Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 06:07
Static task
static1
Behavioral task
behavioral1
Sample
c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe
-
Size
305KB
-
MD5
c26c87313b0bb709855ee1f541ec865c
-
SHA1
eff3ed9070087cc7fe02ad4302b1801070f33092
-
SHA256
90826e4017db7e4365dc50153f3187638dc14a112e00722fd13f4ff84bd40ccd
-
SHA512
170f9bfd2c42b5acd81bc5e105d744840db86a9fbf33e39f191b429bd67c3b8275c00e4deeae46fa331f7bdf09f5b6a22c9a074726a0d5a9a616d45b3e7bfaf1
-
SSDEEP
6144:a4V7nL2adqmpbSwQYpdE9nOYrGFigq9EbAVpRXFV:a4V7nL2a9pR109n7rOilE8LRVV
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 4864 svchost.exe 4236 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchost.exe" c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\P: svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 32 set thread context of 1176 32 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 93 PID 4864 set thread context of 4236 4864 svchost.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 32 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 4864 svchost.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 32 wrote to memory of 1176 32 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 93 PID 32 wrote to memory of 1176 32 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 93 PID 32 wrote to memory of 1176 32 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 93 PID 32 wrote to memory of 1176 32 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 93 PID 32 wrote to memory of 1176 32 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 93 PID 32 wrote to memory of 1176 32 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 93 PID 32 wrote to memory of 1176 32 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 93 PID 32 wrote to memory of 1176 32 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 93 PID 32 wrote to memory of 1176 32 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 93 PID 32 wrote to memory of 1176 32 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 93 PID 32 wrote to memory of 1176 32 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 93 PID 32 wrote to memory of 1176 32 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 93 PID 32 wrote to memory of 1176 32 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 93 PID 1176 wrote to memory of 4864 1176 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 95 PID 1176 wrote to memory of 4864 1176 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 95 PID 1176 wrote to memory of 4864 1176 c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe 95 PID 4864 wrote to memory of 4236 4864 svchost.exe 96 PID 4864 wrote to memory of 4236 4864 svchost.exe 96 PID 4864 wrote to memory of 4236 4864 svchost.exe 96 PID 4864 wrote to memory of 4236 4864 svchost.exe 96 PID 4864 wrote to memory of 4236 4864 svchost.exe 96 PID 4864 wrote to memory of 4236 4864 svchost.exe 96 PID 4864 wrote to memory of 4236 4864 svchost.exe 96 PID 4864 wrote to memory of 4236 4864 svchost.exe 96 PID 4864 wrote to memory of 4236 4864 svchost.exe 96 PID 4864 wrote to memory of 4236 4864 svchost.exe 96 PID 4864 wrote to memory of 4236 4864 svchost.exe 96 PID 4864 wrote to memory of 4236 4864 svchost.exe 96 PID 4864 wrote to memory of 4236 4864 svchost.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Users\Admin\AppData\Local\Temp\c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c26c87313b0bb709855ee1f541ec865c_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"4⤵
- Executes dropped EXE
- Enumerates connected drives
PID:4236
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4340,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=4288 /prefetch:81⤵PID:4544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
305KB
MD5c26c87313b0bb709855ee1f541ec865c
SHA1eff3ed9070087cc7fe02ad4302b1801070f33092
SHA25690826e4017db7e4365dc50153f3187638dc14a112e00722fd13f4ff84bd40ccd
SHA512170f9bfd2c42b5acd81bc5e105d744840db86a9fbf33e39f191b429bd67c3b8275c00e4deeae46fa331f7bdf09f5b6a22c9a074726a0d5a9a616d45b3e7bfaf1