Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 04:06
Static task
static1
Behavioral task
behavioral1
Sample
d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe
-
Size
99KB
-
MD5
d5a0f6baebe6f4bf5658d38c18d34ec8
-
SHA1
6bcbb00faec744ff0a4d6d141071eef2baa70769
-
SHA256
17f96397035fded780c11562876cd455b635d98255f2052912afcd113c1a55d6
-
SHA512
e5342e1acb9967ec02cb935e413c91726c4005f217120112d5ccc56e11a82a3805673a4c13fff6e1ce808e84ea83e294d89590f02feb04f388f8cff2755aefcc
-
SSDEEP
1536:lidHJUw2UZ2RbwbU6Pn1SNHe4HVpHe6B2V8oLMb1Zb4aaGw:loCGUe1SNHe4HVp+rVpLW4pGw
Malware Config
Extracted
tofsee
64.20.54.234
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
Processes:
sckr.exesckr.exepid Process 3152 sckr.exe 4756 sckr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\sckr.exe\" /r" d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exesckr.exesckr.exedescription pid Process procid_target PID 4904 set thread context of 624 4904 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 83 PID 3152 set thread context of 4756 3152 sckr.exe 85 PID 4756 set thread context of 1148 4756 sckr.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 4052 1148 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
svchost.exed5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exed5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exesckr.exesckr.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sckr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sckr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exed5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exesckr.exesckr.exedescription pid Process procid_target PID 4904 wrote to memory of 624 4904 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 83 PID 4904 wrote to memory of 624 4904 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 83 PID 4904 wrote to memory of 624 4904 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 83 PID 4904 wrote to memory of 624 4904 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 83 PID 4904 wrote to memory of 624 4904 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 83 PID 4904 wrote to memory of 624 4904 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 83 PID 4904 wrote to memory of 624 4904 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 83 PID 4904 wrote to memory of 624 4904 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 83 PID 624 wrote to memory of 3152 624 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 84 PID 624 wrote to memory of 3152 624 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 84 PID 624 wrote to memory of 3152 624 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 84 PID 3152 wrote to memory of 4756 3152 sckr.exe 85 PID 3152 wrote to memory of 4756 3152 sckr.exe 85 PID 3152 wrote to memory of 4756 3152 sckr.exe 85 PID 3152 wrote to memory of 4756 3152 sckr.exe 85 PID 3152 wrote to memory of 4756 3152 sckr.exe 85 PID 3152 wrote to memory of 4756 3152 sckr.exe 85 PID 3152 wrote to memory of 4756 3152 sckr.exe 85 PID 3152 wrote to memory of 4756 3152 sckr.exe 85 PID 4756 wrote to memory of 1148 4756 sckr.exe 86 PID 4756 wrote to memory of 1148 4756 sckr.exe 86 PID 4756 wrote to memory of 1148 4756 sckr.exe 86 PID 4756 wrote to memory of 1148 4756 sckr.exe 86 PID 4756 wrote to memory of 1148 4756 sckr.exe 86 PID 624 wrote to memory of 1396 624 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 91 PID 624 wrote to memory of 1396 624 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 91 PID 624 wrote to memory of 1396 624 d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5a0f6baebe6f4bf5658d38c18d34ec8_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\sckr.exe"C:\Users\Admin\sckr.exe" /r3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\sckr.exe"C:\Users\Admin\sckr.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 3206⤵
- Program crash
PID:4052
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7117.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:1396
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1148 -ip 11481⤵PID:3508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD5202ac4c7947f715582270980a27fde7c
SHA1012e7f66cda2b93ff12e0e67a4d782c1017fe823
SHA25606f02b6d9b97cf3eb0e2064f75767f1a82a02b9e2db9aff39c9b442794e81aeb
SHA5129ec7f1f200e85c2749734be25e9ba95b5021ba997e683fe77558a48c54414c3cd62cf8bde4007e02d8f732eb884c860c825054165fd65a9a0e61f0b482632a73
-
Filesize
99KB
MD5d5a0f6baebe6f4bf5658d38c18d34ec8
SHA16bcbb00faec744ff0a4d6d141071eef2baa70769
SHA25617f96397035fded780c11562876cd455b635d98255f2052912afcd113c1a55d6
SHA512e5342e1acb9967ec02cb935e413c91726c4005f217120112d5ccc56e11a82a3805673a4c13fff6e1ce808e84ea83e294d89590f02feb04f388f8cff2755aefcc