Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 10:10
Static task
static1
Behavioral task
behavioral1
Sample
b30d6b044885d9679eb1c8e1b9a9ddb7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b30d6b044885d9679eb1c8e1b9a9ddb7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b30d6b044885d9679eb1c8e1b9a9ddb7_JaffaCakes118.exe
-
Size
343KB
-
MD5
b30d6b044885d9679eb1c8e1b9a9ddb7
-
SHA1
36bcdeea9f0a1aaeb313cc136a16fdc19fbbb6c9
-
SHA256
b32f8a6bb58bcef9c5d1503416eb3dcdcd5c145535cdd694360007343d9bdd0e
-
SHA512
78f88f21483d07644e3b41c6b3436d438d88489594674fba492947105e0e25a7b8a06357a515cfb85f974fb5cf752688a0f07aedb0e6cee365e79798c276a837
-
SSDEEP
6144:au2urzh9xu/XkaumM2OUQEI4nI0RgiZgSQ6neV0e76qnRqHZDEK9:autrzh9xOXk12QJ4nI0+Ya4YMxz9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation b30d6b044885d9679eb1c8e1b9a9ddb7_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation serwer.bat -
Executes dropped EXE 2 IoCs
pid Process 960 serwer.bat 1520 lsass.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LSS Desktop = "C:\\Windows\\lsass.exe" serwer.bat -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\lsass.exe serwer.bat File created C:\Windows\lsass.exe serwer.bat -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b30d6b044885d9679eb1c8e1b9a9ddb7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language serwer.bat -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings b30d6b044885d9679eb1c8e1b9a9ddb7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 864 wrote to memory of 960 864 b30d6b044885d9679eb1c8e1b9a9ddb7_JaffaCakes118.exe 87 PID 864 wrote to memory of 960 864 b30d6b044885d9679eb1c8e1b9a9ddb7_JaffaCakes118.exe 87 PID 864 wrote to memory of 960 864 b30d6b044885d9679eb1c8e1b9a9ddb7_JaffaCakes118.exe 87 PID 960 wrote to memory of 1520 960 serwer.bat 88 PID 960 wrote to memory of 1520 960 serwer.bat 88 PID 960 wrote to memory of 1520 960 serwer.bat 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b30d6b044885d9679eb1c8e1b9a9ddb7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b30d6b044885d9679eb1c8e1b9a9ddb7_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\serwer.bat"C:\Users\Admin\AppData\Local\Temp\serwer.bat"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\lsass.exe"C:\Windows\lsass.exe"3⤵
- Executes dropped EXE
PID:1520
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fc1168fd84e3e52a550b7dc1efcf51d1
SHA1405700a033a687cb44432d4a480a2e0d429576cb
SHA256420da7dd5f25b7f017b654c3c50c75035726e53fffc884110c8495a904436b28
SHA512cf5eca84966c0613c9be3e56e385ff87a1b82773e1f2ec870c26f3a2d8101282ea9fac1a7a9c1083646d69dc7786819a6ea37fec38bad84df780264aac31c0cd
-
Filesize
11KB
MD5ca712050403a633e1525af1a39737398
SHA153949201a15a5bc71e9791e437dace4d56d93506
SHA256c26ee91b92385f7fc5a6ec6fbf0f6efed221a193ff9192de1bc5d9ac8b190105
SHA5124c3748b66a3cfd970d366bc0d9b502358aa6d12bcef2c6e7ff0ba7a284d898c3eb117a0768a902e9e2abf1afd3e744fe627fa52d0284cb56d5018af14f80f8f6