Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 17:50
Static task
static1
Behavioral task
behavioral1
Sample
941d7e4b8e4b1d748e9882615d2d20ca_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
941d7e4b8e4b1d748e9882615d2d20ca_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
941d7e4b8e4b1d748e9882615d2d20ca_JaffaCakes118.exe
-
Size
447KB
-
MD5
941d7e4b8e4b1d748e9882615d2d20ca
-
SHA1
2a9f3c5346ab6c8d35566a892da0d85c317c1591
-
SHA256
f48d1cac66fc906a2b30920d70b23a117655f399aa97906c12362a61cc77b710
-
SHA512
443f86b0d4a3212ec380a3bab1eb6ba1f93fcc8b1560c650ea8726fed30ea9585f0a11b326fe278d893e7b51adb45822a94f4b4f3adae3a0306d7cc30a04523a
-
SSDEEP
12288:WAxrsbjl1Qrc+Fn58qD0uVkSWr0q4bTLEcJTGR4i53S:Zxeg7D30IbWQTLEcJXK
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 941d7e4b8e4b1d748e9882615d2d20ca_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 656 YMPXRXjVhBlnS.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YMPXRXjVhBlnS.exe = "C:\\ProgramData\\YMPXRXjVhBlnS.exe" 941d7e4b8e4b1d748e9882615d2d20ca_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 941d7e4b8e4b1d748e9882615d2d20ca_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YMPXRXjVhBlnS.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" 941d7e4b8e4b1d748e9882615d2d20ca_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Download 941d7e4b8e4b1d748e9882615d2d20ca_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 3828 941d7e4b8e4b1d748e9882615d2d20ca_JaffaCakes118.exe 3828 941d7e4b8e4b1d748e9882615d2d20ca_JaffaCakes118.exe 3828 941d7e4b8e4b1d748e9882615d2d20ca_JaffaCakes118.exe 3828 941d7e4b8e4b1d748e9882615d2d20ca_JaffaCakes118.exe 656 YMPXRXjVhBlnS.exe 656 YMPXRXjVhBlnS.exe 656 YMPXRXjVhBlnS.exe 656 YMPXRXjVhBlnS.exe 656 YMPXRXjVhBlnS.exe 656 YMPXRXjVhBlnS.exe 656 YMPXRXjVhBlnS.exe 656 YMPXRXjVhBlnS.exe 656 YMPXRXjVhBlnS.exe 656 YMPXRXjVhBlnS.exe 656 YMPXRXjVhBlnS.exe 656 YMPXRXjVhBlnS.exe 656 YMPXRXjVhBlnS.exe 656 YMPXRXjVhBlnS.exe 656 YMPXRXjVhBlnS.exe 656 YMPXRXjVhBlnS.exe 656 YMPXRXjVhBlnS.exe 656 YMPXRXjVhBlnS.exe 656 YMPXRXjVhBlnS.exe 656 YMPXRXjVhBlnS.exe 656 YMPXRXjVhBlnS.exe 656 YMPXRXjVhBlnS.exe 656 YMPXRXjVhBlnS.exe 656 YMPXRXjVhBlnS.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3828 941d7e4b8e4b1d748e9882615d2d20ca_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3828 wrote to memory of 656 3828 941d7e4b8e4b1d748e9882615d2d20ca_JaffaCakes118.exe 84 PID 3828 wrote to memory of 656 3828 941d7e4b8e4b1d748e9882615d2d20ca_JaffaCakes118.exe 84 PID 3828 wrote to memory of 656 3828 941d7e4b8e4b1d748e9882615d2d20ca_JaffaCakes118.exe 84 PID 656 wrote to memory of 3452 656 YMPXRXjVhBlnS.exe 56 PID 656 wrote to memory of 3452 656 YMPXRXjVhBlnS.exe 56 PID 656 wrote to memory of 3452 656 YMPXRXjVhBlnS.exe 56 PID 656 wrote to memory of 3452 656 YMPXRXjVhBlnS.exe 56 PID 656 wrote to memory of 3452 656 YMPXRXjVhBlnS.exe 56 PID 656 wrote to memory of 3452 656 YMPXRXjVhBlnS.exe 56 PID 656 wrote to memory of 3452 656 YMPXRXjVhBlnS.exe 56 PID 656 wrote to memory of 3452 656 YMPXRXjVhBlnS.exe 56 PID 656 wrote to memory of 3452 656 YMPXRXjVhBlnS.exe 56 PID 656 wrote to memory of 3452 656 YMPXRXjVhBlnS.exe 56 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 941d7e4b8e4b1d748e9882615d2d20ca_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" 941d7e4b8e4b1d748e9882615d2d20ca_JaffaCakes118.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\941d7e4b8e4b1d748e9882615d2d20ca_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\941d7e4b8e4b1d748e9882615d2d20ca_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3828 -
C:\ProgramData\YMPXRXjVhBlnS.exe"C:\ProgramData\YMPXRXjVhBlnS.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD51875852304c53ad7b03fb8d9fae8b3f2
SHA123f07d969ed6a3f9200ad0e5b86375cb9f389a5a
SHA256a78c9dd088b1f18ca73adc30fed7b50ab5e7cabb0353895b1d381f02176dca8a
SHA512a30c5570b0210c4cc0bb7310b0f76afc850b4c5edf9b44aa344235934c9a949b425a93da59571b768f8a85b86b91578f859d2860e5643dcf8df08953e17d7cfb
-
Filesize
447KB
MD5941d7e4b8e4b1d748e9882615d2d20ca
SHA12a9f3c5346ab6c8d35566a892da0d85c317c1591
SHA256f48d1cac66fc906a2b30920d70b23a117655f399aa97906c12362a61cc77b710
SHA512443f86b0d4a3212ec380a3bab1eb6ba1f93fcc8b1560c650ea8726fed30ea9585f0a11b326fe278d893e7b51adb45822a94f4b4f3adae3a0306d7cc30a04523a