Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 06:39
Static task
static1
Behavioral task
behavioral1
Sample
8db2afee2573058885e12ff477a81047_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8db2afee2573058885e12ff477a81047_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8db2afee2573058885e12ff477a81047_JaffaCakes118.exe
-
Size
326KB
-
MD5
8db2afee2573058885e12ff477a81047
-
SHA1
130f432168bda6f743c7c853b820a7542554fc9b
-
SHA256
3aec61d5d29c736894cf96f36e9985ef22c17f96c24b36b3bdd329d67dc6f307
-
SHA512
723366524e0c47c84e080c98f5fdc343e530e4ae232a9507d6a347053cb59623ceb02d4277fc8115cbbec68bb5e7bd7463e31265ee74d112edd234ded88eacfb
-
SSDEEP
6144:w+Nx15ILgM2u+nmzK6QgSuHL5vj6pNaUs6b0PbP2L55kGor1BQ16LOM1:w+HIEGpzK6FSkFvNU10jabkxggSE
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation 8db2afee2573058885e12ff477a81047_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation WinKettle.exe -
Executes dropped EXE 1 IoCs
pid Process 2356 WinKettle.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Kernel Log = "WinKettle.exe" 8db2afee2573058885e12ff477a81047_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\WinKettle.exe 8db2afee2573058885e12ff477a81047_JaffaCakes118.exe File opened for modification C:\Windows\WinKettle.exe 8db2afee2573058885e12ff477a81047_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinKettle.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8db2afee2573058885e12ff477a81047_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1448 wrote to memory of 1124 1448 8db2afee2573058885e12ff477a81047_JaffaCakes118.exe 91 PID 1448 wrote to memory of 1124 1448 8db2afee2573058885e12ff477a81047_JaffaCakes118.exe 91 PID 1448 wrote to memory of 1124 1448 8db2afee2573058885e12ff477a81047_JaffaCakes118.exe 91 PID 1124 wrote to memory of 3448 1124 cmd.exe 93 PID 1124 wrote to memory of 3448 1124 cmd.exe 93 PID 1124 wrote to memory of 3448 1124 cmd.exe 93 PID 3448 wrote to memory of 1624 3448 net.exe 94 PID 3448 wrote to memory of 1624 3448 net.exe 94 PID 3448 wrote to memory of 1624 3448 net.exe 94 PID 1124 wrote to memory of 3988 1124 cmd.exe 95 PID 1124 wrote to memory of 3988 1124 cmd.exe 95 PID 1124 wrote to memory of 3988 1124 cmd.exe 95 PID 3988 wrote to memory of 3644 3988 net.exe 96 PID 3988 wrote to memory of 3644 3988 net.exe 96 PID 3988 wrote to memory of 3644 3988 net.exe 96 PID 1448 wrote to memory of 2356 1448 8db2afee2573058885e12ff477a81047_JaffaCakes118.exe 106 PID 1448 wrote to memory of 2356 1448 8db2afee2573058885e12ff477a81047_JaffaCakes118.exe 106 PID 1448 wrote to memory of 2356 1448 8db2afee2573058885e12ff477a81047_JaffaCakes118.exe 106 PID 2356 wrote to memory of 4268 2356 WinKettle.exe 107 PID 2356 wrote to memory of 4268 2356 WinKettle.exe 107 PID 2356 wrote to memory of 4268 2356 WinKettle.exe 107 PID 4268 wrote to memory of 2480 4268 cmd.exe 109 PID 4268 wrote to memory of 2480 4268 cmd.exe 109 PID 4268 wrote to memory of 2480 4268 cmd.exe 109 PID 2480 wrote to memory of 3076 2480 net.exe 110 PID 2480 wrote to memory of 3076 2480 net.exe 110 PID 2480 wrote to memory of 3076 2480 net.exe 110 PID 4268 wrote to memory of 1508 4268 cmd.exe 111 PID 4268 wrote to memory of 1508 4268 cmd.exe 111 PID 4268 wrote to memory of 1508 4268 cmd.exe 111 PID 1508 wrote to memory of 4868 1508 net.exe 112 PID 1508 wrote to memory of 4868 1508 net.exe 112 PID 1508 wrote to memory of 4868 1508 net.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\8db2afee2573058885e12ff477a81047_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8db2afee2573058885e12ff477a81047_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\a.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
PID:1624
-
-
-
C:\Windows\SysWOW64\net.exenet stop winvnc43⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop winvnc44⤵
- System Location Discovery: System Language Discovery
PID:3644
-
-
-
-
C:\Windows\WinKettle.exe"C:\Windows\WinKettle.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\a.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"5⤵
- System Location Discovery: System Language Discovery
PID:3076
-
-
-
C:\Windows\SysWOW64\net.exenet stop winvnc44⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop winvnc45⤵
- System Location Discovery: System Language Discovery
PID:4868
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4448,i,1330210614411927383,9239043499051775691,262144 --variations-seed-version --mojo-platform-channel-handle=4396 /prefetch:81⤵PID:2512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
326KB
MD58db2afee2573058885e12ff477a81047
SHA1130f432168bda6f743c7c853b820a7542554fc9b
SHA2563aec61d5d29c736894cf96f36e9985ef22c17f96c24b36b3bdd329d67dc6f307
SHA512723366524e0c47c84e080c98f5fdc343e530e4ae232a9507d6a347053cb59623ceb02d4277fc8115cbbec68bb5e7bd7463e31265ee74d112edd234ded88eacfb
-
Filesize
71B
MD54db2c561024318efaf926a8e0a6ebc36
SHA18e3060152b239e7c7bc488e79030b9e3c13de066
SHA256f9ea85780a059d9338c359925ec487588102ef55be4062ec4ac19efc8af59f0f
SHA512df700bc9348e147ceb1db687974c567fdff052d73eb4709b718f3b3dfaf44116a5a70c0ae62438416888c0783a575e524f501da1308bbc987443ec3c852bef99