14602_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\89e53685c475862961ab500610d14602_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Users\Admin\AppData\Local\Temp\nsmBE60.tmp\internal89e53685c475862961ab500610d14602_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\nsmBE60.tmp\internal89e53685c475862961ab500610d14602_JaffaCakes118.exe C:/Users/Admin/AppData/Local/Temp/nsmBE60.tmp /baseInstaller='C:/Users/Admin/AppData/Local/Temp/89e53685c475862961ab500610d14602_JaffaCakes118.exe' /fallbackfolder='C:/Users/Admin/AppData/Local/Temp/nsmBE60.tmp/fallbackfiles/'2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\27573.bat" "C:\Users\Admin\AppData\Local\Temp\BB32A919609945E2B71A979AF89CB007\""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 1 -w 10004⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4968
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214B
MD5739fcc7ba42b209fe44bea47e7a8c48f
SHA1bc7a448a7c018133edcf012bc94301623eb42c5b
SHA25669017cdbbe68396f45e41d211b22d800cc1afc0eadbd3440873038585020315c
SHA5122b2b130798b0f4e534626b9fb5deaa10bb1930e6700ac0ba7cf151c1bf3239039a7032ea67ceed86a4a4dbe981064c42a8e0f88fe8361e27002dd8ceb0ea767a
-
C:\Users\Admin\AppData\Local\Temp\BB32A919609945E2B71A979AF89CB007\BB32A919609945E2B71A979AF89CB007_LogFile.txt
Filesize9KB
MD5874dac9d65a593751c468a316b6e13e8
SHA1eee40486ddf1c2c99960ef5ea6b6b35febc3302f
SHA256111bfeee25f3059d7a6f2ba732e35ae1db7c0c02e1dada02a807a3021e975f1b
SHA5120b257b98c72786eb66ecdfe558ff0410c90901a1d93a86807de11c722e9ad233f0d816912af6807e51deb3aa60281e19c363ca07cb136f56ec2cf2de78567af3
-
Filesize
122KB
MD567e4721db567332e6caa37552b972f52
SHA16cc9171f2497044c3cd3b7e2cde2dc45c95ce388
SHA2569f04dc69501064e0f53c9c5c5cb75f022b9aafdcb29faa405c7ead5c9aae67e5
SHA512013bf66964ff356790c36c7f42fe61fe8b5720d981aaacee7af6b2a38ba599019907f58d59ac8c9331e8b290180a7879a19dcfb5f2327951655642a6a2eb352d
-
C:\Users\Admin\AppData\Local\Temp\nsmBE60.tmp\internal89e53685c475862961ab500610d14602_JaffaCakes118.exe
Filesize1.8MB
MD577bfacca17ee1d89833b57f3a746d9a0
SHA1aa9490c913489c5eafd02f67f875efcb56d23036
SHA25638571b0965110d07c6fbf4813ab628d4017cf52c681c457fb3f184b644fb0b52
SHA51221ecc2fce94a58cd39127964730b01722b9dafa20d3af65b023fe83188c08211ba1324849513ffc10b6a359737f98c4d06770dc1954f8880daff938a06581e6f
-
C:\Users\Admin\AppData\Local\Temp\nsmBE60.tmp\internal89e53685c475862961ab500610d14602_JaffaCakes118_icon.ico
Filesize11KB
MD5592abe695d3fb84c8a7589b0d2553a97
SHA1d70d6de6fa25ca1924bd02b84075ee94f3870133
SHA256ed59d25e5daf4e4c89c09a4c829ac4d12f1b0e258d167760a07bce6266cebda0
SHA512a8c09f8f35790a0bcf4b69ffa7f26eb60b8e14394ecef6a63c1776e538eb749251545dda48f6a7243c91d9779d24b4d774b39dbd966d32e5fa39071fff9a0978
-
C:\Users\Admin\AppData\Local\Temp\nsmBE60.tmp\internal89e53685c475862961ab500610d14602_JaffaCakes118_splash.png
Filesize136KB
MD50a8589de904eec91522c276d896216c4
SHA158ba5e9158c3afa3c3112fe1e24567996794c07e
SHA256496d42e72d7c57969f584849a8f7366783afd39862f7f71b59d78b723225cd55
SHA512bea912ebc889e6444532beacbe562038b78c918dff9bfa16d7d9a15e25f52ce90e93a6736636926ef7d45e65eb8f73da92149e3188cf5a4b78a8d248b3b0d9fd