Analysis
-
max time kernel
134s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 02:40
Static task
static1
Behavioral task
behavioral1
Sample
ba0b5ec370483c684c05b60fc058b4bf_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ba0b5ec370483c684c05b60fc058b4bf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ba0b5ec370483c684c05b60fc058b4bf_JaffaCakes118.exe
-
Size
184KB
-
MD5
ba0b5ec370483c684c05b60fc058b4bf
-
SHA1
cf1d5dd169ef3a94605dc627451809555082eb3b
-
SHA256
e2e0161762b638e5e82bb7b2dfc9441e56ff72d6afce03944caab138546b74b0
-
SHA512
221fbb763a45c9f60d96a684de83ff58a2a76f2010167f4ea5fda4e25c3f5b489d5fad32188bacb07db62db38a1d8cc94cac4a5063579f9c71b31ccb84bd1843
-
SSDEEP
3072:xh2T+7eC8AutTBf4yt8QkZxOfZijfVxWb:xh2i7eiutTBQQkZ5jNE
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation ba0b5ec370483c684c05b60fc058b4bf_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation nk.exe -
Executes dropped EXE 2 IoCs
pid Process 1236 cjsh.exe 952 nk.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SfcDisable = "4294967197" nk.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\3218497.dll nk.exe File opened for modification C:\Windows\SysWOW64\3218497.dll nk.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\WEBZEN\ÐÂÆæ¼£ÊÀ½ç\hid.dll nk.exe File created C:\Program Files\WEBZEN\ÐÂÆæ¼£ÊÀ½ç\hid32.dll nk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3972 952 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cjsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba0b5ec370483c684c05b60fc058b4bf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 952 nk.exe 952 nk.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1236 cjsh.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4324 wrote to memory of 2476 4324 ba0b5ec370483c684c05b60fc058b4bf_JaffaCakes118.exe 84 PID 4324 wrote to memory of 2476 4324 ba0b5ec370483c684c05b60fc058b4bf_JaffaCakes118.exe 84 PID 4324 wrote to memory of 2476 4324 ba0b5ec370483c684c05b60fc058b4bf_JaffaCakes118.exe 84 PID 4324 wrote to memory of 3052 4324 ba0b5ec370483c684c05b60fc058b4bf_JaffaCakes118.exe 85 PID 4324 wrote to memory of 3052 4324 ba0b5ec370483c684c05b60fc058b4bf_JaffaCakes118.exe 85 PID 4324 wrote to memory of 3052 4324 ba0b5ec370483c684c05b60fc058b4bf_JaffaCakes118.exe 85 PID 2476 wrote to memory of 1236 2476 cmd.exe 88 PID 2476 wrote to memory of 1236 2476 cmd.exe 88 PID 2476 wrote to memory of 1236 2476 cmd.exe 88 PID 3052 wrote to memory of 952 3052 cmd.exe 89 PID 3052 wrote to memory of 952 3052 cmd.exe 89 PID 3052 wrote to memory of 952 3052 cmd.exe 89 PID 952 wrote to memory of 3936 952 nk.exe 92 PID 952 wrote to memory of 3936 952 nk.exe 92 PID 952 wrote to memory of 3936 952 nk.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba0b5ec370483c684c05b60fc058b4bf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ba0b5ec370483c684c05b60fc058b4bf_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Temp\cjsh.exe.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\Temp\cjsh.exe"C:\Users\Admin\AppData\Local\Temp\Temp\cjsh.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1236
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Temp\nk.exe.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\Temp\nk.exe"C:\Users\Admin\AppData\Local\Temp\Temp\nk.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\sfc.exe"C:\Windows\system32\sfc.exe" /REVERT4⤵
- System Location Discovery: System Language Discovery
PID:3936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 952 -s 11364⤵
- Program crash
PID:3972
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 952 -ip 9521⤵PID:2760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD59c72f223301fac7fe0f08ad4c9862ba2
SHA1c83c781a906c5628672150fafe1da9783a729bff
SHA256034698d251a706f1b770a3e60f6ea0370516ba93ddb26d68372942cba1abe1c2
SHA512c65544131a5c6ed818167ead9efa9e7f8d6d63501d663b59e07414737ddafe61e5d6d52f23244a89992b834479ca831e5ce4d2eddd474571c20103a2a3709dd9
-
Filesize
163B
MD5cdc296bda76f85b5022d8aac54e64edd
SHA10ea756f500e361118738584585c61c9fb8672560
SHA2567f8d4b841222009fdde7dcfd2a347b38a86dd5e140988555d8ed218267c0d044
SHA51203411528c1173e3d8b3fe827a169c0e2c31b3c0b1d88ce7f38b1979ad9045d9cfa321436736975b80de40530b4219c57762ac5979b0579bbfc7f754065264fc9
-
Filesize
26KB
MD5cb37bf28a3cd84662d1f30cd7ef0f24f
SHA13e69117e3005a64a2a7c235128f81d46160ba03f
SHA256637e392f5ba58f296c450542b49c6ed3cc1e9dd61be9cc1b9f2c37ecd1068f6f
SHA512b19062ce657e876b6699b7b1d45ad36f358742795af604e5c839e2f53e1ea7ff70cc44e5f70ce7bc4e74ad02cb4363025e64c7d8d63d86a2f0625a7fb57f05d3
-
Filesize
157B
MD52e07854f3dc93027a016569c2b08f15c
SHA1161d1fd2437c00a1cc740db6493e18ec5a7bf867
SHA256e91e1470858fd33e10ccfa500ffe47c3aad4b7b965ff2511d613f675f3bc736e
SHA5125e387480f781edcae97cefa0bcdf543302c4b7e86bcfde5d38d093349962d438e082c371f039c2b5c12956e61eac16d1280ea77b91f37503b8aad2b7a1c94b2d