Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 00:27
Static task
static1
Behavioral task
behavioral1
Sample
c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe
-
Size
2.7MB
-
MD5
c1e8bab3c5ed255d7ff964f32f7e1f74
-
SHA1
bbfbf1437eec181473b8328eb24368ced4b34bdd
-
SHA256
e7c7458e55faf52c86b67eba26d006733898e9f28fd69eff7cf85218fb9c5ca2
-
SHA512
5e079f67e3da9cb59926f821e52ead42c57192fe4ee7cf7f8406ff5a2150e89bf04f3bc844b582a42ddb90eb713296a8a6a6f1aa9d0a2694bacd197b61f1bbc8
-
SSDEEP
49152:AwfxsUM6BmxTHqz2E4j8rGKPaMTBZTzcjjzXRrP+9EYemB90t:AwA6sxTHqnz6KPaMjejT8aiW
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 116 Windows Desing.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinLogen2 = "C:\\Windows\\Memdir2.exe" Windows Desing.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\setup\alkare.fok c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe File created C:\Program Files\Windows Defender\setup\sro20100914.jpg c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe File created C:\Program Files\Windows Defender\setup\alkare.fok c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe File created C:\Program Files\Windows Defender\setup\Windows Desing.exe c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Memdir2.exe Windows Desing.exe File opened for modification C:\Windows\Memdir2.exe Windows Desing.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Desing.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1292 wrote to memory of 116 1292 c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe 92 PID 1292 wrote to memory of 116 1292 c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe 92 PID 1292 wrote to memory of 116 1292 c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files\Windows Defender\setup\Windows Desing.exe"C:\Program Files\Windows Defender\setup\Windows Desing.exe" NULL2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
592KB
MD55663d485e7b624b2e9ab05b3963b223e
SHA10a7652726386444f683ee3cf6e28bf847725b144
SHA2567b017140b668c327e5e2c083a84936c904e48384c4e6ddb02063a0163faa09c1
SHA512602a50ab089322242f628f75c4d588f82833fe306d2e793d1e8d3cca61def9551526b25f649971e2cae106844c213781b95a9bff159bf373fa01d0f28fb80090
-
Filesize
588KB
MD5b9f4559edc815e78bfd5f17aa4b16a21
SHA18db1c7f3427c5d5d27d0f12f947e86f961f9eeb1
SHA256f802daefa352d67b56ba50121598bc65b4fabc815c189baba6d6db01de59fe38
SHA51276cf0b13eb03507b60060797a3b52230185c01ebcdde6c612ebce9bbd71b5c425e2620e6b5504ea6cd17207411148cd4aab57657ab646e786cd9daa318fd9276