Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2024 20:14
Static task
static1
Behavioral task
behavioral1
Sample
949256b3ebba498f3347b5f1da8cd954_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
949256b3ebba498f3347b5f1da8cd954_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
949256b3ebba498f3347b5f1da8cd954_JaffaCakes118.exe
-
Size
14KB
-
MD5
949256b3ebba498f3347b5f1da8cd954
-
SHA1
6a861a4f011f6da8fb56cc7af3f0f671dba013e9
-
SHA256
8e19a48a663fcf8d3282c7fa4c99d5a1bfb6d22cec482d9e3cca4bfa0350f6cc
-
SHA512
55740efb0ac4a3e6fcaf1449d5507d223d3e969401abb614db6daed874caea0b5811a5b7c0383c3af606f61ed51802c4e59ed34d8ca149583b7065db56aff763
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhZ:hDXWipuE+K3/SSHgxD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation 949256b3ebba498f3347b5f1da8cd954_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation DEM607A.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation DEMB7F1.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation DEMEBC.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation DEM649C.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation DEMBB76.exe -
Executes dropped EXE 6 IoCs
pid Process 4556 DEM607A.exe 3296 DEMB7F1.exe 4880 DEMEBC.exe 4548 DEM649C.exe 2544 DEMBB76.exe 1664 DEM1280.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM607A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMB7F1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMEBC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM649C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMBB76.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM1280.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 949256b3ebba498f3347b5f1da8cd954_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3876 wrote to memory of 4556 3876 949256b3ebba498f3347b5f1da8cd954_JaffaCakes118.exe 103 PID 3876 wrote to memory of 4556 3876 949256b3ebba498f3347b5f1da8cd954_JaffaCakes118.exe 103 PID 3876 wrote to memory of 4556 3876 949256b3ebba498f3347b5f1da8cd954_JaffaCakes118.exe 103 PID 4556 wrote to memory of 3296 4556 DEM607A.exe 108 PID 4556 wrote to memory of 3296 4556 DEM607A.exe 108 PID 4556 wrote to memory of 3296 4556 DEM607A.exe 108 PID 3296 wrote to memory of 4880 3296 DEMB7F1.exe 111 PID 3296 wrote to memory of 4880 3296 DEMB7F1.exe 111 PID 3296 wrote to memory of 4880 3296 DEMB7F1.exe 111 PID 4880 wrote to memory of 4548 4880 DEMEBC.exe 113 PID 4880 wrote to memory of 4548 4880 DEMEBC.exe 113 PID 4880 wrote to memory of 4548 4880 DEMEBC.exe 113 PID 4548 wrote to memory of 2544 4548 DEM649C.exe 121 PID 4548 wrote to memory of 2544 4548 DEM649C.exe 121 PID 4548 wrote to memory of 2544 4548 DEM649C.exe 121 PID 2544 wrote to memory of 1664 2544 DEMBB76.exe 123 PID 2544 wrote to memory of 1664 2544 DEMBB76.exe 123 PID 2544 wrote to memory of 1664 2544 DEMBB76.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\949256b3ebba498f3347b5f1da8cd954_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\949256b3ebba498f3347b5f1da8cd954_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\DEM607A.exe"C:\Users\Admin\AppData\Local\Temp\DEM607A.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\DEMB7F1.exe"C:\Users\Admin\AppData\Local\Temp\DEMB7F1.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\DEMEBC.exe"C:\Users\Admin\AppData\Local\Temp\DEMEBC.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\DEM649C.exe"C:\Users\Admin\AppData\Local\Temp\DEM649C.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\DEMBB76.exe"C:\Users\Admin\AppData\Local\Temp\DEMBB76.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\DEM1280.exe"C:\Users\Admin\AppData\Local\Temp\DEM1280.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1664
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4076,i,12198811467968044966,17227406646827438786,262144 --variations-seed-version --mojo-platform-channel-handle=4300 /prefetch:81⤵PID:4148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5c0136ebb91268df8299de3e4649f49a2
SHA1e283d73da1f78df87f61a99421ff74d33371fe1f
SHA2569b4a4489b1e7dd82b0d130fe4dbe85ec9be4e5bd56295cae4656cd4ae8a504a5
SHA512277421ddf5ec2d984a49009341d36858a1ec2b3addf5c068e26714915f4e7e7cd9883c91f661a621269a5890f8d56731f7282b48eaa7107d5493af81846b8ab7
-
Filesize
14KB
MD53efafe0fc286fa71d5e49fe23e049d08
SHA1a81ee927cef92082ea97d66e8b57ac9ee9152ab7
SHA2561ec024ae163f8b1a6cc7d63bfe4a58f9f647b8b73627ed8d1344b485749f57d3
SHA5121e1411692a89b3c775be570459d8dab39198d43a15d3f7529186d159b29b51d5f59c6684cd87c294318e90377c3a7fafad1b786bc73eb22a4616595d55e9e426
-
Filesize
14KB
MD5c2155a3b18b4278db7e3f31a400949d2
SHA13d2a8dda9239629dd5e73223999074fbd7ce7205
SHA25615d83212580f9d360acfd92a7b8c4e05834aa4becc4ffab5054cccff08e8be0d
SHA5120b1a8eb301131ef54d90b0ced6a86252428e9c995842e46ff9238dc6927a9b1b84915f3302d4ecae52eea7eb97d5f6c5a33ff5a5202ac07534f74a13a18a46b0
-
Filesize
14KB
MD53e158d21ca9c73396f918c68c3b0afa3
SHA1adc4380ae360461f6e17f1bd1e6c9e10ce0b4544
SHA256263b2cc00c324afed5b784a4c226ccba5683522641ba1a491b000d0ea8458528
SHA5126f58f2b9176e0b344bd7a81e36e60d9f5138950cc044853d4610d30732ba93b4f62ee81df7bc729b010d1d5068f767290a7122c6a2f4a46ea0d8fd540d6a75e6
-
Filesize
14KB
MD54ff7eded9b04290ab1d752ea812af458
SHA1d3af2c8c915454a9be4b1f2d20f5a5aed1dea3d3
SHA25646596c8dec4dbc7215a1eb58b7780f3dc87b3f486eb639513b1ae123b223c5b3
SHA512ae55ccb1227649a525ba6f6ff641f61b439fcc6d9ab97ccce73e7857792f622f2edb93b463f59bae27febaa82de28c4adf5f6ae147cb2cb6a9f5e5a6fd0ac505
-
Filesize
14KB
MD5debe5435dfb9aeef368ecf628a73ce03
SHA16bc87df8dc936dc3a53ced13551624724eeec34a
SHA256431e05931954e35c9449464bbaf377c65e5fb687c8f09a13fed7f2569c886c5a
SHA512474b7ea8afb9fdc29fa5711bff46921e8f9394ec6f69cf2c6ed019390c23f42a12b96115770fbfe0de9db80b663ee0ddc4a65ac04f91c8b33d4514d4abb1694e