Analysis
-
max time kernel
130s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 09:01
Static task
static1
Behavioral task
behavioral1
Sample
da02ed3a1e946818225e9f860f1518a5_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
da02ed3a1e946818225e9f860f1518a5_JaffaCakes118.exe
-
Size
206KB
-
MD5
da02ed3a1e946818225e9f860f1518a5
-
SHA1
bc0668e8b648d01a77279156cec824084d9f6a87
-
SHA256
6c0a31b06c2aaf65bb7805638c82b77c0705c28be7596a7efd6a6d1e8fc32683
-
SHA512
ec4a1d7a33a3c63c516a3969532bb25c36a951b9e0655704fb4c63ddd8687431afa4f54f9580c99740e047813e87d68493817f5758d9bfa16aafe4b2f41391b3
-
SSDEEP
3072:YtK8sN3+yM6f0tH5KWR8iIKyVppK3kQIzcBi0Wf6XZxiCcWMKj1NPje/:Yo5MyStjRDybMkQxlXZx+bG1Na
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 thunkmenus.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE thunkmenus.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies thunkmenus.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 thunkmenus.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da02ed3a1e946818225e9f860f1518a5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da02ed3a1e946818225e9f860f1518a5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thunkmenus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thunkmenus.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix thunkmenus.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" thunkmenus.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" thunkmenus.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5092 thunkmenus.exe 5092 thunkmenus.exe 5092 thunkmenus.exe 5092 thunkmenus.exe 5092 thunkmenus.exe 5092 thunkmenus.exe 5092 thunkmenus.exe 5092 thunkmenus.exe 5092 thunkmenus.exe 5092 thunkmenus.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3940 da02ed3a1e946818225e9f860f1518a5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1856 wrote to memory of 3940 1856 da02ed3a1e946818225e9f860f1518a5_JaffaCakes118.exe 86 PID 1856 wrote to memory of 3940 1856 da02ed3a1e946818225e9f860f1518a5_JaffaCakes118.exe 86 PID 1856 wrote to memory of 3940 1856 da02ed3a1e946818225e9f860f1518a5_JaffaCakes118.exe 86 PID 4732 wrote to memory of 5092 4732 thunkmenus.exe 95 PID 4732 wrote to memory of 5092 4732 thunkmenus.exe 95 PID 4732 wrote to memory of 5092 4732 thunkmenus.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\da02ed3a1e946818225e9f860f1518a5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da02ed3a1e946818225e9f860f1518a5_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\da02ed3a1e946818225e9f860f1518a5_JaffaCakes118.exe--cc792602⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:3940
-
-
C:\Windows\SysWOW64\thunkmenus.exe"C:\Windows\SysWOW64\thunkmenus.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\thunkmenus.exe--d387ac882⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:5092
-