Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 12:23
Static task
static1
Behavioral task
behavioral1
Sample
8a58237931a3e9d70c2611916c5529f9_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8a58237931a3e9d70c2611916c5529f9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8a58237931a3e9d70c2611916c5529f9_JaffaCakes118.exe
-
Size
212KB
-
MD5
8a58237931a3e9d70c2611916c5529f9
-
SHA1
e193ef8c93ee97049199a1cd6e1fa2b55d63b83b
-
SHA256
10751a3d25281681a875d6c54971d9846b58e86f922f42b0c4995d4c6ec766a8
-
SHA512
d3cd2dd910f8786ea98a6490de3314495b7484382cfa6717193798322f70893166528320bbae93cf9f68890dfe36bb35bc48adbf6a88906be18672ef3fdacc7f
-
SSDEEP
3072:/j7QKrmC/B6DmBvbjjqve4z4PiL2HUpOASklovCIlwNw:/4KrmH6vbSveP10p7W3lwu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 8a58237931a3e9d70c2611916c5529f9_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation windows.exe -
Executes dropped EXE 1 IoCs
pid Process 4080 windows.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windows = "C:\\\\windows.exe" windows.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files\Morpheus\My Shared Folder\windows.exe 8a58237931a3e9d70c2611916c5529f9_JaffaCakes118.exe File created C:\Program Files\Bearshare\Shared\kespersky Keys Generator.exee 8a58237931a3e9d70c2611916c5529f9_JaffaCakes118.exe File created C:\Program Files\Kazaa\My Shared Folder\windows.exe 8a58237931a3e9d70c2611916c5529f9_JaffaCakes118.exe File created C:\Program Files\Ares\My Shared Folder\windows.exe 8a58237931a3e9d70c2611916c5529f9_JaffaCakes118.exe File created C:\Program Files\LimeWire\Shared\windows.exe 8a58237931a3e9d70c2611916c5529f9_JaffaCakes118.exe File created C:\Program Files\eDonkey2000\windows.exe 8a58237931a3e9d70c2611916c5529f9_JaffaCakes118.exe File created C:\Program Files\eMule\Incoming\windows.exe 8a58237931a3e9d70c2611916c5529f9_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1412 4080 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a58237931a3e9d70c2611916c5529f9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2608 8a58237931a3e9d70c2611916c5529f9_JaffaCakes118.exe 2608 8a58237931a3e9d70c2611916c5529f9_JaffaCakes118.exe 4080 windows.exe 4080 windows.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2608 8a58237931a3e9d70c2611916c5529f9_JaffaCakes118.exe 2608 8a58237931a3e9d70c2611916c5529f9_JaffaCakes118.exe 4080 windows.exe 4080 windows.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2608 wrote to memory of 1396 2608 8a58237931a3e9d70c2611916c5529f9_JaffaCakes118.exe 87 PID 2608 wrote to memory of 1396 2608 8a58237931a3e9d70c2611916c5529f9_JaffaCakes118.exe 87 PID 2608 wrote to memory of 1396 2608 8a58237931a3e9d70c2611916c5529f9_JaffaCakes118.exe 87 PID 2608 wrote to memory of 4080 2608 8a58237931a3e9d70c2611916c5529f9_JaffaCakes118.exe 89 PID 2608 wrote to memory of 4080 2608 8a58237931a3e9d70c2611916c5529f9_JaffaCakes118.exe 89 PID 2608 wrote to memory of 4080 2608 8a58237931a3e9d70c2611916c5529f9_JaffaCakes118.exe 89 PID 1396 wrote to memory of 4360 1396 net.exe 90 PID 1396 wrote to memory of 4360 1396 net.exe 90 PID 1396 wrote to memory of 4360 1396 net.exe 90 PID 4080 wrote to memory of 3212 4080 windows.exe 91 PID 4080 wrote to memory of 3212 4080 windows.exe 91 PID 4080 wrote to memory of 3212 4080 windows.exe 91 PID 3212 wrote to memory of 664 3212 net.exe 93 PID 3212 wrote to memory of 664 3212 net.exe 93 PID 3212 wrote to memory of 664 3212 net.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a58237931a3e9d70c2611916c5529f9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8a58237931a3e9d70c2611916c5529f9_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop sharedaccess2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess3⤵
- System Location Discovery: System Language Discovery
PID:4360
-
-
-
C:\windows.exeC:\\windows.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop sharedaccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess4⤵
- System Location Discovery: System Language Discovery
PID:664
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 18003⤵
- Program crash
PID:1412
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4080 -ip 40801⤵PID:1456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD5cb492b7df9b5c170d7c87527940eff3b
SHA166928e6cbb59c3a3bce606959ef4a865fe04e642
SHA256dba5166ad9db9ba648c1032ebbd34dcd0d085b50023b839ef5c68ca1db93a563
SHA512ce677db6ae33c5496874a2902d30d361f6cf12576e96bd8a9f6626a0ca29f0b4f97e403e54711d24ebf34d4e183235a8f9951345d32a20f2dad476d911ee7e06
-
Filesize
212KB
MD58a58237931a3e9d70c2611916c5529f9
SHA1e193ef8c93ee97049199a1cd6e1fa2b55d63b83b
SHA25610751a3d25281681a875d6c54971d9846b58e86f922f42b0c4995d4c6ec766a8
SHA512d3cd2dd910f8786ea98a6490de3314495b7484382cfa6717193798322f70893166528320bbae93cf9f68890dfe36bb35bc48adbf6a88906be18672ef3fdacc7f