Analysis
-
max time kernel
143s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 14:07
Static task
static1
Behavioral task
behavioral1
Sample
a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe
-
Size
228KB
-
MD5
a2d65aa920a0b46183500e8ac03dd888
-
SHA1
abfdf05f5732315ea4704fa345b956a49fb286cb
-
SHA256
6414f9993f90a81637935cfaa9643aa5f6c20df1cdd4bd6cbf2191ff3593b293
-
SHA512
7a36cae9e7e39775f4184172db5719aa1218c5c512ed81b2e8d3367b092a93e0b074648f490951e866b488dbbb7e57c0b3fd34699670e82133461135f6bcfc9b
-
SSDEEP
6144:J4lRkAehaKuqT+FjblnpYPWx5U418Lw+dlG:JkWAehJuqT0pYPi5ULdlG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3004 smss.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\NetMeeting\netupdate.dll smss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4100 3004 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4260 wrote to memory of 3004 4260 a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe 85 PID 4260 wrote to memory of 3004 4260 a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe 85 PID 4260 wrote to memory of 3004 4260 a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a2d65aa920a0b46183500e8ac03dd888_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\smss.exe"C:\Users\Admin\AppData\Local\Temp\smss.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 7003⤵
- Program crash
PID:4100
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3004 -ip 30041⤵PID:4804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD58a4eee88bbb0250b889cc4bca466edd5
SHA1163011e4516d273b5dc5a6161e83e2c1ff31a384
SHA256c9d9aceb927174fb00e367a00a6b604c85a6f028fe667e36dc54d9bd63266aba
SHA51222417c6f0303f180dca62b6d543ecba2ba347516ff956394bafe13d4ed004d1026c24c93828cda50ca909faf34436942e52c7c8473578c0ec0f1e516f96517ca
-
Filesize
58KB
MD58a6ea882564826b400284976a9455efc
SHA166723ae75ea688a91046208805f679aa8bb0ce31
SHA256932157b8abcb82016af7b38eec423a570c291eaaa79fa2464eba362796ae66e7
SHA512b9304a2ad05250000971e98117da8c173effa5f8673d7ad58dfa457669245e8f7bd94dfba744d02b1235573e7b09c019cf0824338b946cfe3fffcf4e337cf705