Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 23:13
Static task
static1
Behavioral task
behavioral1
Sample
df12f62ba1ae1cf9a624572dc3f8f10d_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
df12f62ba1ae1cf9a624572dc3f8f10d_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
df12f62ba1ae1cf9a624572dc3f8f10d
-
SHA1
b80f622e76ba090a10c8bb7438877003acb249e0
-
SHA256
348ed02a9d00847bed951010c7af7cb9e0fdb41fcddb779e7e760cc251e346a2
-
SHA512
ff6205052c0d9a49ec361742982f6d50f22dce42549f289ec4241ee54cff80f043cd6091cd07c6ed5cff5e708f26692621eedc9c17c5fd2e607e2970e730b088
-
SSDEEP
49152:uUy4m9mg9uJBMODTSVBGxYWWiwHIeGg4r05iPr0kfYhlOd:u5RAwuJpTSVIYWWiwH9Gg4r05iPdmOd
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation df12f62ba1ae1cf9a624572dc3f8f10d_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 1248 F42.exe 5068 F42.exe 2496 S42.exe -
resource yara_rule behavioral2/files/0x00070000000234da-19.dat themida -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\AJ.Settings df12f62ba1ae1cf9a624572dc3f8f10d_JaffaCakes118.exe File created C:\Windows\SysWOW64\AJ.Settings df12f62ba1ae1cf9a624572dc3f8f10d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df12f62ba1ae1cf9a624572dc3f8f10d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F42.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F42.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S42.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ df12f62ba1ae1cf9a624572dc3f8f10d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3712 wrote to memory of 1248 3712 df12f62ba1ae1cf9a624572dc3f8f10d_JaffaCakes118.exe 83 PID 3712 wrote to memory of 1248 3712 df12f62ba1ae1cf9a624572dc3f8f10d_JaffaCakes118.exe 83 PID 3712 wrote to memory of 1248 3712 df12f62ba1ae1cf9a624572dc3f8f10d_JaffaCakes118.exe 83 PID 3712 wrote to memory of 5068 3712 df12f62ba1ae1cf9a624572dc3f8f10d_JaffaCakes118.exe 87 PID 3712 wrote to memory of 5068 3712 df12f62ba1ae1cf9a624572dc3f8f10d_JaffaCakes118.exe 87 PID 3712 wrote to memory of 5068 3712 df12f62ba1ae1cf9a624572dc3f8f10d_JaffaCakes118.exe 87 PID 3712 wrote to memory of 2496 3712 df12f62ba1ae1cf9a624572dc3f8f10d_JaffaCakes118.exe 95 PID 3712 wrote to memory of 2496 3712 df12f62ba1ae1cf9a624572dc3f8f10d_JaffaCakes118.exe 95 PID 3712 wrote to memory of 2496 3712 df12f62ba1ae1cf9a624572dc3f8f10d_JaffaCakes118.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\df12f62ba1ae1cf9a624572dc3f8f10d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df12f62ba1ae1cf9a624572dc3f8f10d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\F42.exeC:\F42.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1248
-
-
C:\F42.exe"C:\F42.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5068
-
-
C:\S42.exe"C:\S42.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
444KB
MD59bb6826905965c13be1c84cc0ff83f42
SHA1ae7734e7a54353ab13ecba780ed62344332fbc6f
SHA256cfa4f56807405fd36e406688feb970a0d0d4854456ba2da72e4a33a27b01d9ae
SHA51209b5f6be1f638948854a4e332b9c0f74c8583db23c0d3d905c1467a5daaf571a57a04b0e91867b4a8984cb43b19df7fc41dc182841db9dc637389e135cfd211f
-
Filesize
1.3MB
MD5e60536d53c253b4997724b8631bf6067
SHA1de1676d289cefa000d07c4fae42f84a6073d7a68
SHA25679ada8911ea92c0f9d0cb019f749802302daee489531f4fbeff364fa82be2112
SHA512b58d72fbc5b4980fecc9610a16cfd56ce2ec2879ed31002aad9e7bb5ddcb245e787bd75fdf1fa3a71e665f117e5413c3504a5cb5ee18d4beef2a803cf992003c
-
Filesize
1.8MB
MD5df12f62ba1ae1cf9a624572dc3f8f10d
SHA1b80f622e76ba090a10c8bb7438877003acb249e0
SHA256348ed02a9d00847bed951010c7af7cb9e0fdb41fcddb779e7e760cc251e346a2
SHA512ff6205052c0d9a49ec361742982f6d50f22dce42549f289ec4241ee54cff80f043cd6091cd07c6ed5cff5e708f26692621eedc9c17c5fd2e607e2970e730b088