Analysis
-
max time kernel
137s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 19:21
Static task
static1
Behavioral task
behavioral1
Sample
b8d4f113247f3f4990e2f23ca511e0f9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b8d4f113247f3f4990e2f23ca511e0f9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b8d4f113247f3f4990e2f23ca511e0f9_JaffaCakes118.exe
-
Size
1000KB
-
MD5
b8d4f113247f3f4990e2f23ca511e0f9
-
SHA1
52ed48cbe8d3d2883934dc24f5e2b8b3757bdfd0
-
SHA256
f42f01c1affcc8a2568aa00c96bd1a066c2871fff6342d70c46fa97f3e4b8944
-
SHA512
f6d0024cf2b1684c8461a6f969b5dee4199e53d09a08186de80167f91af7f97f36914f264b2008654c2a32f55537c33b5c74b420f8c61e52c9e5c47afc552995
-
SSDEEP
24576:usSJc5XFE9LZwei9/hkad9MiTgoZ95w+QIeh3THCKbjYJ:usi9Lxi/lgE95whI63DCqjk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation b8d4f113247f3f4990e2f23ca511e0f9_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3320 showflash.exe 1452 taskhost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Task Host = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" showflash.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Task Host = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" showflash.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language showflash.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8d4f113247f3f4990e2f23ca511e0f9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 912 wrote to memory of 3320 912 b8d4f113247f3f4990e2f23ca511e0f9_JaffaCakes118.exe 86 PID 912 wrote to memory of 3320 912 b8d4f113247f3f4990e2f23ca511e0f9_JaffaCakes118.exe 86 PID 912 wrote to memory of 3320 912 b8d4f113247f3f4990e2f23ca511e0f9_JaffaCakes118.exe 86 PID 3320 wrote to memory of 1452 3320 showflash.exe 87 PID 3320 wrote to memory of 1452 3320 showflash.exe 87 PID 3320 wrote to memory of 1452 3320 showflash.exe 87 PID 1452 wrote to memory of 4856 1452 taskhost.exe 89 PID 1452 wrote to memory of 4856 1452 taskhost.exe 89 PID 1452 wrote to memory of 4856 1452 taskhost.exe 89 PID 4856 wrote to memory of 1420 4856 cmd.exe 91 PID 4856 wrote to memory of 1420 4856 cmd.exe 91 PID 4856 wrote to memory of 1420 4856 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8d4f113247f3f4990e2f23ca511e0f9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8d4f113247f3f4990e2f23ca511e0f9_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\showflash.exe"C:\Users\Admin\AppData\Local\Temp\showflash.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\cmd.execmd.exe /A /C "cmd.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\cmd.execmd.exe5⤵
- System Location Discovery: System Language Discovery
PID:1420
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD54ba92ce0aabe86453b4aa62898ad4d4a
SHA1bcecf0202708813d3797f909a2a1db8823c94315
SHA2562c81c56dbf8dc2365f663c455bd1d50a422bfc11a34c9ffd39c94b0cc346c509
SHA512f0dd8e96843cb5afd87444ebaf70cc3e6af2c3afd16fe551ac0876dbd4652d4c03d53d12780b423e24b94066b754c3be887c6771c2b3beb162cc97841ba175bd