Analysis
-
max time kernel
136s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 10:36
Static task
static1
Behavioral task
behavioral1
Sample
bb6193012cbb778a7f50179459827929_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bb6193012cbb778a7f50179459827929_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bb6193012cbb778a7f50179459827929_JaffaCakes118.exe
-
Size
9.3MB
-
MD5
bb6193012cbb778a7f50179459827929
-
SHA1
403a943e2924fbcd7da71de674cf75e83048c5df
-
SHA256
97b7f4befd9c908ab3ba2aa80d5b64ec6468d740add89c6dae8b9b089e8b2abd
-
SHA512
3be40208819c4f2f86eaf4fba8ec10c9f6f07b101da848f636c048dd71bb9e73d6edc8d5d367451fc5bb287e573e6af567b0da78030a7caa3f6a45b84d9b3a14
-
SSDEEP
3072:X/NvCCDFcKR1px064LZui6fAMyDdnewv/Yb:laCBc61px0652MIewvQb
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Program Files\\Common Files\\Program Shared\\Isass.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Program Files\\Common Files\\Program Shared\\Isass.exe" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation bb6193012cbb778a7f50179459827929_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/3236-1-0x0000000000400000-0x0000000000D45000-memory.dmp upx behavioral2/memory/3236-3-0x0000000000400000-0x0000000000D45000-memory.dmp upx -
Hide Artifacts: Hidden Files and Directories 1 TTPs 2 IoCs
pid Process 3092 cmd.exe 4972 cmd.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Program Shared\Isass.exe attrib.exe File opened for modification C:\Program Files\Common Files\Program Shared attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb6193012cbb778a7f50179459827929_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3248 cmd.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3236 wrote to memory of 3248 3236 bb6193012cbb778a7f50179459827929_JaffaCakes118.exe 85 PID 3236 wrote to memory of 3248 3236 bb6193012cbb778a7f50179459827929_JaffaCakes118.exe 85 PID 3236 wrote to memory of 3248 3236 bb6193012cbb778a7f50179459827929_JaffaCakes118.exe 85 PID 3236 wrote to memory of 4336 3236 bb6193012cbb778a7f50179459827929_JaffaCakes118.exe 87 PID 3236 wrote to memory of 4336 3236 bb6193012cbb778a7f50179459827929_JaffaCakes118.exe 87 PID 3236 wrote to memory of 4336 3236 bb6193012cbb778a7f50179459827929_JaffaCakes118.exe 87 PID 3236 wrote to memory of 4280 3236 bb6193012cbb778a7f50179459827929_JaffaCakes118.exe 89 PID 3236 wrote to memory of 4280 3236 bb6193012cbb778a7f50179459827929_JaffaCakes118.exe 89 PID 3236 wrote to memory of 4280 3236 bb6193012cbb778a7f50179459827929_JaffaCakes118.exe 89 PID 3236 wrote to memory of 3092 3236 bb6193012cbb778a7f50179459827929_JaffaCakes118.exe 91 PID 3236 wrote to memory of 3092 3236 bb6193012cbb778a7f50179459827929_JaffaCakes118.exe 91 PID 3236 wrote to memory of 3092 3236 bb6193012cbb778a7f50179459827929_JaffaCakes118.exe 91 PID 3236 wrote to memory of 4972 3236 bb6193012cbb778a7f50179459827929_JaffaCakes118.exe 93 PID 3236 wrote to memory of 4972 3236 bb6193012cbb778a7f50179459827929_JaffaCakes118.exe 93 PID 3236 wrote to memory of 4972 3236 bb6193012cbb778a7f50179459827929_JaffaCakes118.exe 93 PID 4336 wrote to memory of 3776 4336 cmd.exe 95 PID 4336 wrote to memory of 3776 4336 cmd.exe 95 PID 4336 wrote to memory of 3776 4336 cmd.exe 95 PID 4280 wrote to memory of 2012 4280 cmd.exe 96 PID 4280 wrote to memory of 2012 4280 cmd.exe 96 PID 4280 wrote to memory of 2012 4280 cmd.exe 96 PID 3092 wrote to memory of 740 3092 cmd.exe 97 PID 3092 wrote to memory of 740 3092 cmd.exe 97 PID 3092 wrote to memory of 740 3092 cmd.exe 97 PID 4972 wrote to memory of 1332 4972 cmd.exe 98 PID 4972 wrote to memory of 1332 4972 cmd.exe 98 PID 4972 wrote to memory of 1332 4972 cmd.exe 98 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1332 attrib.exe 740 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb6193012cbb778a7f50179459827929_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bb6193012cbb778a7f50179459827929_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move /y "C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\bb6193012cbb778a7f50179459827929_JaffaCakes118.exe" "C:\Program Files\Common Files\Program Shared\Isass.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:3248
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon" /v Shell /t reg_sz /d "Explorer.exe, C:\Program Files\Common Files\Program Shared\Isass.exe" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\reg.exereg add "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon" /v Shell /t reg_sz /d "Explorer.exe, C:\Program Files\Common Files\Program Shared\Isass.exe" /f3⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:3776
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon " /v Shell /t reg_sz /d "Explorer.exe, C:\Program Files\Common Files\Program Shared\Isass.exe" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\reg.exereg add "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon " /v Shell /t reg_sz /d "Explorer.exe, C:\Program Files\Common Files\Program Shared\Isass.exe" /f3⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:2012
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Program Files\Common Files\Program Shared\Isass.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Program Files\Common Files\Program Shared\Isass.exe"3⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:740
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Program Files\Common Files\Program Shared"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Program Files\Common Files\Program Shared"3⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1332
-
-