Analysis
-
max time kernel
138s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 02:14
Static task
static1
Behavioral task
behavioral1
Sample
b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe
-
Size
60KB
-
MD5
b9f7e7bb29cc01b00d99ae1bbd100902
-
SHA1
c548dd900e27d1864fe11f01b0023eaca655d2d6
-
SHA256
19a19bc0d80208e9f627d123208d225e8b7c1db37d2dc5559e46c8a130920ca0
-
SHA512
93171f3e6df3572c578c9b97758feb8315eea517d8893ec4c37c087bd0640b202af8088fd00c9d75af8ed7af11e50e2c4b3eea6ad0555397e2c970fbbe219a6b
-
SSDEEP
768:2yu3jDsGtGHMCuDcg4yHIN+e/KYIEnIOX4fQGW8B0eaVAy+0ZEqhlNC+NPKwV9OC:JhbuDXHI1iZExj8BLy/ZDhlw+sYQ+B
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 0L5ZIO1.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe -
Executes dropped EXE 4 IoCs
pid Process 1504 GSGPY44.exe 540 25BLVR54.com 3644 25BLVR54.com 4120 0L5ZIO1.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA GSGPY44.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\SysWOW64\25BLVR54.com b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe File created C:\Windows\SysWOW64\0L5ZIO1.exe b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\0L5ZIO1.exe b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe File created C:\Windows\SysWOW64\GSGPY44.exe b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\12528438.txt b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\25BLVR54.com b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\25BLVR54.com 25BLVR54.com File created C:\Windows\SysWOW64\XS13N9MQGF34.txt b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\GSGPY44.exe b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe File created C:\Windows\SysWOW64\12528438.txt b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GSGPY44.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25BLVR54.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25BLVR54.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0L5ZIO1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Display Inline Videos = "no" b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Enable AutoImageResize = "no" b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Display Inline Images = "yes" b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Disable Script Debugger = "yes" b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DisableScriptDebuggerIE = "yes" b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Play_Background_Sounds = "no" b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Play_Animations = "no" b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1316 b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4120 0L5ZIO1.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 1316 b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe 1316 b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe 1504 GSGPY44.exe 1504 GSGPY44.exe 1504 GSGPY44.exe 1504 GSGPY44.exe 1504 GSGPY44.exe 540 25BLVR54.com 3644 25BLVR54.com 3644 25BLVR54.com 3644 25BLVR54.com 3644 25BLVR54.com 3644 25BLVR54.com 4120 0L5ZIO1.exe 4120 0L5ZIO1.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1316 wrote to memory of 4264 1316 b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe 87 PID 1316 wrote to memory of 4264 1316 b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe 87 PID 1316 wrote to memory of 4264 1316 b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe 87 PID 1316 wrote to memory of 1504 1316 b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe 94 PID 1316 wrote to memory of 1504 1316 b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe 94 PID 1316 wrote to memory of 1504 1316 b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe 94 PID 540 wrote to memory of 3644 540 25BLVR54.com 96 PID 540 wrote to memory of 3644 540 25BLVR54.com 96 PID 540 wrote to memory of 3644 540 25BLVR54.com 96 PID 1316 wrote to memory of 4120 1316 b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe 97 PID 1316 wrote to memory of 4120 1316 b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe 97 PID 1316 wrote to memory of 4120 1316 b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe 97 PID 1316 wrote to memory of 3944 1316 b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe 98 PID 1316 wrote to memory of 3944 1316 b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe 98 PID 1316 wrote to memory of 3944 1316 b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe 98 PID 4120 wrote to memory of 4508 4120 0L5ZIO1.exe 100 PID 4120 wrote to memory of 4508 4120 0L5ZIO1.exe 100 PID 4120 wrote to memory of 4508 4120 0L5ZIO1.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b9f7e7bb29cc01b00d99ae1bbd100902_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\GSGPY44P.bat2⤵
- System Location Discovery: System Language Discovery
PID:4264
-
-
C:\Windows\SysWOW64\GSGPY44.exeC:\Windows\system32\GSGPY44.exe2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1504
-
-
C:\Windows\SysWOW64\0L5ZIO1.exe"C:\Windows\system32\0L5ZIO1.exe" -jscript2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\0L5ZIO1.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:4508
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\B9F7E7~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:3944
-
-
C:\Windows\SysWOW64\25BLVR54.comC:\Windows\SysWOW64\25BLVR54.com -kLocalService1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\25BLVR54.comC:\Windows\SysWOW64\25BLVR54.com2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD597ef49d998b5204b08c2d02c733b0a04
SHA1a4872c655d4728cdfb511edd6c2f91f5a25f64b0
SHA2563516f67f54bb45d75bc3424aaecec3700dfcd8b9ae4be3f004502c65d1e80ac8
SHA512ccd1c959c4f8418cdcded9a15e20879490cc046f96f60cd1e27ba76c00687549b336c2663f0687c6d5c4d382a8dc6cde836833affcf0ecbd1700437c8fdfed32
-
Filesize
24KB
MD572acc2edb98f5ab3e1b23e8f19f71de0
SHA15196ef0f8f0757068d525b729537afe9dc64a53f
SHA256119b12d33a466f3085c4280987355c636e7250073a263cd2e82312fd5282d66b
SHA51292edd41d986d97de49e115d15e3e5827e5ec741c190b7cefe21c887e102a139d4078357d8454b2bb8ff119e6ad50a1b5154f6795e6112ab804a1724c2c17839c
-
Filesize
35B
MD5be3fbe6c2aa34249dad09147175128f2
SHA1da30d3ee2421c19b6194fb325ceca501e09accd8
SHA25654d6bf3cf1d62dbed391ed83f5b67690ce3c007bc4b8a7bc946cbd9e62516aae
SHA5124d323fbe3dcc895578a8da828381b031b8616ccc7639fc1be1af37cb29fe1c8a675815542c565e1512dda5b2af14fed40982da18c2765fbb704457606f45464d
-
Filesize
44KB
MD5677b2627cf1131549e18893b1d9d4374
SHA147542beb77b5a153d201553d1acd90da592c1d58
SHA2567bc93272147d647ec80c9cc1da44734d4fb2f0d29d15f53f42cf113cf65c6b89
SHA51288a95eec90ac26f7941ff36f75815a959b7faaddb65a624fe27dea48885e1db4a7842d990095a835dc392cc02581762c15de12b024c2f608679977c31855c4f6