Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-08-2024 15:58
Static task
static1
Behavioral task
behavioral1
Sample
9aab20d98851ad1551512cfa4a451919_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
9aab20d98851ad1551512cfa4a451919_JaffaCakes118.exe
-
Size
4.4MB
-
MD5
9aab20d98851ad1551512cfa4a451919
-
SHA1
b8b8e9b0b4003543519c5eb793d75d6b43d87e68
-
SHA256
a713e82b257e6893260e4a0a2abf2f87c50ad92375252d695423f3f21cb02020
-
SHA512
067700259fabcf353f73b872250a7ddb3f4e5e61e1c7df2b32603443c940032934a2ff881b894a9dc24d6e125f70ed712b1e4bb40d4c9d8682a7518f69b3e6e8
-
SSDEEP
98304:LbVzn8w6ASFT/ONlEJZU2iNXs2ywzJSZVFMetAPu2rWMqktOJbcYGN:LRFSVKEJZUpNXSwg1tAPu2li1cYi
Malware Config
Extracted
bitrat
1.34
194.5.98.37:4898
-
communication_password
f830115cf81c3c3986d8ea87902cea65
-
tor_process
tor
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 9aab20d98851ad1551512cfa4a451919_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1608 Runtime Broker.exe 4568 Runtime Broker.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4804 RegAsm.exe 4804 RegAsm.exe 4804 RegAsm.exe 4804 RegAsm.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1608 set thread context of 4568 1608 Runtime Broker.exe 108 PID 4568 set thread context of 4804 4568 Runtime Broker.exe 112 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9aab20d98851ad1551512cfa4a451919_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Runtime Broker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Runtime Broker.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 4804 RegAsm.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4804 RegAsm.exe 4804 RegAsm.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 404 wrote to memory of 1608 404 9aab20d98851ad1551512cfa4a451919_JaffaCakes118.exe 86 PID 404 wrote to memory of 1608 404 9aab20d98851ad1551512cfa4a451919_JaffaCakes118.exe 86 PID 404 wrote to memory of 1608 404 9aab20d98851ad1551512cfa4a451919_JaffaCakes118.exe 86 PID 1608 wrote to memory of 4568 1608 Runtime Broker.exe 108 PID 1608 wrote to memory of 4568 1608 Runtime Broker.exe 108 PID 1608 wrote to memory of 4568 1608 Runtime Broker.exe 108 PID 1608 wrote to memory of 4568 1608 Runtime Broker.exe 108 PID 1608 wrote to memory of 4568 1608 Runtime Broker.exe 108 PID 1608 wrote to memory of 4568 1608 Runtime Broker.exe 108 PID 1608 wrote to memory of 4568 1608 Runtime Broker.exe 108 PID 1608 wrote to memory of 4568 1608 Runtime Broker.exe 108 PID 4568 wrote to memory of 4804 4568 Runtime Broker.exe 112 PID 4568 wrote to memory of 4804 4568 Runtime Broker.exe 112 PID 4568 wrote to memory of 4804 4568 Runtime Broker.exe 112 PID 4568 wrote to memory of 4804 4568 Runtime Broker.exe 112 PID 4568 wrote to memory of 4804 4568 Runtime Broker.exe 112 PID 4568 wrote to memory of 4804 4568 Runtime Broker.exe 112 PID 4568 wrote to memory of 4804 4568 Runtime Broker.exe 112 PID 4568 wrote to memory of 4804 4568 Runtime Broker.exe 112 PID 4568 wrote to memory of 4804 4568 Runtime Broker.exe 112 PID 4568 wrote to memory of 4804 4568 Runtime Broker.exe 112 PID 4568 wrote to memory of 4804 4568 Runtime Broker.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\9aab20d98851ad1551512cfa4a451919_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9aab20d98851ad1551512cfa4a451919_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4804
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD517573558c4e714f606f997e5157afaac
SHA113e16e9415ceef429aaf124139671ebeca09ed23
SHA256c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553
SHA512f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc
-
Filesize
4.5MB
MD5be7631a548ea45c58e25d9c3983bb103
SHA116910a73765ae752e4438975ef621a7f34c6313e
SHA256fbfa16c8f31897ceefddab7d738fd1596028ce0fa3218f5c5c42d1c19469d90e
SHA5120cd1614999964d76681635db5f276b6dceb3b8a3b1005e3095de450cdc0cf471fc7097476ddd89d2ba9783f911b9c5cb4fa36050eccd0924a0d1dc08a523fdd2