Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 18:56
Static task
static1
Behavioral task
behavioral1
Sample
8b954f97b299cc337b4be8a8c4f93ba0_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8b954f97b299cc337b4be8a8c4f93ba0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8b954f97b299cc337b4be8a8c4f93ba0_JaffaCakes118.exe
-
Size
41KB
-
MD5
8b954f97b299cc337b4be8a8c4f93ba0
-
SHA1
5f553cea36b8568334ec341f0dceb4e8c11da3ed
-
SHA256
9553902a38602971f1b75dab48d03e7379cd09038abc703d94892a9e5e4d09bd
-
SHA512
7d623bce2c08756588aeeb52293401e6ee6c8e901adb47bb0c4f14f85fa2e820edbed1ae1bb8531357a4be00d85ec539e8498ae6938683ea5e393a4a6dc0540d
-
SSDEEP
768:QIBar1ZIZYnfI9opm6AIHIjaI7g9mVmUngoNE/W5dRV8:pW1ZIZqI9opm6AIHIjzmU5Nzd
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation 8b954f97b299cc337b4be8a8c4f93ba0_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation sxhost.exe -
Executes dropped EXE 1 IoCs
pid Process 4916 sxhost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b954f97b299cc337b4be8a8c4f93ba0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sxhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 368 wrote to memory of 4916 368 8b954f97b299cc337b4be8a8c4f93ba0_JaffaCakes118.exe 87 PID 368 wrote to memory of 4916 368 8b954f97b299cc337b4be8a8c4f93ba0_JaffaCakes118.exe 87 PID 368 wrote to memory of 4916 368 8b954f97b299cc337b4be8a8c4f93ba0_JaffaCakes118.exe 87 PID 368 wrote to memory of 3060 368 8b954f97b299cc337b4be8a8c4f93ba0_JaffaCakes118.exe 88 PID 368 wrote to memory of 3060 368 8b954f97b299cc337b4be8a8c4f93ba0_JaffaCakes118.exe 88 PID 368 wrote to memory of 3060 368 8b954f97b299cc337b4be8a8c4f93ba0_JaffaCakes118.exe 88 PID 4916 wrote to memory of 216 4916 sxhost.exe 90 PID 4916 wrote to memory of 216 4916 sxhost.exe 90 PID 4916 wrote to memory of 216 4916 sxhost.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b954f97b299cc337b4be8a8c4f93ba0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8b954f97b299cc337b4be8a8c4f93ba0_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\sxhost.exe"C:\Users\Admin\sxhost.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del C:\Users\Admin\sxhost.exe >> NUL3⤵
- System Location Discovery: System Language Discovery
PID:216
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\8B954F~1.EXE >> NUL2⤵
- System Location Discovery: System Language Discovery
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD58b954f97b299cc337b4be8a8c4f93ba0
SHA15f553cea36b8568334ec341f0dceb4e8c11da3ed
SHA2569553902a38602971f1b75dab48d03e7379cd09038abc703d94892a9e5e4d09bd
SHA5127d623bce2c08756588aeeb52293401e6ee6c8e901adb47bb0c4f14f85fa2e820edbed1ae1bb8531357a4be00d85ec539e8498ae6938683ea5e393a4a6dc0540d