Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 14:29
Static task
static1
Behavioral task
behavioral1
Sample
a2e9c9d7343908893d1f0a8ffe72587f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a2e9c9d7343908893d1f0a8ffe72587f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a2e9c9d7343908893d1f0a8ffe72587f_JaffaCakes118.exe
-
Size
408KB
-
MD5
a2e9c9d7343908893d1f0a8ffe72587f
-
SHA1
75791ef2c84b9373e3def0c218ec3b3c47295333
-
SHA256
da99b58275d4b79647c8622d71f6416f18b7ee2f5cf8eda3cf7b938142f3cdaf
-
SHA512
14f36a9a38baeb8db4fe0de2c88d953a526001c5d20f3e5c719bb8e07638fb1a778d36552c5f223389b0fac482b5d828b75172b3d91930bc56d4b5c9d830b8df
-
SSDEEP
12288:b1dlZo5yaC+4JxDTPu0N77TabfB21eNKIJ7I25l9n:b1dlZo5xC+4JRPuE77TiB21eNHB
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation a2e9c9d7343908893d1f0a8ffe72587f_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2056 AutoClicker Hacked!.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2e9c9d7343908893d1f0a8ffe72587f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AutoClicker Hacked!.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3"> <requestedExecutionLevel level="asInvoker" uiAccess="false"\> <\requestedPrivileges> <\security> <\trustInfo> <\assembly> a2e9c9d7343908893d1f0a8ffe72587f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2056 2420 a2e9c9d7343908893d1f0a8ffe72587f_JaffaCakes118.exe 85 PID 2420 wrote to memory of 2056 2420 a2e9c9d7343908893d1f0a8ffe72587f_JaffaCakes118.exe 85 PID 2420 wrote to memory of 2056 2420 a2e9c9d7343908893d1f0a8ffe72587f_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2e9c9d7343908893d1f0a8ffe72587f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a2e9c9d7343908893d1f0a8ffe72587f_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\AutoClicker Hacked!.exe"C:\Users\Admin\AppData\Local\Temp\AutoClicker Hacked!.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD52c130b5ff5131838840ffba53bd2e017
SHA1c3e799bed1fabe0a4c252fa9d8facf27a7fdda62
SHA256adc4f09ceebe785b78348a42a7936a9c91775c1aa1a2e4bbe3c6468668433994
SHA5126e5d02369336113ac0b2c0050c4f46a40900ac8711f079fe4e452e590d2c623cf922aedc9bf7bee879a89ede5ddadda221d99f86166aa6fc4049e8ac5a5e87e2
-
Filesize
238B
MD5b128b2c4f1cb252776a0d16849d6c634
SHA133c4c5f4b23d10162eb045d418d7402d3507a1b9
SHA2566d55958a3fd35a7e978d0d309705a31f3a29001ce69d8f3c9a95e18bb768d899
SHA5128359ad3c7f12d24a38beef738f35179841ca181606a3f394023ee6c088907dd95ac3b410571ce41fc3e43df4402bf29bf2d76242cdf5909701ce1f4ef5ed9ebd