Analysis
-
max time kernel
140s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 00:36
Static task
static1
Behavioral task
behavioral1
Sample
ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe
-
Size
25KB
-
MD5
ad3ac3087fd4df6ee54abfbf00ca840c
-
SHA1
d03570e901bba2815d71f20635ae5938304e6537
-
SHA256
837d90c3aa41e6967d94371313344efdb722eddad122f4baac84b67c5b480b45
-
SHA512
fc300be8836826a11c11c468ff85af9296fb56d74e4d27ddfd2f76a310c6b514f029cf90eada96787d949e6cb0d472a092664014ec82b244cf3acd77699e8a52
-
SSDEEP
384:ORVdMrJpdYtrV79fy2XsWra7ybsexeoYzzumoAb0aYWcDhXdvgPuouzQb/XlF:uMrW9V7h8oYzzu7klYWcvvBiF
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1608 set thread context of 4044 1608 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1628 4044 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1608 wrote to memory of 4836 1608 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 84 PID 1608 wrote to memory of 4836 1608 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 84 PID 1608 wrote to memory of 4836 1608 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 84 PID 1608 wrote to memory of 1920 1608 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 86 PID 1608 wrote to memory of 1920 1608 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 86 PID 1608 wrote to memory of 1920 1608 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 86 PID 1608 wrote to memory of 4044 1608 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 88 PID 1608 wrote to memory of 4044 1608 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 88 PID 1608 wrote to memory of 4044 1608 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 88 PID 1608 wrote to memory of 4044 1608 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 88 PID 1608 wrote to memory of 4044 1608 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 88 PID 1608 wrote to memory of 4044 1608 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 88 PID 1608 wrote to memory of 4044 1608 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 88 PID 4836 wrote to memory of 4600 4836 net.exe 89 PID 4836 wrote to memory of 4600 4836 net.exe 89 PID 4836 wrote to memory of 4600 4836 net.exe 89 PID 1920 wrote to memory of 4440 1920 net.exe 90 PID 1920 wrote to memory of 4440 1920 net.exe 90 PID 1920 wrote to memory of 4440 1920 net.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe"1⤵
- Modifies security service
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" (P£(@ˆ|ý2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 (P£(@ˆ|ý3⤵
- System Location Discovery: System Language Discovery
PID:4600
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:4440
-
-
-
C:\Users\Admin\AppData\Local\Temp\ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe"2⤵PID:4044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4044 -s 4603⤵
- Program crash
PID:1628
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4044 -ip 40441⤵PID:2660