Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 13:58
Static task
static1
Behavioral task
behavioral1
Sample
d675558df7f74915386f10a9a941c7ed_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d675558df7f74915386f10a9a941c7ed_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d675558df7f74915386f10a9a941c7ed_JaffaCakes118.exe
-
Size
446KB
-
MD5
d675558df7f74915386f10a9a941c7ed
-
SHA1
be898ec4f95d007f6418ca1b1fb3abbf3698b621
-
SHA256
cfe5894d25a1c5403f7fe1de9af32dcb83a37f52e91b048150b0e68f1dd15ca2
-
SHA512
b4ef98cae99d68d76ea1c58bcbbfe2f25372a20f412149d933be36db974a451fa1d58f090e4be873c3230c19434ac01be8f3bd1e66ef0b6eca63cfe71358ad3b
-
SSDEEP
6144:sNXDAotTVxeZbgrzV2GSzc9m/eOLYvWE4x+dj9oMlez8l0NaGOeX+FSkmL84++Js:8DAo5VxNrB2ZcecX1l05+FZmw4S1
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation d675558df7f74915386f10a9a941c7ed_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SYSTEM = "C:\\WINDOWS\\System\\csrs.exe" regedit.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\system\csrs.exe d675558df7f74915386f10a9a941c7ed_JaffaCakes118.exe File created C:\Windows\system\xxx.exe d675558df7f74915386f10a9a941c7ed_JaffaCakes118.exe File opened for modification C:\Windows\system\xxx.exe d675558df7f74915386f10a9a941c7ed_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d675558df7f74915386f10a9a941c7ed_JaffaCakes118.exe -
Runs .reg file with regedit 1 IoCs
pid Process 4844 regedit.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 348 d675558df7f74915386f10a9a941c7ed_JaffaCakes118.exe 348 d675558df7f74915386f10a9a941c7ed_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 348 wrote to memory of 3544 348 d675558df7f74915386f10a9a941c7ed_JaffaCakes118.exe 85 PID 348 wrote to memory of 3544 348 d675558df7f74915386f10a9a941c7ed_JaffaCakes118.exe 85 PID 348 wrote to memory of 3544 348 d675558df7f74915386f10a9a941c7ed_JaffaCakes118.exe 85 PID 3544 wrote to memory of 4844 3544 cmd.exe 87 PID 3544 wrote to memory of 4844 3544 cmd.exe 87 PID 3544 wrote to memory of 4844 3544 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\d675558df7f74915386f10a9a941c7ed_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d675558df7f74915386f10a9a941c7ed_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\load.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\regedit.exeregedit /s svchost.reg3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:4844
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5059368abd45a349b64d9dd97b9a424d5
SHA13dcb14033014eec8acb86601d02706904d1dc3e3
SHA256b13d68ed18930c6a3536aebd826b92d9dd90c27d6353bc0a33bed655e746040d
SHA5124557cdd2c8080695b9e273181b713a7843dd523c2681084323e042a8e0f651f84ea3070b47c7161d169c0968586dfa089a9fe2c14cc3fc7d42f9a363b8a988ec
-
Filesize
717B
MD59821c22158bb5fea24f3e133466f640c
SHA1615701ee34403d8ec58dc32adbcf5655cf671f29
SHA256fdb3639edfdcb47f4d9a967c732fe00f0961930f797107fa521012d256fff20f
SHA5123a0dc6d2dd7dbf620eb6b3f49300908d10bb7822a04400ce5ec268609ab24156c18d0b627fa900f7e42707012c2e1f405625c92d23a2f8b3716d3aa0f76fb741