Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 13:46
Behavioral task
behavioral1
Sample
d21201b6c3cf1c33824b9ff711e152d8_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d21201b6c3cf1c33824b9ff711e152d8_JaffaCakes118.exe
-
Size
8KB
-
MD5
d21201b6c3cf1c33824b9ff711e152d8
-
SHA1
2f091d4481454d178972f54e654f67e58a6b7856
-
SHA256
b5bd63bdad5ed476fdf6883171a28b5d71bc12d868b73628d735a02ef748e88c
-
SHA512
0cc9410b736f4858f1ed79cbd7c58c0e1178b5e36096d16c46dee8988b0dd2401fa87a5c5767aa38ae65a4829d21607a146cdf21be9cae9dff42433a0590d922
-
SSDEEP
192:9hAMOYGYFE+p1BRz++XRKqsXdbSxKdXsFaNJhLkwcud2DH9VwGfct8uU:9eMOiS+pJa+XRYXdbSMdIaNJawcudoDN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation d21201b6c3cf1c33824b9ff711e152d8_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 1 IoCs
pid Process 3612 b2e.exe -
resource yara_rule behavioral2/memory/2072-0-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/2072-11-0x0000000000400000-0x0000000000409000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d21201b6c3cf1c33824b9ff711e152d8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2072 wrote to memory of 3612 2072 d21201b6c3cf1c33824b9ff711e152d8_JaffaCakes118.exe 83 PID 2072 wrote to memory of 3612 2072 d21201b6c3cf1c33824b9ff711e152d8_JaffaCakes118.exe 83 PID 2072 wrote to memory of 3612 2072 d21201b6c3cf1c33824b9ff711e152d8_JaffaCakes118.exe 83 PID 3612 wrote to memory of 3920 3612 b2e.exe 85 PID 3612 wrote to memory of 3920 3612 b2e.exe 85 PID 3612 wrote to memory of 3920 3612 b2e.exe 85 PID 3920 wrote to memory of 4112 3920 cmd.exe 89 PID 3920 wrote to memory of 4112 3920 cmd.exe 89 PID 3920 wrote to memory of 4112 3920 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d21201b6c3cf1c33824b9ff711e152d8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d21201b6c3cf1c33824b9ff711e152d8_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\90F5.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\90F5.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\90F5.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\d21201b6c3cf1c33824b9ff711e152d8_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\926C.tmp\batchfile.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\cmd.execmd.exe4⤵
- System Location Discovery: System Language Discovery
PID:4112
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5900d66283b07887e83b006628e5da178
SHA1d9a43d315735e796546032e1ba9384739f476b10
SHA256923324d6109ef001bed6788b90fcd49deb86a2e29ec49b99ca06792607bb938e
SHA512c28c825795ec8de3f368cdb39ce9275aeebf7751d83711ddb8eb0670bdbf21b0b7cae6281e50bc79ae0365d8d2e95b951f9a102ca26e34a58c09f19fb0ef83e1
-
Filesize
1KB
MD539a7259277fa2bb831ea26bf67fb53ea
SHA15e48b5d1c1812ec605d3b748e870ac0b340bfeec
SHA256a454d982de66d789dc8c9f03c4b430b18baad96503441caaa92b37b353f17459
SHA512018257da76f6e92a6466fb41cb51757b07d11ff987e2673d7b6b57c65dcd01d9908b9712e1a8a2978976c28fa565ec0b6a8a1fb9b777f4544043159c93fbfb68