Analysis
-
max time kernel
12s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-08-2024 03:50
Static task
static1
Behavioral task
behavioral1
Sample
8d33fa92f7b760e54ca9dcd8e88c3059_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8d33fa92f7b760e54ca9dcd8e88c3059_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8d33fa92f7b760e54ca9dcd8e88c3059_JaffaCakes118.exe
-
Size
88KB
-
MD5
8d33fa92f7b760e54ca9dcd8e88c3059
-
SHA1
a359f7646752235195cb62b04d11b1491b1cb5cf
-
SHA256
baf92ed05428caff6c3ca0ad43a78c8d2b6e5ff260c00eb3471de840901d4103
-
SHA512
16156f69db255e35b4fde2e6b116da20191a4e0d56a2129de33caed82b36615efb607ac55c6ba5038be3369f53b64189930ba8efbfc86ecc2397b03b513142d3
-
SSDEEP
768:0gUYAW0otPFLfCLcemsuTHdeP/o/YfOGtDQ2LmGtN82P:0gFVCLcZz9eXQutMGfP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 8d33fa92f7b760e54ca9dcd8e88c3059_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4368 rious.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rious.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d33fa92f7b760e54ca9dcd8e88c3059_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4368 rious.exe 4368 rious.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 624 8d33fa92f7b760e54ca9dcd8e88c3059_JaffaCakes118.exe 4368 rious.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 624 wrote to memory of 4368 624 8d33fa92f7b760e54ca9dcd8e88c3059_JaffaCakes118.exe 90 PID 624 wrote to memory of 4368 624 8d33fa92f7b760e54ca9dcd8e88c3059_JaffaCakes118.exe 90 PID 624 wrote to memory of 4368 624 8d33fa92f7b760e54ca9dcd8e88c3059_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d33fa92f7b760e54ca9dcd8e88c3059_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8d33fa92f7b760e54ca9dcd8e88c3059_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\rious.exe"C:\Users\Admin\rious.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5c5c20a6dfc81406786d33e4402eb44dd
SHA16cf4028e4e730cc0e37446df201dadd7aa54e4b7
SHA2567d07af55eab7e387e15a9ff40c295dd84a8c7732624eea8c5587f9071d1e5d4d
SHA512c6994b6b945f524972b0effce47a238934d7e1ec80a480a949a854bd7436aeafad9f7a585d973cf6e778a565b72b64e44b2d5f62067931ec838040b2b083169f