Analysis
-
max time kernel
134s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 11:27
Static task
static1
Behavioral task
behavioral1
Sample
aad36ffbe3fc85f853751f4329a346e9_JaffaCakes118.lnk
Resource
win7-20240708-en
windows7-x64
4 signatures
150 seconds
General
-
Target
aad36ffbe3fc85f853751f4329a346e9_JaffaCakes118.lnk
-
Size
685KB
-
MD5
aad36ffbe3fc85f853751f4329a346e9
-
SHA1
fd443a1f4dfaa6ad38f0581f58ab38a0b0478770
-
SHA256
db5d09edc2e9676a41f26f5f4310df9d13abdae8011b1d37af7139008362d5f1
-
SHA512
430d00f4bc9f6fa18bd257d90deca104752c5a45fdcb4e54eb5a8d08de2daab43a205c0fea57da93fea6d444106534311f44c734f7b396c2c7ad53c74d3a11b1
-
SSDEEP
12288:cQiqkgLGVRivcLwOtIO1nyhuEBUdw3VTVhUnpn/oGugkCA:cdqLGnZn1NEBUdwapngfgkCA
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation cmd.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1316 wrote to memory of 4256 1316 cmd.exe 85 PID 1316 wrote to memory of 4256 1316 cmd.exe 85 PID 4256 wrote to memory of 2764 4256 cmd.exe 86 PID 4256 wrote to memory of 2764 4256 cmd.exe 86 PID 4256 wrote to memory of 1296 4256 cmd.exe 87 PID 4256 wrote to memory of 1296 4256 cmd.exe 87 PID 4256 wrote to memory of 972 4256 cmd.exe 88 PID 4256 wrote to memory of 972 4256 cmd.exe 88
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\aad36ffbe3fc85f853751f4329a346e9_JaffaCakes118.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c path=C:\Windows\system32&move "PersonalKYC.pdf.lnk " "C:\Users\Admin\AppData\Local\Temp\1.lnk"&type "C:\Users\Admin\AppData\Local\Temp\1.lnk"|find "END2">"C:\Users\Admin\AppData\Local\Temp\0.js"&wscript "C:\Users\Admin\AppData\Local\Temp\0.js"2⤵
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type "C:\Users\Admin\AppData\Local\Temp\1.lnk""3⤵PID:2764
-
-
C:\Windows\system32\find.exefind "END2"3⤵PID:1296
-
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\0.js"3⤵PID:972
-
-