Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
d190026cfa95ff6cc3809cd617a677ff_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d190026cfa95ff6cc3809cd617a677ff_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d190026cfa95ff6cc3809cd617a677ff_JaffaCakes118.exe
-
Size
442KB
-
MD5
d190026cfa95ff6cc3809cd617a677ff
-
SHA1
73ac38697a21057033960bddd034a1e4d0bcee6f
-
SHA256
4d8a0ce938bfb88cbf97adc7e9d8ab523fc5ee9d52cadf4696c156ee6b5f4c66
-
SHA512
b85e2c7e2849bd64fbde666247af8e430cc674a394894827d7cdaf04fc41ae665711b7b96218ea595003c99521e2e15249de7d4a29652e786e0568a31e547e04
-
SSDEEP
12288:j3lhEKwgFd25wWUENWLy60jezEClolpgN2XzloI8ulOUViOO3:52LgO5wdEN36jhlolpg4Zn8ulOOiX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation d190026cfa95ff6cc3809cd617a677ff_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\С½ÅѾ = "C:\\WINDOWS\\system32\\С½ÅѾ.cmd" regedit.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\小脚丫.cmd d190026cfa95ff6cc3809cd617a677ff_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\小脚丫.cmd d190026cfa95ff6cc3809cd617a677ff_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d190026cfa95ff6cc3809cd617a677ff_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe -
Runs .reg file with regedit 1 IoCs
pid Process 3556 regedit.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4052 wrote to memory of 3556 4052 d190026cfa95ff6cc3809cd617a677ff_JaffaCakes118.exe 86 PID 4052 wrote to memory of 3556 4052 d190026cfa95ff6cc3809cd617a677ff_JaffaCakes118.exe 86 PID 4052 wrote to memory of 3556 4052 d190026cfa95ff6cc3809cd617a677ff_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d190026cfa95ff6cc3809cd617a677ff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d190026cfa95ff6cc3809cd617a677ff_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s "C:\Users\Admin\AppData\Local\Temp\HZ$D.916.3326\sfx.reg"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
306B
MD5f044760069a19da50ae7dffc8851b557
SHA1937bfd83ad9d3f6e385c7df0deecd3ee7183e708
SHA2564f78c32649abc06a94f2638b40da808d046a313e8e9fb65b1e2968043a0a9abc
SHA512ccec907bf51e367981cde86904c1179c58fe2537f831f9259ccfa3673298427ca95f257aa32025d11e36c48f9b66c93f953cea98ea682d98e60df07ade5501bc