Analysis
-
max time kernel
135s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2024 20:00
Static task
static1
Behavioral task
behavioral1
Sample
cb908352d719b9e0a7142c4110ae502e_JaffaCakes118.lnk
Resource
win7-20240704-en
windows7-x64
4 signatures
150 seconds
General
-
Target
cb908352d719b9e0a7142c4110ae502e_JaffaCakes118.lnk
-
Size
938KB
-
MD5
cb908352d719b9e0a7142c4110ae502e
-
SHA1
e50a8c33b315517a4bad5eb35fb09e572c3ee9fa
-
SHA256
f5f79e2169db3bbe7b7ae3ff4a0f40659d11051e69ee784f5469659a708e829e
-
SHA512
9502d7c069532571277e3c8c849e9ce81130a11bf5ad892dad688aa9e53973abc76fb5b53aee72ca37fe29e50aa2543f2681a6d849ada59b9e07ff6e3b574909
-
SSDEEP
12288:HZ3Si/5CQsdRgvhS+u1vBcxqDE/4QiqkgLGVRivcLwOtIO1nKnVn/oGugLF3:53D5C5LgvMr1mx8y4dqLGnZn12Vngfg9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation cmd.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2256 wrote to memory of 3324 2256 cmd.exe 85 PID 2256 wrote to memory of 3324 2256 cmd.exe 85 PID 3324 wrote to memory of 4436 3324 cmd.exe 86 PID 3324 wrote to memory of 4436 3324 cmd.exe 86 PID 3324 wrote to memory of 4728 3324 cmd.exe 87 PID 3324 wrote to memory of 4728 3324 cmd.exe 87 PID 3324 wrote to memory of 4828 3324 cmd.exe 88 PID 3324 wrote to memory of 4828 3324 cmd.exe 88
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\cb908352d719b9e0a7142c4110ae502e_JaffaCakes118.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c path=C:\Windows\system32&move "VerificationDocuments.pdf.lnk " "C:\Users\Admin\AppData\Local\Temp\1.lnk"&type "C:\Users\Admin\AppData\Local\Temp\1.lnk"|find "END2">"C:\Users\Admin\AppData\Local\Temp\0.js"&wscript "C:\Users\Admin\AppData\Local\Temp\0.js"2⤵
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type "C:\Users\Admin\AppData\Local\Temp\1.lnk""3⤵PID:4436
-
-
C:\Windows\system32\find.exefind "END2"3⤵PID:4728
-
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\0.js"3⤵PID:4828
-
-