Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 08:17
Static task
static1
Behavioral task
behavioral1
Sample
be355bf0c211c57bc75185355bcbdee5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
be355bf0c211c57bc75185355bcbdee5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
be355bf0c211c57bc75185355bcbdee5_JaffaCakes118.exe
-
Size
148KB
-
MD5
be355bf0c211c57bc75185355bcbdee5
-
SHA1
a2b64c0fce6f72511bfd65bab3af4f02927bdbf2
-
SHA256
a42046001a5acb2d20a975f1bdedb98469fa4b0d39b2332516a8883f810ebdc7
-
SHA512
de32980c2b25fa27f2f881454e5e3e6f34daf484513cbf57df6bac87d8b9b8e7897991602ff59ec950ffa5584c77dbc88f2dbba69bbfb0bffc8952fca84370f6
-
SSDEEP
3072:7GBnQzIRBHE16VZqt988kA9RNwob4Gc2hnAMhNH9gR:mnQcRlokZ45koTw52BAUpqR
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation be355bf0c211c57bc75185355bcbdee5_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 228 82a252c6.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\4f3325d1.dll be355bf0c211c57bc75185355bcbdee5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\4f3325d1.dll be355bf0c211c57bc75185355bcbdee5_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82a252c6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be355bf0c211c57bc75185355bcbdee5_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 228 82a252c6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3520 wrote to memory of 228 3520 be355bf0c211c57bc75185355bcbdee5_JaffaCakes118.exe 88 PID 3520 wrote to memory of 228 3520 be355bf0c211c57bc75185355bcbdee5_JaffaCakes118.exe 88 PID 3520 wrote to memory of 228 3520 be355bf0c211c57bc75185355bcbdee5_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\be355bf0c211c57bc75185355bcbdee5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\be355bf0c211c57bc75185355bcbdee5_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\82a252c6.exe"C:\Users\Admin\AppData\Local\Temp\82a252c6.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5784b847b8ba8032702e70ea1e57beb0f
SHA1d0d98ac6d5e86df5942ee0ddb03f7a31b5e8a362
SHA25678d13cab91acd80fc9c81dd038a1153ff86ba7f54355f6751ce598bcaf07dff3
SHA512aecec024635a3acaa2c8f953c1e0241979f039a07c26d3fb556716f16904e6a248acb72a770a4009e347b24b9527dae703b4ee9cfe68fe872634c9940d87022a