Analysis
-
max time kernel
148s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 08:23
Static task
static1
Behavioral task
behavioral1
Sample
d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
d17dd5050c9a4eec4903767376829500
-
SHA1
0b6599d18ffda4baa21f4bc09ae9e168d9eee802
-
SHA256
2b64e39e9ab434dd665ac078b8626f093af9933d051972099f0a9599da1c5f26
-
SHA512
45239813b612f821bb2491511fdeb77cd566851857c5dbf6f90191fe4a864eb5f23960f5a2b8c3f23ab01a50064e03a5b3e4409fe876306d8453f60a9b8c3476
-
SSDEEP
24576:EInXgjK/K6dipju3/YQX24Fu+WqAH2k8bQpZrdETYl+nfTQxij6IbIcL:EINSRjuA02J0zbQLrdEi+nfTQxijnpL
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1796 attrib.exe 5084 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 1460 ctfmon.exe 4956 ctfmon.exe 4324 ctfmon.exe -
Loads dropped DLL 3 IoCs
pid Process 4956 ctfmon.exe 4956 ctfmon.exe 4956 ctfmon.exe -
Drops file in Windows directory 27 IoCs
description ioc Process File created C:\Windows\clusio.sys d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\clusio.sys d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\ssleay32.dll d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\syskern32.dll attrib.exe File opened for modification C:\Windows\rasptq.sys d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File created C:\Windows\syskern32.dll d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\ ctfmon.exe File opened for modification C:\Windows\ctfmon.exe d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File created C:\Windows\jerltybit.crt d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\stc64.bat d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\syskern32.dll ctfmon.exe File created C:\Windows\ctfmon.exe d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\install.bat d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\jerltybit.crt d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\libeay32.dll d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\otrux.dll d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\regedit32.key d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File created C:\Windows\__tmp_rar_sfx_access_check_240612609 d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File created C:\Windows\install.bat d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File created C:\Windows\regedit32.key d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File created C:\Windows\stc64.bat d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\syskern32.dll d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File created C:\Windows\ssleay32.dll d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File created C:\Windows\libeay32.dll d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File created C:\Windows\otrux.dll d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File created C:\Windows\rasptq.sys d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\ctfmon.exe attrib.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3788 sc.exe 4320 sc.exe 3588 sc.exe 3288 sc.exe 4016 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4956 ctfmon.exe 4956 ctfmon.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3424 wrote to memory of 2716 3424 d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe 85 PID 3424 wrote to memory of 2716 3424 d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe 85 PID 3424 wrote to memory of 2716 3424 d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe 85 PID 2716 wrote to memory of 4016 2716 cmd.exe 88 PID 2716 wrote to memory of 4016 2716 cmd.exe 88 PID 2716 wrote to memory of 4016 2716 cmd.exe 88 PID 2716 wrote to memory of 1460 2716 cmd.exe 89 PID 2716 wrote to memory of 1460 2716 cmd.exe 89 PID 2716 wrote to memory of 1460 2716 cmd.exe 89 PID 2716 wrote to memory of 1892 2716 cmd.exe 90 PID 2716 wrote to memory of 1892 2716 cmd.exe 90 PID 2716 wrote to memory of 1892 2716 cmd.exe 90 PID 1892 wrote to memory of 1716 1892 net.exe 91 PID 1892 wrote to memory of 1716 1892 net.exe 91 PID 1892 wrote to memory of 1716 1892 net.exe 91 PID 2716 wrote to memory of 3788 2716 cmd.exe 95 PID 2716 wrote to memory of 3788 2716 cmd.exe 95 PID 2716 wrote to memory of 3788 2716 cmd.exe 95 PID 2716 wrote to memory of 4320 2716 cmd.exe 96 PID 2716 wrote to memory of 4320 2716 cmd.exe 96 PID 2716 wrote to memory of 4320 2716 cmd.exe 96 PID 2716 wrote to memory of 4324 2716 cmd.exe 97 PID 2716 wrote to memory of 4324 2716 cmd.exe 97 PID 2716 wrote to memory of 4324 2716 cmd.exe 97 PID 2716 wrote to memory of 1028 2716 cmd.exe 98 PID 2716 wrote to memory of 1028 2716 cmd.exe 98 PID 2716 wrote to memory of 1028 2716 cmd.exe 98 PID 1028 wrote to memory of 1760 1028 net.exe 99 PID 1028 wrote to memory of 1760 1028 net.exe 99 PID 1028 wrote to memory of 1760 1028 net.exe 99 PID 2716 wrote to memory of 3588 2716 cmd.exe 100 PID 2716 wrote to memory of 3588 2716 cmd.exe 100 PID 2716 wrote to memory of 3588 2716 cmd.exe 100 PID 2716 wrote to memory of 3288 2716 cmd.exe 101 PID 2716 wrote to memory of 3288 2716 cmd.exe 101 PID 2716 wrote to memory of 3288 2716 cmd.exe 101 PID 2716 wrote to memory of 1796 2716 cmd.exe 102 PID 2716 wrote to memory of 1796 2716 cmd.exe 102 PID 2716 wrote to memory of 1796 2716 cmd.exe 102 PID 2716 wrote to memory of 5084 2716 cmd.exe 103 PID 2716 wrote to memory of 5084 2716 cmd.exe 103 PID 2716 wrote to memory of 5084 2716 cmd.exe 103 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 5084 attrib.exe 1796 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\install.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\sc.exesc stop ctf323⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4016
-
-
C:\Windows\ctfmon.exeC:\Windows\ctfmon.exe /i /u /h3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1460
-
-
C:\Windows\SysWOW64\net.exenet start ctf323⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start ctf324⤵
- System Location Discovery: System Language Discovery
PID:1716
-
-
-
C:\Windows\SysWOW64\sc.exesc failure ctf32 actions= restart/1 reset= 103⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3788
-
-
C:\Windows\SysWOW64\sc.exesc config ctf32 error= ignore3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4320
-
-
C:\Windows\ctfmon.exeC:\Windows\ctfmon.exe /i /u /h3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4324
-
-
C:\Windows\SysWOW64\net.exenet start ctf323⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start ctf324⤵
- System Location Discovery: System Language Discovery
PID:1760
-
-
-
C:\Windows\SysWOW64\sc.exesc failure ctf32 actions= restart/1 reset= 103⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3588
-
-
C:\Windows\SysWOW64\sc.exesc config ctf32 error= ignore3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3288
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h +r C:\Windows\ctfmon.exe3⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1796
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\syskern32.dll3⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5084
-
-
-
C:\Windows\ctfmon.exeC:\Windows\ctfmon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
310B
MD51fcf9ba087443dff8bea77207ee82653
SHA123b90c44e17d0296a481322a4bc497f39fc4388a
SHA256d0228d2508e9187c56b9f0b032f6d28cc5cbb10667e1e12d9fa82f32ded7071a
SHA5127427969b398e3080836e03f175bc017ee1bc55cc1023b7ce7218581b3ec6c75c9a4ed5d3ab2625a37b1a75c3c97561cd14bda4a96f0196ec3a55607cc39ae114
-
Filesize
972KB
MD5a97d57906b9427d2d76c1e24d8efc36e
SHA16d1fef4409bb45a3b03c4d8f1eb5faefcc9363d2
SHA25671f870d447bd74419d718e28c9ed8a3c3a47e9f0ff8f852cb8790903e5d5d50a
SHA512ccb1e1fd83e5d22bfab061373308918d533041b92b46d768e0b410074fafa0893cc8c63a021eeb6ba97f42becbdce8666a60166a588d2340896855d9d22b77ab
-
Filesize
575B
MD525536ecd5e85d2e751c50d9fc448d5b1
SHA17950fc3f1ba078147844b1157ff9c62ddaabf887
SHA2564e87787cf54db726dc00b9b5ed90f09cb293d81fb3a1b0af160a8674970c92d2
SHA512b695f588d9bb64d4df4a7be1981fc644cfabb5967ac4427548a7746ca9f57cddecaf2512daf67d917d2d31f4e32a0116b834ff88675c7cce93f1088e1397c1c1
-
Filesize
973B
MD57b8fa286633f087b2faf9a9584dcc72a
SHA1d1845d794abc47f610e88aecdc55b7fb31cecfc8
SHA256015c0cdeb93d4b5ed1c7ee1719be6136eaf871dbca5f9fc7c24492093e6b1712
SHA5129756e14708d370ad20f4ad8ff8cc8f739e5575d7a6049fa6fb1af8936e43d764ffc2fb5cf515e127a2644329b4bd953a6237294e8c60097f5800f6b639cf63b6
-
Filesize
828KB
MD5672fe0788779d4b30b8bec4efb32352e
SHA152f9eaf79480602759961346beac9489a6b4a13f
SHA256b23cdd7e1189750e3b68edfa2402b00bb92a8a9fe303ad44cab4a33f07d957b8
SHA51250d8fbb0564642ded75818c5fdbf52e1783e7707afcc4f9f44959b81be7cfe3c210b93d2e563738b94ee53d88132700e090678402527c38d9a2b0cf13afb9d66
-
Filesize
1KB
MD58dd2f2a1e98900b79d67541f7656873a
SHA165e6035530cbc8b19deb6dd678fa64cd6552dc5e
SHA25626e6462fed6f154a3e09a17338249af30feab16a9636560c5d7e31f6cf566704
SHA512408a5ffee18e437cced77ee9cd76884ce909bb92f7fd4b0262c52a1c79165055f4020966a74bd09d4046e770b0a324f3d13cc66e1b5eba72bef9a83d387bcef8
-
Filesize
963B
MD52293486183632e8634aa30a1798bc5e7
SHA16a75bae4369c16450858ace07d66d30f5a0532b2
SHA2561eb5b1f5a0c14f2602c61179c275b1e30059eb3c69e48821aeb44d4f06395576
SHA512b332f40791897b4dc3d83b267c9405da35cbebc521cabc2fc76bb906f45355b20d37696fee91d5b139f88aeba92364fda720b167bc6399078a2903a842bd1bac
-
Filesize
156KB
MD5fc7aff0c5c8d6ef7b24d6e73c754f8d6
SHA187a9b952f7ed5883b21bad39c40d3b6cc58df3f2
SHA256c53e0fb93cee6cc865a109f7447c92020f3c05684507b93a763a1e6f77b2bd20
SHA5124e049ad03e65cb1d4a57c8e6c1c33cb882df69deafa89af5f23437886a611eb02d4fea6d7ca4d2b0a42892e821711fcae6cc1ab65714f307dbff945e5e68b563
-
Filesize
114B
MD5df01a7d9e6b061814a003672acfa0c21
SHA1065ed753b19efd9d28b264c394b3d6601c6d7a67
SHA256055738e2e2573f643980c409300ac1b9a71405a44f09060b55c9f2116c2f9b32
SHA512769b624f064f1d3a73040a954e49df1bf1eb47b400a2664ea89cc6fec211f8ed154d2965e6d4c36833ab7c09cba4f821711620dd68e329dbe2b6f8f260c7a15d
-
Filesize
454KB
MD5a8faa200904691b0838726ba66989a1c
SHA1304e210a301f4df7c88834c513564cd07b6504bf
SHA2565d0697f59b041f7c8bca20bf8a3df0fe1c300bf7f5faad8211198205989a0bee
SHA512457f28dd93639948dafe2c7cdc126e6977807f90ee0482aba32872d354dba90591d6290dbffa5ef013c9b368caa905e32aa76acf2a74d0abbd86abc239ec5380
-
Filesize
454KB
MD5ab8ebbb672d1a22c5ec34ef53f788151
SHA139405dda44c77684d3c7f724a640adede02259bc
SHA2568343a7b725bf7f2c7055e8a49cd1574beaf9611878ba17f70f16d5d47065c9ab
SHA512408352d9398b32ba934d1ea4e5b3a151db279ec01b476bb5ecf7515eff8b2efee17ae7f40810105f9ab07495dc37414608433ddaf4688856b8b11a1d5bf005aa