Analysis
-
max time kernel
133s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 15:34
Static task
static1
Behavioral task
behavioral1
Sample
bc54f6021bcf37cd41ad8c524dd5583b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bc54f6021bcf37cd41ad8c524dd5583b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bc54f6021bcf37cd41ad8c524dd5583b_JaffaCakes118.exe
-
Size
40KB
-
MD5
bc54f6021bcf37cd41ad8c524dd5583b
-
SHA1
b6254031f3d220d6dac5bbf0fb92802110d09cd9
-
SHA256
b3aa9e85dabd5de8af0005182359662ff0cdaff24fc9053d1714cb7241d0e9f1
-
SHA512
de647b0297508bb481a116ad1f4093b04c782e6974ac6177de931958602b3d9b4bc81b59fab86247760b3f8d7722a2f91bdf15416263885ddeeb31b4e6efaa51
-
SSDEEP
768:9kRRLWJHgr9lx+tidYI+4hmDU4COMx6uqhZSMBOA6ObpMr2AAaWa5:9SpWJAr9lVYz4MWOxRCWOwXA9Wi
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation bc54f6021bcf37cd41ad8c524dd5583b_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3888 Stub.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Stub.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3736 wrote to memory of 3888 3736 bc54f6021bcf37cd41ad8c524dd5583b_JaffaCakes118.exe 84 PID 3736 wrote to memory of 3888 3736 bc54f6021bcf37cd41ad8c524dd5583b_JaffaCakes118.exe 84 PID 3736 wrote to memory of 3888 3736 bc54f6021bcf37cd41ad8c524dd5583b_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc54f6021bcf37cd41ad8c524dd5583b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bc54f6021bcf37cd41ad8c524dd5583b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\Documents\Stub.exe"C:\Users\Admin\Documents\Stub.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD50ff7e7ff8889b28b2a1575ae2e59c7da
SHA1796199998a1b9f57d8080d1b9048976a94745fcf
SHA25628454c3a64abc8d5d83831494ca9686bb12f2bf7998d5f8290acc06b4c4e9d1f
SHA5127f6045f2cce01c435b36078f38651010b42eaf1826f3fe08ab94e816ee076a1d7fc9c06512bb4857a5154604ad6e42182666dca72f7ddd4dc1597ecfce9efab7