Analysis
-
max time kernel
94s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 00:58
Static task
static1
Behavioral task
behavioral1
Sample
d567b65aeefd9a95b0dc3b028e832f42_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d567b65aeefd9a95b0dc3b028e832f42_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d567b65aeefd9a95b0dc3b028e832f42_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
d567b65aeefd9a95b0dc3b028e832f42
-
SHA1
0f4b955bdfa825274e28cdcac6c80854d92e7fc3
-
SHA256
bbe52140cbd065a4ec61788ed1b675b592fc4e441eaafdff46925478b6036901
-
SHA512
2f77f5cab210c8d61b88f1de15af840b8b588404877897d8d40ed522f2eee323ce842a67a03000f4e64228a737c26e22a1cfae984216050a6bcd2e891b28b0ac
-
SSDEEP
49152:nwYAKxYj7UTuQNYuAqAyTJDnWJqouTJDnWJqo2:wYA1/UTjdh1lDWUoulDWUo2
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate d567b65aeefd9a95b0dc3b028e832f42_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d567b65aeefd9a95b0dc3b028e832f42_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate jogo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion jogo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation d567b65aeefd9a95b0dc3b028e832f42_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2052 jogo.exe -
resource yara_rule behavioral2/memory/3248-0-0x00000000258B0000-0x00000000258C1000-memory.dmp upx behavioral2/memory/3248-3-0x00000000258B0000-0x00000000258C1000-memory.dmp upx behavioral2/memory/3248-2-0x00000000258B0000-0x00000000258C1000-memory.dmp upx behavioral2/memory/3248-1-0x00000000258B0000-0x00000000258C1000-memory.dmp upx behavioral2/memory/2052-16-0x0000000031460000-0x0000000031471000-memory.dmp upx behavioral2/memory/2052-17-0x0000000031460000-0x0000000031471000-memory.dmp upx behavioral2/memory/2052-15-0x0000000031460000-0x0000000031471000-memory.dmp upx behavioral2/memory/2052-14-0x0000000031460000-0x0000000031471000-memory.dmp upx behavioral2/memory/2052-24-0x0000000031460000-0x0000000031471000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msupdate32 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d567b65aeefd9a95b0dc3b028e832f42_JaffaCakes118.exe" d567b65aeefd9a95b0dc3b028e832f42_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d567b65aeefd9a95b0dc3b028e832f42_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jogo.exe -
Checks processor information in registry 2 TTPs 14 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 d567b65aeefd9a95b0dc3b028e832f42_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet d567b65aeefd9a95b0dc3b028e832f42_JaffaCakes118.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 jogo.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 jogo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString d567b65aeefd9a95b0dc3b028e832f42_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier d567b65aeefd9a95b0dc3b028e832f42_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier jogo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier jogo.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 d567b65aeefd9a95b0dc3b028e832f42_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier d567b65aeefd9a95b0dc3b028e832f42_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString jogo.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 d567b65aeefd9a95b0dc3b028e832f42_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 jogo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet jogo.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier jogo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier d567b65aeefd9a95b0dc3b028e832f42_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2052 jogo.exe 2052 jogo.exe 2052 jogo.exe 2052 jogo.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3248 wrote to memory of 2052 3248 d567b65aeefd9a95b0dc3b028e832f42_JaffaCakes118.exe 84 PID 3248 wrote to memory of 2052 3248 d567b65aeefd9a95b0dc3b028e832f42_JaffaCakes118.exe 84 PID 3248 wrote to memory of 2052 3248 d567b65aeefd9a95b0dc3b028e832f42_JaffaCakes118.exe 84 PID 2052 wrote to memory of 3496 2052 jogo.exe 56 PID 2052 wrote to memory of 3496 2052 jogo.exe 56 PID 2052 wrote to memory of 3496 2052 jogo.exe 56 PID 2052 wrote to memory of 3496 2052 jogo.exe 56 PID 2052 wrote to memory of 3496 2052 jogo.exe 56 PID 2052 wrote to memory of 3496 2052 jogo.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\d567b65aeefd9a95b0dc3b028e832f42_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d567b65aeefd9a95b0dc3b028e832f42_JaffaCakes118.exe"2⤵
- Checks BIOS information in registry
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Roaming\jogo.exe"C:\Users\Admin\AppData\Roaming\jogo.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2052
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
497KB
MD5ff4fa5d91f8399b3bbf729d9668b2fd0
SHA133560fd5fe2be8cc2f698b8fae9a1faddba9bb96
SHA256229d8511478cf2d42e45a43b539fa698cf87a7bf035f9a1a70129fe461e5f612
SHA51272a65c02b68096729c5802237be49a7d1841212fb55fb951336e12454969d428a38fb64cdd605da8ff8bb8e305c9fa3a004cb5a6f0ceef0df5c6d241717be16f