Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 18:26
Static task
static1
Behavioral task
behavioral1
Sample
943c4218a88df9f4906e3a1aa78c6c2e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
943c4218a88df9f4906e3a1aa78c6c2e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
943c4218a88df9f4906e3a1aa78c6c2e_JaffaCakes118.exe
-
Size
340KB
-
MD5
943c4218a88df9f4906e3a1aa78c6c2e
-
SHA1
e26d5d697af90afdbf8d775cb95274eb0a749869
-
SHA256
1c9b1783093bd84d0f01392c5ca13a82adb79fef0e41d8e3ae561a3117c1305d
-
SHA512
1e938df3c65dd6dbded52a63ceb47045e6307000bf9e05bfc0532ead2c093b81e91549c10e1e06e092dd9c8189333e5d5518f6650e5b9f463faa5acfd90aeaee
-
SSDEEP
6144:G0PEtTPkAuAfjlJuj3QjgJ6snJZ/RjY07qVyLOyFTzVxh3VAitO8yb8D/3/:G0m3blK36QhuIOyFHxlAaO8ye3/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 943c4218a88df9f4906e3a1aa78c6c2e_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 943c4218a88df9f4906e3a1aa78c6c2e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2468 timeout.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1068 wrote to memory of 2072 1068 943c4218a88df9f4906e3a1aa78c6c2e_JaffaCakes118.exe 84 PID 1068 wrote to memory of 2072 1068 943c4218a88df9f4906e3a1aa78c6c2e_JaffaCakes118.exe 84 PID 1068 wrote to memory of 2072 1068 943c4218a88df9f4906e3a1aa78c6c2e_JaffaCakes118.exe 84 PID 2072 wrote to memory of 2468 2072 cmd.exe 86 PID 2072 wrote to memory of 2468 2072 cmd.exe 86 PID 2072 wrote to memory of 2468 2072 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\943c4218a88df9f4906e3a1aa78c6c2e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\943c4218a88df9f4906e3a1aa78c6c2e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 5 && del C:\Users\Admin\AppData\Local\Temp\943C42~1.EXE2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\timeout.exetimeout 53⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2468
-
-