Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 04:14
Static task
static1
Behavioral task
behavioral1
Sample
a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe
-
Size
63KB
-
MD5
a557de82fdad4cc4843ec47f0d634f42
-
SHA1
5a99193e805d721d8c44defd5400f32bbf953589
-
SHA256
346d7b5529da0259174fa23b7dab626c3c61852e0d177048f8806a6e5f4f1902
-
SHA512
1469ee3f321b02702ac94f7cb799e40cdd471611cbc85d18fec045384d50d34fccfbbde94c7d015c2119c4111e1e9bc91a950df7b530b9941eb7107400e6125b
-
SSDEEP
768:pLg70B0Xz+M0pb5wXuqAR1Y+u4FxgxunyhmL+WPi0H1iUYstg7Q1TTGfL:pLg70KuqHH4jZHUhPQ1E
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3528 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-08\bin\jusched.exe a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe File created C:\Program Files (x86)\Java\jre-08\bin\UF a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe 3528 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2168 wrote to memory of 3528 2168 a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe 88 PID 2168 wrote to memory of 3528 2168 a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe 88 PID 2168 wrote to memory of 3528 2168 a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Java\jre-08\bin\jusched.exe"C:\Program Files (x86)\Java\jre-08\bin\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5a557de82fdad4cc4843ec47f0d634f42
SHA15a99193e805d721d8c44defd5400f32bbf953589
SHA256346d7b5529da0259174fa23b7dab626c3c61852e0d177048f8806a6e5f4f1902
SHA5121469ee3f321b02702ac94f7cb799e40cdd471611cbc85d18fec045384d50d34fccfbbde94c7d015c2119c4111e1e9bc91a950df7b530b9941eb7107400e6125b