Analysis
-
max time kernel
144s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 17:34
Static task
static1
Behavioral task
behavioral1
Sample
c13c110cffdbbecdfaa42c50e3c44b5c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c13c110cffdbbecdfaa42c50e3c44b5c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c13c110cffdbbecdfaa42c50e3c44b5c_JaffaCakes118.exe
-
Size
340KB
-
MD5
c13c110cffdbbecdfaa42c50e3c44b5c
-
SHA1
5439bf37d859d9e2761f6d114c0c4c710cb52dd9
-
SHA256
943e5f09003c8ba948a4d8c11db59af55e5527a572832e59ac825f344bf1cfff
-
SHA512
81daa7f9bed54fae05787b3406eb2156941d88cca10df1c13755f126809f8914c0e0d263b74003c7e79741fe4461abfdc8ed284aef879bd516a72610c59242f2
-
SSDEEP
3072:wgDhwYjEx72RnLyzWESpGPh4Y0DfuCyU0wlNKsOTNZ8Kf239SMSTUd5NRcLahZG4:tWYjIWnmzWNEp4ymNKs1A+Rcmeays
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation c13c110cffdbbecdfaa42c50e3c44b5c_JaffaCakes118.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhosts.exe cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhosts.exe cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 4560 scvhosts.exe 4504 scvhosts.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\scvhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\scvhosts.exe -boot" scvhosts.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4560 set thread context of 4504 4560 scvhosts.exe 111 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scvhosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c13c110cffdbbecdfaa42c50e3c44b5c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 748 c13c110cffdbbecdfaa42c50e3c44b5c_JaffaCakes118.exe Token: SeDebugPrivilege 4560 scvhosts.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 748 wrote to memory of 3636 748 c13c110cffdbbecdfaa42c50e3c44b5c_JaffaCakes118.exe 102 PID 748 wrote to memory of 3636 748 c13c110cffdbbecdfaa42c50e3c44b5c_JaffaCakes118.exe 102 PID 748 wrote to memory of 3636 748 c13c110cffdbbecdfaa42c50e3c44b5c_JaffaCakes118.exe 102 PID 748 wrote to memory of 1672 748 c13c110cffdbbecdfaa42c50e3c44b5c_JaffaCakes118.exe 104 PID 748 wrote to memory of 1672 748 c13c110cffdbbecdfaa42c50e3c44b5c_JaffaCakes118.exe 104 PID 748 wrote to memory of 1672 748 c13c110cffdbbecdfaa42c50e3c44b5c_JaffaCakes118.exe 104 PID 2968 wrote to memory of 4560 2968 explorer.exe 106 PID 2968 wrote to memory of 4560 2968 explorer.exe 106 PID 2968 wrote to memory of 4560 2968 explorer.exe 106 PID 4560 wrote to memory of 4504 4560 scvhosts.exe 111 PID 4560 wrote to memory of 4504 4560 scvhosts.exe 111 PID 4560 wrote to memory of 4504 4560 scvhosts.exe 111 PID 4560 wrote to memory of 4504 4560 scvhosts.exe 111 PID 4560 wrote to memory of 4504 4560 scvhosts.exe 111 PID 4560 wrote to memory of 4504 4560 scvhosts.exe 111 PID 4560 wrote to memory of 4504 4560 scvhosts.exe 111 PID 4560 wrote to memory of 4504 4560 scvhosts.exe 111 PID 4560 wrote to memory of 4504 4560 scvhosts.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\c13c110cffdbbecdfaa42c50e3c44b5c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c13c110cffdbbecdfaa42c50e3c44b5c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\c13c110cffdbbecdfaa42c50e3c44b5c_JaffaCakes118.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhosts.exe"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3636
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" /c, "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhosts.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4616,i,15336851255456239337,16379811035920490645,262144 --variations-seed-version --mojo-platform-channel-handle=1008 /prefetch:81⤵PID:692
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhosts.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhosts.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhosts.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhosts.exe"3⤵
- Executes dropped EXE
PID:4504
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340KB
MD5c13c110cffdbbecdfaa42c50e3c44b5c
SHA15439bf37d859d9e2761f6d114c0c4c710cb52dd9
SHA256943e5f09003c8ba948a4d8c11db59af55e5527a572832e59ac825f344bf1cfff
SHA51281daa7f9bed54fae05787b3406eb2156941d88cca10df1c13755f126809f8914c0e0d263b74003c7e79741fe4461abfdc8ed284aef879bd516a72610c59242f2