Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 19:25
Static task
static1
Behavioral task
behavioral1
Sample
a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe
-
Size
496KB
-
MD5
a7e9dd646b4bad2c5e4f622feec0262a
-
SHA1
c820b37bdb4b7466ac7d7acb3f5e9fb7b40b1e8f
-
SHA256
55e4c8c2853a7840f64cec0e2e90d9fcafc22320428c8d69093ff081254be20c
-
SHA512
95138941f672c8cf09a97c8ec89ef4e64d8fb483ef1890d1e79f5334453e44df16cc426eb17c3c0ba726e3148075fd7bc40cfdcf90fc5f0cb0ababc8f74f1497
-
SSDEEP
12288:g99MYYs/zDnn6/YBh6Wu1MXp7tJ7NDtChroRARoHrPK:gAByvnQYn6iXdZJChroGMK
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation udpconmain.exe -
Executes dropped EXE 5 IoCs
pid Process 3588 udpconmain.exe 4492 udpconmain.exe 4696 udpconmain.exe 2920 miner.exe 3744 unzip.exe -
resource yara_rule behavioral2/memory/3376-7-0x0000000000400000-0x00000000004FF000-memory.dmp upx behavioral2/memory/3376-9-0x0000000000400000-0x00000000004FF000-memory.dmp upx behavioral2/memory/3376-11-0x0000000000400000-0x00000000004FF000-memory.dmp upx behavioral2/memory/3376-12-0x0000000000400000-0x00000000004FF000-memory.dmp upx behavioral2/memory/3376-28-0x0000000000400000-0x00000000004FF000-memory.dmp upx behavioral2/memory/4696-44-0x0000000000400000-0x00000000004FF000-memory.dmp upx behavioral2/memory/4696-45-0x0000000000400000-0x00000000004FF000-memory.dmp upx behavioral2/memory/4696-43-0x0000000000400000-0x00000000004FF000-memory.dmp upx behavioral2/memory/4696-77-0x0000000000400000-0x00000000004FF000-memory.dmp upx behavioral2/memory/4696-81-0x0000000000400000-0x00000000004FF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CPU Config = "C:\\Users\\Admin\\AppData\\Local\\Temp\\udpconmain.exe" a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 udpconmain.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3372 set thread context of 4048 3372 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 92 PID 4048 set thread context of 3376 4048 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 93 PID 3588 set thread context of 4492 3588 udpconmain.exe 99 PID 4492 set thread context of 4696 4492 udpconmain.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language udpconmain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unzip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language udpconmain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language udpconmain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language miner.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4696 udpconmain.exe 4696 udpconmain.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3372 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 4048 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 3588 udpconmain.exe 4492 udpconmain.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 3372 wrote to memory of 4048 3372 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 92 PID 3372 wrote to memory of 4048 3372 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 92 PID 3372 wrote to memory of 4048 3372 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 92 PID 3372 wrote to memory of 4048 3372 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 92 PID 3372 wrote to memory of 4048 3372 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 92 PID 3372 wrote to memory of 4048 3372 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 92 PID 3372 wrote to memory of 4048 3372 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 92 PID 3372 wrote to memory of 4048 3372 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 92 PID 4048 wrote to memory of 3376 4048 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 93 PID 4048 wrote to memory of 3376 4048 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 93 PID 4048 wrote to memory of 3376 4048 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 93 PID 4048 wrote to memory of 3376 4048 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 93 PID 4048 wrote to memory of 3376 4048 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 93 PID 4048 wrote to memory of 3376 4048 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 93 PID 4048 wrote to memory of 3376 4048 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 93 PID 4048 wrote to memory of 3376 4048 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 93 PID 3376 wrote to memory of 3588 3376 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 94 PID 3376 wrote to memory of 3588 3376 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 94 PID 3376 wrote to memory of 3588 3376 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 94 PID 3376 wrote to memory of 2752 3376 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 95 PID 3376 wrote to memory of 2752 3376 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 95 PID 3376 wrote to memory of 2752 3376 a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe 95 PID 3588 wrote to memory of 4492 3588 udpconmain.exe 99 PID 3588 wrote to memory of 4492 3588 udpconmain.exe 99 PID 3588 wrote to memory of 4492 3588 udpconmain.exe 99 PID 3588 wrote to memory of 4492 3588 udpconmain.exe 99 PID 3588 wrote to memory of 4492 3588 udpconmain.exe 99 PID 3588 wrote to memory of 4492 3588 udpconmain.exe 99 PID 3588 wrote to memory of 4492 3588 udpconmain.exe 99 PID 3588 wrote to memory of 4492 3588 udpconmain.exe 99 PID 4492 wrote to memory of 4696 4492 udpconmain.exe 100 PID 4492 wrote to memory of 4696 4492 udpconmain.exe 100 PID 4492 wrote to memory of 4696 4492 udpconmain.exe 100 PID 4492 wrote to memory of 4696 4492 udpconmain.exe 100 PID 4492 wrote to memory of 4696 4492 udpconmain.exe 100 PID 4492 wrote to memory of 4696 4492 udpconmain.exe 100 PID 4492 wrote to memory of 4696 4492 udpconmain.exe 100 PID 4492 wrote to memory of 4696 4492 udpconmain.exe 100 PID 4696 wrote to memory of 2920 4696 udpconmain.exe 101 PID 4696 wrote to memory of 2920 4696 udpconmain.exe 101 PID 4696 wrote to memory of 2920 4696 udpconmain.exe 101 PID 4696 wrote to memory of 3744 4696 udpconmain.exe 103 PID 4696 wrote to memory of 3744 4696 udpconmain.exe 103 PID 4696 wrote to memory of 3744 4696 udpconmain.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a7e9dd646b4bad2c5e4f622feec0262a_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"5⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\miner.exe"C:\Users\Admin\AppData\Local\Temp\miner.exe" -a 5 -o http://mtred.com:8337 -u illusive101 -p slimjim101 -t 17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2920
-
-
C:\Users\Admin\AppData\Local\Temp\unzip.exe"C:\Users\Admin\AppData\Local\Temp\unzip.exe" payload.zip7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3744
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\help.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:2752
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142B
MD56a816de02813391f892ca690dbbe1ecb
SHA17ea84457eaec9babb9f458f9e8fc69ee373deb42
SHA25683c7106ddcfd370130c1dd94ed0a1b770380f266a91b6bc8c34ede5fc778e32b
SHA512817cb3c08f466115023148efcda7a75565f88fc6dec789a12ec51754463e56773282cc5c9ffa45b67d53c1603754651ee31bc48cede31566007ac40b98c2033c
-
Filesize
726KB
MD53b4986e5d94d0e5723eea640a6735769
SHA1eab3272d5ef1038bf3d336d2b033b813403a9ff2
SHA2568b2b026f8d00b02ff75f05cbf322e4f4b85fb609cddd93bebf17014914b90df9
SHA512efff68d4e82bf61cf7430e0673fe92f5f379ac5e52b084516d6d624097e3f767f7696f48d576dce02b03fe5976db862271db5a7b01298211913b5fa901ddb965
-
Filesize
496KB
MD5a7e9dd646b4bad2c5e4f622feec0262a
SHA1c820b37bdb4b7466ac7d7acb3f5e9fb7b40b1e8f
SHA25655e4c8c2853a7840f64cec0e2e90d9fcafc22320428c8d69093ff081254be20c
SHA51295138941f672c8cf09a97c8ec89ef4e64d8fb483ef1890d1e79f5334453e44df16cc426eb17c3c0ba726e3148075fd7bc40cfdcf90fc5f0cb0ababc8f74f1497
-
Filesize
164KB
MD575375c22c72f1beb76bea39c22a1ed68
SHA1e1652b058195db3f5f754b7ab430652ae04a50b8
SHA2568d9b5190aace52a1db1ac73a65ee9999c329157c8e88f61a772433323d6b7a4a
SHA5121b396e78e189185eefb8c6058aa7e6dfe1b8f2dff8babfe4ffbee93805467bf45760eea6efb8d9bb2040d0eaa56841d457b1976dcfe13ed67931ade01419f55a