Analysis
-
max time kernel
149s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2024 20:43
Static task
static1
Behavioral task
behavioral1
Sample
cba17390b59f3c9380e24455c440d3eb_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cba17390b59f3c9380e24455c440d3eb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cba17390b59f3c9380e24455c440d3eb_JaffaCakes118.exe
-
Size
584KB
-
MD5
cba17390b59f3c9380e24455c440d3eb
-
SHA1
f3544f292336cf0f6e3a6163ccfda6ae6ed442b6
-
SHA256
3102123a62009a62e4a75da567d6b65abd2de23c739cba7486dff4337927fec4
-
SHA512
b3a5084bc86b9640b68240e60b9328d3a4d09765720a44722e593c2b2763898dfa451e05854fe476b360e5889caaf58f42c941f78a1e9385b3e0b0d3752b8777
-
SSDEEP
12288:2/XPRr7jlWuyfvHv4HOo9TfC/lIWrpcUx2gluSzTSqFQalf:2/5/U/fvgHOoNfCiWl7zuShQalf
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation cba17390b59f3c9380e24455c440d3eb_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 448 Remc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\erwfguyhjnxcj = "\"C:\\Users\\Admin\\AppData\\Roaming\\Remc\\Remc.exe\"" cba17390b59f3c9380e24455c440d3eb_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\erwfguyhjnxcj = "\"C:\\Users\\Admin\\AppData\\Roaming\\Remc\\Remc.exe\"" Remc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 448 set thread context of 4436 448 Remc.exe 106 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Remc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cba17390b59f3c9380e24455c440d3eb_JaffaCakes118.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings cba17390b59f3c9380e24455c440d3eb_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 720 cba17390b59f3c9380e24455c440d3eb_JaffaCakes118.exe 448 Remc.exe 448 Remc.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 720 wrote to memory of 3928 720 cba17390b59f3c9380e24455c440d3eb_JaffaCakes118.exe 102 PID 720 wrote to memory of 3928 720 cba17390b59f3c9380e24455c440d3eb_JaffaCakes118.exe 102 PID 720 wrote to memory of 3928 720 cba17390b59f3c9380e24455c440d3eb_JaffaCakes118.exe 102 PID 3928 wrote to memory of 4680 3928 WScript.exe 103 PID 3928 wrote to memory of 4680 3928 WScript.exe 103 PID 3928 wrote to memory of 4680 3928 WScript.exe 103 PID 4680 wrote to memory of 448 4680 cmd.exe 105 PID 4680 wrote to memory of 448 4680 cmd.exe 105 PID 4680 wrote to memory of 448 4680 cmd.exe 105 PID 448 wrote to memory of 4436 448 Remc.exe 106 PID 448 wrote to memory of 4436 448 Remc.exe 106 PID 448 wrote to memory of 4436 448 Remc.exe 106 PID 448 wrote to memory of 4436 448 Remc.exe 106 PID 448 wrote to memory of 4436 448 Remc.exe 106 PID 448 wrote to memory of 4436 448 Remc.exe 106 PID 448 wrote to memory of 4436 448 Remc.exe 106 PID 448 wrote to memory of 4436 448 Remc.exe 106 PID 448 wrote to memory of 4436 448 Remc.exe 106 PID 448 wrote to memory of 4436 448 Remc.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\cba17390b59f3c9380e24455c440d3eb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cba17390b59f3c9380e24455c440d3eb_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Remc\Remc.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Roaming\Remc\Remc.exeC:\Users\Admin\AppData\Roaming\Remc\Remc.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe5⤵PID:4436
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4460,i,4174666705242427184,7333705955694532165,262144 --variations-seed-version --mojo-platform-channel-handle=4512 /prefetch:81⤵PID:2168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
410B
MD5837b54af2c8d285fb69d719cc9061206
SHA1b31b75216a46b744eb0d89dd9885431a8ecde820
SHA256353bf067c7071e2b6904205a0f6755433a8711a4b2a9b48ac32ff538463f0e46
SHA5126cc4e846538cf16de26004343a157a565fe9730ad5c253e3fb6c64098405849e732bd2216fbdecd52cc3cbcb84e24e4dca23b5fd4f68bcdc0e73d485479e2311
-
Filesize
584KB
MD5cba17390b59f3c9380e24455c440d3eb
SHA1f3544f292336cf0f6e3a6163ccfda6ae6ed442b6
SHA2563102123a62009a62e4a75da567d6b65abd2de23c739cba7486dff4337927fec4
SHA512b3a5084bc86b9640b68240e60b9328d3a4d09765720a44722e593c2b2763898dfa451e05854fe476b360e5889caaf58f42c941f78a1e9385b3e0b0d3752b8777
-
Filesize
79B
MD510ce336af4bf7d9aa8858bcef42dc1b6
SHA15515ec65a267095029fa87ed89d0b30d25d1ac18
SHA2563dab1f375f218843d3ac236fba50e58926ae1dccf394f29f537722d699e243da
SHA5121a3001ef654e96727e6002ebb9012ab0c6fdb91765e63710d62f4763218d36efcd5acac867525130de9dbc31379f6d7fefb0f1a948bbb82ea297df618b90c175