Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 16:48
Static task
static1
Behavioral task
behavioral1
Sample
a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
a3573c69097a3cb16aeef32f471d3e59
-
SHA1
b49b36f4f6e7aedf926467c13e6474b227092ed9
-
SHA256
c73e340bbe794dbf37662394aebde7de77649f6b5e422c443b86f5a1f1f7ab4e
-
SHA512
31ca953e701a457154bde59020ddeceee3adc0f2eacd73e2e9454e186b95a6bffbdd45d99e9b4bd8164950b0c96613939d245ee33ae0bdec02574b1d4109ef6f
-
SSDEEP
24576:0VMM5Si97gDwpG9LmctpwL7K1f7eADraRhcpl1i8hUfTt:MMniNEwpG9LDZx7eAD2zSji8hUfTt
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation udpconmain.exe -
Executes dropped EXE 5 IoCs
pid Process 3324 udpconmain.exe 3996 udpconmain.exe 4124 udpconmain.exe 1596 miner.exe 924 unzip.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CPU Config = "C:\\Users\\Admin\\AppData\\Local\\Temp\\udpconmain.exe" a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 udpconmain.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1104 set thread context of 4164 1104 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 94 PID 4164 set thread context of 2336 4164 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 95 PID 3324 set thread context of 3996 3324 udpconmain.exe 101 PID 3996 set thread context of 4124 3996 udpconmain.exe 102 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unzip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language udpconmain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language udpconmain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language miner.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language udpconmain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4124 udpconmain.exe 4124 udpconmain.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1104 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 4164 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 3324 udpconmain.exe 3996 udpconmain.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1104 wrote to memory of 4164 1104 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 94 PID 1104 wrote to memory of 4164 1104 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 94 PID 1104 wrote to memory of 4164 1104 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 94 PID 1104 wrote to memory of 4164 1104 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 94 PID 1104 wrote to memory of 4164 1104 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 94 PID 1104 wrote to memory of 4164 1104 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 94 PID 1104 wrote to memory of 4164 1104 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 94 PID 1104 wrote to memory of 4164 1104 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 94 PID 4164 wrote to memory of 2336 4164 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 95 PID 4164 wrote to memory of 2336 4164 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 95 PID 4164 wrote to memory of 2336 4164 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 95 PID 4164 wrote to memory of 2336 4164 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 95 PID 4164 wrote to memory of 2336 4164 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 95 PID 4164 wrote to memory of 2336 4164 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 95 PID 4164 wrote to memory of 2336 4164 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 95 PID 4164 wrote to memory of 2336 4164 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 95 PID 4164 wrote to memory of 2336 4164 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 95 PID 4164 wrote to memory of 2336 4164 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 95 PID 4164 wrote to memory of 2336 4164 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 95 PID 4164 wrote to memory of 2336 4164 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 95 PID 4164 wrote to memory of 2336 4164 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 95 PID 4164 wrote to memory of 2336 4164 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 95 PID 2336 wrote to memory of 3324 2336 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 96 PID 2336 wrote to memory of 3324 2336 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 96 PID 2336 wrote to memory of 3324 2336 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 96 PID 2336 wrote to memory of 3764 2336 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 97 PID 2336 wrote to memory of 3764 2336 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 97 PID 2336 wrote to memory of 3764 2336 a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe 97 PID 3324 wrote to memory of 3996 3324 udpconmain.exe 101 PID 3324 wrote to memory of 3996 3324 udpconmain.exe 101 PID 3324 wrote to memory of 3996 3324 udpconmain.exe 101 PID 3324 wrote to memory of 3996 3324 udpconmain.exe 101 PID 3324 wrote to memory of 3996 3324 udpconmain.exe 101 PID 3324 wrote to memory of 3996 3324 udpconmain.exe 101 PID 3324 wrote to memory of 3996 3324 udpconmain.exe 101 PID 3324 wrote to memory of 3996 3324 udpconmain.exe 101 PID 3996 wrote to memory of 4124 3996 udpconmain.exe 102 PID 3996 wrote to memory of 4124 3996 udpconmain.exe 102 PID 3996 wrote to memory of 4124 3996 udpconmain.exe 102 PID 3996 wrote to memory of 4124 3996 udpconmain.exe 102 PID 3996 wrote to memory of 4124 3996 udpconmain.exe 102 PID 3996 wrote to memory of 4124 3996 udpconmain.exe 102 PID 3996 wrote to memory of 4124 3996 udpconmain.exe 102 PID 3996 wrote to memory of 4124 3996 udpconmain.exe 102 PID 3996 wrote to memory of 4124 3996 udpconmain.exe 102 PID 3996 wrote to memory of 4124 3996 udpconmain.exe 102 PID 3996 wrote to memory of 4124 3996 udpconmain.exe 102 PID 3996 wrote to memory of 4124 3996 udpconmain.exe 102 PID 3996 wrote to memory of 4124 3996 udpconmain.exe 102 PID 3996 wrote to memory of 4124 3996 udpconmain.exe 102 PID 4124 wrote to memory of 1596 4124 udpconmain.exe 103 PID 4124 wrote to memory of 1596 4124 udpconmain.exe 103 PID 4124 wrote to memory of 1596 4124 udpconmain.exe 103 PID 4124 wrote to memory of 924 4124 udpconmain.exe 105 PID 4124 wrote to memory of 924 4124 udpconmain.exe 105 PID 4124 wrote to memory of 924 4124 udpconmain.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a3573c69097a3cb16aeef32f471d3e59_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"5⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\miner.exe"C:\Users\Admin\AppData\Local\Temp\miner.exe" -a 5 -o http://eu.triplemining.com:8344 -u udri_yocaniseeyourboobs -p lolbitches -t 17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1596
-
-
C:\Users\Admin\AppData\Local\Temp\unzip.exe"C:\Users\Admin\AppData\Local\Temp\unzip.exe" payload.zip7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:924
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\help.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:3764
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142B
MD59b57ba33ffe6db4ed453ecbcc59d4b2a
SHA1c74009ed71bd696aacb7b5d3cbf2473e80431262
SHA256e70f18a2c9165485e8be78f3806c55f3a761b5253709c40e3136d24bd10b63f2
SHA512d2e41712e81e46dca0ee79d07b21c666b26e1a47186d377aa84cea5fdbbd9fe0d15c08e5eb8b0ca15eec189b2e9c458652d6f3b99b48606241d7ac2799c851c9
-
Filesize
726KB
MD53b4986e5d94d0e5723eea640a6735769
SHA1eab3272d5ef1038bf3d336d2b033b813403a9ff2
SHA2568b2b026f8d00b02ff75f05cbf322e4f4b85fb609cddd93bebf17014914b90df9
SHA512efff68d4e82bf61cf7430e0673fe92f5f379ac5e52b084516d6d624097e3f767f7696f48d576dce02b03fe5976db862271db5a7b01298211913b5fa901ddb965
-
Filesize
1.0MB
MD5a3573c69097a3cb16aeef32f471d3e59
SHA1b49b36f4f6e7aedf926467c13e6474b227092ed9
SHA256c73e340bbe794dbf37662394aebde7de77649f6b5e422c443b86f5a1f1f7ab4e
SHA51231ca953e701a457154bde59020ddeceee3adc0f2eacd73e2e9454e186b95a6bffbdd45d99e9b4bd8164950b0c96613939d245ee33ae0bdec02574b1d4109ef6f
-
Filesize
164KB
MD575375c22c72f1beb76bea39c22a1ed68
SHA1e1652b058195db3f5f754b7ab430652ae04a50b8
SHA2568d9b5190aace52a1db1ac73a65ee9999c329157c8e88f61a772433323d6b7a4a
SHA5121b396e78e189185eefb8c6058aa7e6dfe1b8f2dff8babfe4ffbee93805467bf45760eea6efb8d9bb2040d0eaa56841d457b1976dcfe13ed67931ade01419f55a