Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
ce22838c3861e0c3ef829c9841416327_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce22838c3861e0c3ef829c9841416327_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ce22838c3861e0c3ef829c9841416327_JaffaCakes118.exe
-
Size
41KB
-
MD5
ce22838c3861e0c3ef829c9841416327
-
SHA1
3734fe9cec81562e9abead911948332980e96ec6
-
SHA256
576cecaf422528fdfd648a6563850e5c823951f10a2d63a1d2a279a20664a84e
-
SHA512
74ec8a7bc9ccaff854a43e58a59268ea65e6365f4721f969eaecaefc2e1cab66d8e0deee9b71c1ead3b7cb6f963bf3a9105674082182285307cdf6c806d3976c
-
SSDEEP
768:N6l3i2TE1Zk50+EUDK+gFDw2dYZcUpB7iZ2LsNNoNX+Hmh:N6PIk5JsoLpBYunh
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation ce22838c3861e0c3ef829c9841416327_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4960 WinHe800.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinHe800.exe ce22838c3861e0c3ef829c9841416327_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WinHe800.exe ce22838c3861e0c3ef829c9841416327_JaffaCakes118.exe File created C:\Windows\SysWOW64\WinHe800.exe WinHe800.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce22838c3861e0c3ef829c9841416327_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinHe800.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3172 ce22838c3861e0c3ef829c9841416327_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4960 WinHe800.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3172 wrote to memory of 4960 3172 ce22838c3861e0c3ef829c9841416327_JaffaCakes118.exe 88 PID 3172 wrote to memory of 4960 3172 ce22838c3861e0c3ef829c9841416327_JaffaCakes118.exe 88 PID 3172 wrote to memory of 4960 3172 ce22838c3861e0c3ef829c9841416327_JaffaCakes118.exe 88 PID 3172 wrote to memory of 748 3172 ce22838c3861e0c3ef829c9841416327_JaffaCakes118.exe 89 PID 3172 wrote to memory of 748 3172 ce22838c3861e0c3ef829c9841416327_JaffaCakes118.exe 89 PID 3172 wrote to memory of 748 3172 ce22838c3861e0c3ef829c9841416327_JaffaCakes118.exe 89 PID 4960 wrote to memory of 4276 4960 WinHe800.exe 90 PID 4960 wrote to memory of 4276 4960 WinHe800.exe 90 PID 4960 wrote to memory of 4276 4960 WinHe800.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce22838c3861e0c3ef829c9841416327_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ce22838c3861e0c3ef829c9841416327_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\WinHe800.exe"C:\Windows\system32\WinHe800.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C del C:\Windows\SysWOW64\WinHe800.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:4276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C del C:\Users\Admin\AppData\Local\Temp\CE2283~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28.3MB
MD57d700602eed50f729ff98d081122a3bc
SHA1a9d580efc9bb154b3b3785ee69f4eb3e48978e09
SHA256e300b0e93ae2a40b42599c65d49293dc168c5cb8fcabd0f4279d418782ae6a19
SHA51261249206f3bdd9c223b8872c457c26099fb7882dbd7f0a2d2991485f1378a892a1815673eafcd477acc2b9318fc3d9211eb549cd1889988344e16bca96746b46