Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 10:24
Behavioral task
behavioral1
Sample
c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe
-
Size
450KB
-
MD5
c8a3ba53b30bfedc01fe5c60446a0c86
-
SHA1
b4f080fab717f2aa227fdf4445e09f5fe6875507
-
SHA256
71bf8adec5b44ac69e9ff8239c8dafa5a806e429470e2f9e6b6d7fbac3395868
-
SHA512
d69a04e01548b909d1978144b9bd113eaf16250e61ceabeb8e28b2460b033305a50dd2a080fd25ae9c3833111312e31d27761fae9c3e861c4703562fd00e6843
-
SSDEEP
6144:YlZ/zUMu4pDSxsCMRzf7x3SfS1JAzXBtL76lQsr85hGyH1YYp8QdhSd+3+40:YHLUMuiv9RgfSjAzRtyQpnHDyn
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation lsssass.exe -
Executes dropped EXE 2 IoCs
pid Process 3404 lsssass.exe 4136 lsssass.exe -
resource yara_rule behavioral2/memory/2248-0-0x0000000000400000-0x00000000004DA000-memory.dmp upx behavioral2/memory/1180-1-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/1180-3-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/2248-4-0x0000000000400000-0x00000000004DA000-memory.dmp upx behavioral2/memory/1180-6-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0007000000023407-12.dat upx behavioral2/memory/3404-20-0x0000000000400000-0x00000000004DA000-memory.dmp upx behavioral2/memory/1180-24-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/4136-33-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/4136-35-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/4136-58-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/4136-113-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/4136-178-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsssass = "C:\\Users\\Admin\\AppData\\Roaming\\Dir\\lsssass.exe" lsssass.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2248-4-0x0000000000400000-0x00000000004DA000-memory.dmp autoit_exe behavioral2/memory/3404-20-0x0000000000400000-0x00000000004DA000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2248 set thread context of 1180 2248 c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe 84 PID 3404 set thread context of 4136 3404 lsssass.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsssass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsssass.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1180 c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe 1180 c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe 4136 lsssass.exe 4136 lsssass.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1180 c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe 1180 c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe 4136 lsssass.exe 4136 lsssass.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2248 wrote to memory of 1180 2248 c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe 84 PID 2248 wrote to memory of 1180 2248 c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe 84 PID 2248 wrote to memory of 1180 2248 c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe 84 PID 2248 wrote to memory of 1180 2248 c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe 84 PID 2248 wrote to memory of 1180 2248 c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe 84 PID 2248 wrote to memory of 1180 2248 c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe 84 PID 1180 wrote to memory of 1740 1180 c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe 86 PID 1180 wrote to memory of 1740 1180 c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe 86 PID 1180 wrote to memory of 1740 1180 c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe 86 PID 1180 wrote to memory of 3404 1180 c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe 88 PID 1180 wrote to memory of 3404 1180 c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe 88 PID 1180 wrote to memory of 3404 1180 c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe 88 PID 3404 wrote to memory of 4136 3404 lsssass.exe 89 PID 3404 wrote to memory of 4136 3404 lsssass.exe 89 PID 3404 wrote to memory of 4136 3404 lsssass.exe 89 PID 3404 wrote to memory of 4136 3404 lsssass.exe 89 PID 3404 wrote to memory of 4136 3404 lsssass.exe 89 PID 3404 wrote to memory of 4136 3404 lsssass.exe 89 PID 1740 wrote to memory of 544 1740 net.exe 90 PID 1740 wrote to memory of 544 1740 net.exe 90 PID 1740 wrote to memory of 544 1740 net.exe 90 PID 4136 wrote to memory of 3104 4136 lsssass.exe 92 PID 4136 wrote to memory of 3104 4136 lsssass.exe 92 PID 4136 wrote to memory of 3104 4136 lsssass.exe 92 PID 3104 wrote to memory of 208 3104 net.exe 95 PID 3104 wrote to memory of 208 3104 net.exe 95 PID 3104 wrote to memory of 208 3104 net.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c8a3ba53b30bfedc01fe5c60446a0c86_JaffaCakes118.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop sharedaccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess4⤵
- System Location Discovery: System Language Discovery
PID:544
-
-
-
C:\Users\Admin\AppData\Roaming\Dir\lsssass.exeC:\Users\Admin\AppData\Roaming\Dir\lsssass.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Roaming\Dir\lsssass.exe"C:\Users\Admin\AppData\Roaming\Dir\lsssass.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop sharedaccess5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess6⤵
- System Location Discovery: System Language Discovery
PID:208
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD5cb492b7df9b5c170d7c87527940eff3b
SHA166928e6cbb59c3a3bce606959ef4a865fe04e642
SHA256dba5166ad9db9ba648c1032ebbd34dcd0d085b50023b839ef5c68ca1db93a563
SHA512ce677db6ae33c5496874a2902d30d361f6cf12576e96bd8a9f6626a0ca29f0b4f97e403e54711d24ebf34d4e183235a8f9951345d32a20f2dad476d911ee7e06
-
Filesize
450KB
MD5c8a3ba53b30bfedc01fe5c60446a0c86
SHA1b4f080fab717f2aa227fdf4445e09f5fe6875507
SHA25671bf8adec5b44ac69e9ff8239c8dafa5a806e429470e2f9e6b6d7fbac3395868
SHA512d69a04e01548b909d1978144b9bd113eaf16250e61ceabeb8e28b2460b033305a50dd2a080fd25ae9c3833111312e31d27761fae9c3e861c4703562fd00e6843