Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
b750ddd67e379270ad286b9afc8e9144_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b750ddd67e379270ad286b9afc8e9144_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b750ddd67e379270ad286b9afc8e9144_JaffaCakes118.exe
-
Size
706KB
-
MD5
b750ddd67e379270ad286b9afc8e9144
-
SHA1
4a9b10990547f02d931e2c58e15b132f9bee87f8
-
SHA256
fcc08da42eac83de7e11c5925489d7228fa6897428d75febce28587453bb62c7
-
SHA512
ff64ab989a19438068181a71bac230be4b44a2cdc672b27594ee307e406c782ed09dabf87391272cf53ee5abb161b1a16936bd70b8a698fbdd494e7efc3fa09f
-
SSDEEP
12288:gp/iN/mlVdtvrYeyZJf7kPK+iqBZn+D73iKHeGsp4w11UJ9BRccsa:gpQ/6trYlvYPK+lqD73TeGspBXYVD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation b750ddd67e379270ad286b9afc8e9144_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3584 ScrBlaze.scr 3140 ScrBlaze.scr -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\s18273659 ScrBlaze.scr File created C:\Windows\s18273659 b750ddd67e379270ad286b9afc8e9144_JaffaCakes118.exe File opened for modification C:\Windows\s18273659 b750ddd67e379270ad286b9afc8e9144_JaffaCakes118.exe File created C:\Windows\ScrBlaze.scr b750ddd67e379270ad286b9afc8e9144_JaffaCakes118.exe File created C:\Windows\s18273659 ScrBlaze.scr File opened for modification C:\Windows\s18273659 ScrBlaze.scr File created C:\Windows\s18273659 ScrBlaze.scr -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b750ddd67e379270ad286b9afc8e9144_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ScrBlaze.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ScrBlaze.scr -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\Desktop b750ddd67e379270ad286b9afc8e9144_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\ScrBlaze.scr" b750ddd67e379270ad286b9afc8e9144_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3996 b750ddd67e379270ad286b9afc8e9144_JaffaCakes118.exe 3996 b750ddd67e379270ad286b9afc8e9144_JaffaCakes118.exe 3584 ScrBlaze.scr 3584 ScrBlaze.scr 3140 ScrBlaze.scr 3140 ScrBlaze.scr -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3996 wrote to memory of 3584 3996 b750ddd67e379270ad286b9afc8e9144_JaffaCakes118.exe 93 PID 3996 wrote to memory of 3584 3996 b750ddd67e379270ad286b9afc8e9144_JaffaCakes118.exe 93 PID 3996 wrote to memory of 3584 3996 b750ddd67e379270ad286b9afc8e9144_JaffaCakes118.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\b750ddd67e379270ad286b9afc8e9144_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b750ddd67e379270ad286b9afc8e9144_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\ScrBlaze.scr"C:\Windows\ScrBlaze.scr" /S2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3584
-
-
C:\Windows\ScrBlaze.scrC:\Windows\ScrBlaze.scr /s1⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5f23ef20b23a591f9170876065a8291fa
SHA1bedf168c17547294345169ec28280afdbe80fddd
SHA25600f364dc4e833085c9c21a64da45dd3887599bbc551ed1b5cdc7d539c9805cb0
SHA5122edcc31eb411a867300b7d6bb0a26382476fe2a87aa26aaca57b3fd079161923bd68b7cf66dcaaab9a06acbb696f484a488d5e08578d774cf78d957ad1abbaf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_BE32D9F1882B93E37445F58E05C44495
Filesize472B
MD5e0c50d942eb3dcfacb16e473499e4f82
SHA189bee907b2f535a4b1e6d29ff135320da0981965
SHA25663897126b3840d76366b12a3a096f47131f3b34aa5c240b66bb10d2667128d1d
SHA5124d61ff961af4c28bce0002571da13606b8515a164753f924e863ea59a7bab79a2a18cb8356fa69014d33c014c47811b0f5e98a63b561738bab7c1f875b0e1be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_5CF45833F44BFC2995315451A3896ACA
Filesize472B
MD549a0902a67c5c2027b6357cb0d572d50
SHA177f96521b4b2a42c937269e8f837c990b3116bdb
SHA2569fbbaa6931cf0893c1b58f6ca0383b6f96c84d560f7ec16adb3bc67aa3801b34
SHA5129a2553cd77c5b0273f936063e9ee302144d4f4b9e55ce60db90984cac2f7e66fdcdcaac411308eee17a887b2281b8d5f8e348a5e35e1c0402cd9a538de8c5302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_68D058512F3515153DEB95A1F4E72552
Filesize471B
MD5ae5804458807c25cd96c521239628c17
SHA10b5854a08edd4568b1a7471bbbe398db8492db24
SHA2564463914aba0601a72e8ff15d672dd076ed2a82e25d458ccd6a2296425b569f49
SHA5123778bfeaf5fd268a1e976306195fe50c57b5d13e0801d9e119f4bf857567ef0c09440764f7368cb08fe8901fee35cc82b2be9fdaa2a4a83e4018420a718692b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5301586fe4b4439bcb1c7b6694b36538a
SHA10d80ad4e4ec553dcefa00f59f3a953bb3d026754
SHA25616f4e95351338785ba02436a15e467c25d03f9ad35057ee54c9208c7618c3750
SHA512c4f73b2488612dfe69cef42c6f09a2af2af27eb8a86750af2f9e79bbd04b51234b06a510d82c08e8900a0220479dbfc5fe2c19bc98032da8e1c520d2d7c19c8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5228e85723fa94f68888dfc6eb5fe4ebe
SHA19102a52bf3e8ecdee5ac8463fa429494183e4382
SHA256e364bccf9b7a1fe400b9a0a885b517215885bd1f1053f18acdf999f788676b4e
SHA512f58b29a8af28d21589dd077d6688d849ed1ed3000ce11c414ba0f46b5a46d60667d1998506fa2569f930aa8e7289ef43a38f5e936267459a53386587bd4dc7c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4FA45AE1010E09657982D8D28B3BD38E_BE32D9F1882B93E37445F58E05C44495
Filesize398B
MD51e99834b0e7f8b565603cdb7ad16c304
SHA1702184e580afe59c65efe617d5d94f4dc4e68d11
SHA2562874c194862dba3f95a25967184b0c77f2197a180b4c57a609c7b3eabab0299a
SHA5124e4c3ee0201b769988876feaa5053ce62cb0dda98b8a7fcf53ddc10e236ea05b2720a6b5975f972c6a4225e41767fd14d55a357459560923d8c8f7838d87cd63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_5CF45833F44BFC2995315451A3896ACA
Filesize398B
MD5a66e28b4e8a335db339f319e67cdad20
SHA10d6e2b22845c4261083032bc3764be2167138847
SHA256cedb2593d072592a3188e87e4db3d3ee017d6b7ca476c2888fdd190b6a50ab7d
SHA512e4b91dfe552ed50349a5e84012845f9559e65adcd05f66ad4bcb21e95e63c8109ffb968ed56276bfae5b2c9f69f0336ad50f33d7a60ee05f54d01942566dfc56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_68D058512F3515153DEB95A1F4E72552
Filesize406B
MD5010e6183e9a075af6d835d588d74b6c1
SHA1764ada3ee92860a7f74eb9db6fafb06939805983
SHA25636a74f46a7174f47ee722096dc44a354e7c40c2b216bd87cd23c18fc28768dd7
SHA512171a451669f79e7181b963dd1872cf53f8367aa9619b5419e23f9eae28b96dc8dd9e5e7c4867c8994140570af75473981324db5f2507836a0c68190544bea8a8
-
Filesize
57KB
MD5bdda3ffd41c3527ad053e4afb8cd9e1e
SHA10ad1bb7ce8d8a4dc8ac2a28e1c5155980edfab9b
SHA2561a9251dc3b3c064cfc5e2b90b6c7dc3c225f7017066db2b77e49dae90a94a399
SHA5124dc21ef447b54d0e17ccd88db5597171047112ce1f3f228527e6df079ce2a43a463a3a1e4255828b12f802d70a68dbe40b791852134be71c74de97718b2f1d5f
-
Filesize
9KB
MD57f980569ce347d0d4b8c669944946846
SHA180a8187549645547b407f81e468d4db0b6635266
SHA25639f9942adc112194b8ae13ba1088794b6cb6e83bd05a4ed8ce87b53155d0e2f7
SHA51217993496f11678c9680978c969accfa33b6ae650ba2b2c3327c45435d187b74e736e1489f625adf7255441baa61b65af2b5640417b38eefd541abff598b793c9
-
Filesize
6KB
MD5ac10b50494982bc75d03bd2d94e382f6
SHA16c10df97f511816243ba82265c1e345fe40b95e6
SHA256846a9b551e74f824fd7ace3439a319b0c0803449e8caec9f16e2666e38a80efd
SHA512b6666b540aef6c9c221fe6da29f3e0d897929f7b6612c27630be4a33ae2f5d593bc7c1ee44166ce9f08c72e8608f57d66dd5763b17fec7c1fb92fc4d5c6dd278
-
Filesize
16KB
MD570c0f0ef951a2e8856866e30f22ad27f
SHA1ed6d4e89e7f003a9fa3320a73141328d8d88bee4
SHA256770967fee9e6941d5c58bf5c4a5a1f8cf9f675730ca20236dc816cb030a3184a
SHA512aa012e7048bb8575a3e6ecb510cdb6bddea693fd665566f8f46c945ad5ee05ca62aac8de1bf8d75da61a72a516c5d009cda4add60cfbdea03c31899c60dd55a9
-
Filesize
20KB
MD50777a08c974b6e1714a233493bfd26d2
SHA1ac3584466b9fa8643038f94cb75e73779d28448f
SHA256eb39019a7b3f5e99681081ca3b5730d747a65690cd0a1b761c52df9c4746172f
SHA512aa06adc8b1cb75e9342b426c4596fac55f43e1db01f7b1fe472888102ac95c1a242277817010af8d8240e86321267dbb1a2ac26edacefd6c7e3cc6812910f325
-
Filesize
8KB
MD5d654f892f287a28026cd4d4df56c29c8
SHA198779a55fe32a66ebec8338c838395d265e45013
SHA256fc6f5d8f32f13d5855840234dc1bff5c91c35318ee2192d99b13eb3572f0bca8
SHA5123668902aeaf792ad73ba51e0a4caaa520ebc38177791dfac9a9b28026c3bde99e721bf54d626f266a19cfd045a6d2dc8c8e70e53a2c5ee524c6f2736bb0ce409
-
Filesize
312B
MD52494130e2dd81fb40051261cac87fa92
SHA108bf1ea9863ee62a66bf9a75161176caa5a11cec
SHA256ad6e8562d7a6a701d734b60795921409d5449b1806b88ffb1173e832c6da695b
SHA5125defafa591cbe2fce7b02dbde7b9ff834fb0e5a3da41807978560c292aad11546045f8689d7de4d583c1635012bbcda48b8f49bf0588abe8ef50480fbb2f7134
-
Filesize
2KB
MD55cb98952519cb0dd822d622dbecaef70
SHA12849670ba8c4e2130d906a94875b3f99c57d78e1
SHA25602f95fbdb68f232bffd4f2c0fdd033d6c83b829c610cddccc0b1d43e2274e6a7
SHA5125f29b7459fbd01e16dbd196e4bcddf109af017cccf31337abe1cec6cc5a84711fc2cd34ad7a35d9432a9d7e42ca23d7f6c9d4315396429d7b8e48b9491696afc
-
Filesize
181B
MD5f407e7b6e7d9fc9da41d84c225ba6dbf
SHA12c26b50f87ee2e0d8c2f345106047e2055a147a7
SHA256df378280434faf25fbbdaf52d145580a12fffdaa2fe3f45f7e24d4cf8f7a13af
SHA512cc6ff71ed48e437215cd54ab4b527f01935070aeed4e6650c27c0d304eb80b3e7207c859425bd0f770c091c968e45e704c25bec0009dcb5b513823956f7e8528
-
Filesize
6KB
MD501010c21bdf1fc1d7f859071c4227529
SHA1cd297bf459f24e417a7bf07800d6cf0e41dd36bc
SHA2566fb31acdaf443a97183562571d52ce47dd44c1a8dcb4087338d77ea2617b286e
SHA5128418d5ac3987ee8b6a7491167b0f90d0742e09f12fceb1e305923e60c78628d494fcd0fee64f8a6b5f6884796360e1e3ec1459dc754bbfb874504f9db5b56135
-
Filesize
706KB
MD5b750ddd67e379270ad286b9afc8e9144
SHA14a9b10990547f02d931e2c58e15b132f9bee87f8
SHA256fcc08da42eac83de7e11c5925489d7228fa6897428d75febce28587453bb62c7
SHA512ff64ab989a19438068181a71bac230be4b44a2cdc672b27594ee307e406c782ed09dabf87391272cf53ee5abb161b1a16936bd70b8a698fbdd494e7efc3fa09f
-
Filesize
978B
MD5d6912c984c200c1a178071d9e9d3a817
SHA12885400e077773df8a0cf6b2190699f669432b96
SHA2567f9d4a121ec7c1c6f216218dcd6a7d3230b515e4efbe4777f4cf137fdd1a9e1a
SHA5127f9031bf8684ecfd77746996d0d3ac9d068be17f3ae57462275d579812696901303592b6af40627cdf065320b9485853343d6676de1695bb70a363344ca59501