Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
af3a45953d8894fddef01a39ed00ce9d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
af3a45953d8894fddef01a39ed00ce9d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
af3a45953d8894fddef01a39ed00ce9d_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
af3a45953d8894fddef01a39ed00ce9d
-
SHA1
6358694a6ec0fd7b8efdcebc8d596f650a1509b0
-
SHA256
1c02e0ffa461657c95e9c5e8a7840609d80a71ae7c41f9367578402c1b472ac5
-
SHA512
25ecefebeb4229f7f76873e1819b54eae8189806262876dc6c29ad9b8e481281c2f4d333f26726f5e51bc763807289a93b05b95d50429ffa36a59d6d553e23b7
-
SSDEEP
24576:pzbBc+A5PEAmvudHq0tqymmf7lXLx5NoyYu9Vr0Rkr7CsFg2Gjp3kU+jLO4/:p0TmvCHq2Tm0XTNoYxPLbK0U+B
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation af3a45953d8894fddef01a39ed00ce9d_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation install.exe -
Executes dropped EXE 3 IoCs
pid Process 5012 install.exe 2092 isass.exe 3496 loader.exe -
Loads dropped DLL 2 IoCs
pid Process 2092 isass.exe 2092 isass.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Users\\Admin\\AppData\\Local\\isass.exe \"" reg.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\win.ini loader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af3a45953d8894fddef01a39ed00ce9d_JaffaCakes118.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3468 reg.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 5012 install.exe 5012 install.exe 5012 install.exe 5012 install.exe 5012 install.exe 5012 install.exe 5012 install.exe 5012 install.exe 5012 install.exe 5012 install.exe 5012 install.exe 5012 install.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2092 isass.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2092 isass.exe 3496 loader.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3404 wrote to memory of 5012 3404 af3a45953d8894fddef01a39ed00ce9d_JaffaCakes118.exe 87 PID 3404 wrote to memory of 5012 3404 af3a45953d8894fddef01a39ed00ce9d_JaffaCakes118.exe 87 PID 3404 wrote to memory of 5012 3404 af3a45953d8894fddef01a39ed00ce9d_JaffaCakes118.exe 87 PID 5012 wrote to memory of 2092 5012 install.exe 88 PID 5012 wrote to memory of 2092 5012 install.exe 88 PID 5012 wrote to memory of 2092 5012 install.exe 88 PID 5012 wrote to memory of 3496 5012 install.exe 89 PID 5012 wrote to memory of 3496 5012 install.exe 89 PID 5012 wrote to memory of 3496 5012 install.exe 89 PID 2092 wrote to memory of 4224 2092 isass.exe 90 PID 2092 wrote to memory of 4224 2092 isass.exe 90 PID 2092 wrote to memory of 4224 2092 isass.exe 90 PID 4224 wrote to memory of 2888 4224 cmd.exe 92 PID 4224 wrote to memory of 2888 4224 cmd.exe 92 PID 4224 wrote to memory of 2888 4224 cmd.exe 92 PID 2888 wrote to memory of 3468 2888 cmd.exe 93 PID 2888 wrote to memory of 3468 2888 cmd.exe 93 PID 2888 wrote to memory of 3468 2888 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\af3a45953d8894fddef01a39ed00ce9d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\af3a45953d8894fddef01a39ed00ce9d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\isass.exe"C:\Users\Admin\AppData\Local\isass.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c setup.bat4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V lsass /D "\"C:\Users\Admin\AppData\Local\isass.exe \"" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V lsass /D "\"C:\Users\Admin\AppData\Local\isass.exe \"" /f6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3468
-
-
-
-
-
C:\Users\Admin\AppData\Local\loader.exe"C:\Users\Admin\AppData\Local\loader.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3496
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5b96b29381760860bfb17d87e85ca8d08
SHA1b5a8a3e928868fdd550ebeb7bf057fd87e47e3ff
SHA2568ad6cbeed74237f583efd8866cb500d37c82a17fd368ed4d577d763dbbc1a311
SHA51232b7b4093b811baffdcb0e7a8ab6589d57563ac1f12bbe450199f2c25964543cf7d05dd604a450bdb7161b8a74b47a7686d7ab77ecfff57462fc6129fc6afaf2
-
Filesize
143B
MD5330d9a81f808b287b999c76c1d932ed6
SHA195146f6f084c39395e2fae892af065e85fddb8d1
SHA2564e2ba5afae8aedfb7664f479ff30667dbabee99f63c922206df98ff56456a03f
SHA5124abd3d3c6b40ae046366604fdfabdc2c97a54cd4c4046452014fb1087353d216b2920650cc2d147fd6c1a79fd7d73d7cd46a8ada0a5c70de70b87b480034e812
-
Filesize
520KB
MD592787e583c924050b115ec0718277b0e
SHA1a411362d9a5ceed7e642a9ab679ed7c21ce71189
SHA25675ad334bf7be94d8361afeea0174d5478df62bd3984f141635d913075cfc2b91
SHA512e03d3e8a4864ca3efccbc8f5da172dd6ad06842e88264aaa2c6d99c4d4b4340d47852a31434bc909981df855247618c04ea46688082c61f5d3386449a54658bd
-
Filesize
236KB
MD56a1d305d5418ddac2f47ed0cba35f77e
SHA1dff5eb1999137b18ca0be4c51e7897a71dfff587
SHA256a99582eb9412a85b851be6abbb35a4512a9a3f1487e1b4e3c9feef5e96c81e7f
SHA512d711217f9cb7182a0c88c5be69b236ef315c3bab82f68f929b79af2d93c8b701f980dc4324243bfe635d22864a18fbc571ba254db238ad80e18ffab77e1605ab
-
Filesize
216KB
MD5c9e7bf0068bf9d191ff0f45ccaf65f99
SHA140d9f5ee5814ccde7a460d188fa3609ff613c14c
SHA2568adb4f985d7ff250c803d537c4ab1b8e76259aba6db41b27c327f0bb64fa63f0
SHA512802bccbbfcc7c5c882ed3273b5fdde2b2a3963775e1d705cd410d0d32dae63f9a303cf307c36fa532c7956ae2abb800bd5a4b6208fcd36bc89ce1475e35ee640