Analysis
-
max time kernel
140s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 10:45
Static task
static1
Behavioral task
behavioral1
Sample
de3887dc05ec99f98ac67ccf91d98f95_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de3887dc05ec99f98ac67ccf91d98f95_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
de3887dc05ec99f98ac67ccf91d98f95_JaffaCakes118.exe
-
Size
468KB
-
MD5
de3887dc05ec99f98ac67ccf91d98f95
-
SHA1
dd766453f4731d0354affc6bc336e67c7eab6652
-
SHA256
3af259a408a9125799299da641bf453571e1c8e1c07948fb222cd8987514211a
-
SHA512
b04e9d52b86aeac5c4a0b2425c8e7b3f072c4afb87e6d4515d32f0ef89505df30f344ece03392bcb13eec98abe5bb445d664d701ad454e6d975d2849b0addd64
-
SSDEEP
12288:KsAcUOa2iLPZwq8GUZOpGrclON+N/yBdNldy3:YcUOELhS2Yg08qldy
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation de3887dc05ec99f98ac67ccf91d98f95_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 5116 mxcdFgjAEjErI.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mxcdFgjAEjErI.exe = "C:\\ProgramData\\mxcdFgjAEjErI.exe" de3887dc05ec99f98ac67ccf91d98f95_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de3887dc05ec99f98ac67ccf91d98f95_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mxcdFgjAEjErI.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Download de3887dc05ec99f98ac67ccf91d98f95_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" de3887dc05ec99f98ac67ccf91d98f95_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 928 de3887dc05ec99f98ac67ccf91d98f95_JaffaCakes118.exe 928 de3887dc05ec99f98ac67ccf91d98f95_JaffaCakes118.exe 928 de3887dc05ec99f98ac67ccf91d98f95_JaffaCakes118.exe 928 de3887dc05ec99f98ac67ccf91d98f95_JaffaCakes118.exe 5116 mxcdFgjAEjErI.exe 5116 mxcdFgjAEjErI.exe 5116 mxcdFgjAEjErI.exe 5116 mxcdFgjAEjErI.exe 5116 mxcdFgjAEjErI.exe 5116 mxcdFgjAEjErI.exe 5116 mxcdFgjAEjErI.exe 5116 mxcdFgjAEjErI.exe 5116 mxcdFgjAEjErI.exe 5116 mxcdFgjAEjErI.exe 5116 mxcdFgjAEjErI.exe 5116 mxcdFgjAEjErI.exe 5116 mxcdFgjAEjErI.exe 5116 mxcdFgjAEjErI.exe 5116 mxcdFgjAEjErI.exe 5116 mxcdFgjAEjErI.exe 5116 mxcdFgjAEjErI.exe 5116 mxcdFgjAEjErI.exe 5116 mxcdFgjAEjErI.exe 5116 mxcdFgjAEjErI.exe 5116 mxcdFgjAEjErI.exe 5116 mxcdFgjAEjErI.exe 5116 mxcdFgjAEjErI.exe 5116 mxcdFgjAEjErI.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 928 de3887dc05ec99f98ac67ccf91d98f95_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 928 wrote to memory of 5116 928 de3887dc05ec99f98ac67ccf91d98f95_JaffaCakes118.exe 85 PID 928 wrote to memory of 5116 928 de3887dc05ec99f98ac67ccf91d98f95_JaffaCakes118.exe 85 PID 928 wrote to memory of 5116 928 de3887dc05ec99f98ac67ccf91d98f95_JaffaCakes118.exe 85 PID 5116 wrote to memory of 3576 5116 mxcdFgjAEjErI.exe 56 PID 5116 wrote to memory of 3576 5116 mxcdFgjAEjErI.exe 56 PID 5116 wrote to memory of 3576 5116 mxcdFgjAEjErI.exe 56 PID 5116 wrote to memory of 3576 5116 mxcdFgjAEjErI.exe 56 PID 5116 wrote to memory of 3576 5116 mxcdFgjAEjErI.exe 56 PID 5116 wrote to memory of 3576 5116 mxcdFgjAEjErI.exe 56 PID 5116 wrote to memory of 3576 5116 mxcdFgjAEjErI.exe 56 PID 5116 wrote to memory of 3576 5116 mxcdFgjAEjErI.exe 56 PID 5116 wrote to memory of 3576 5116 mxcdFgjAEjErI.exe 56 PID 5116 wrote to memory of 3576 5116 mxcdFgjAEjErI.exe 56 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System de3887dc05ec99f98ac67ccf91d98f95_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" de3887dc05ec99f98ac67ccf91d98f95_JaffaCakes118.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\de3887dc05ec99f98ac67ccf91d98f95_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\de3887dc05ec99f98ac67ccf91d98f95_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
- System policy modification
PID:928 -
C:\ProgramData\mxcdFgjAEjErI.exe"C:\ProgramData\mxcdFgjAEjErI.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5116
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD5ad523fa28c83b1c2ceb949256387466d
SHA1cabb439e52cb9cd74d27eabb601dc40aea013323
SHA25657f64251bf5428f698ff69c995c3d31fd64f67924acdfd22741bd91bb7dd2872
SHA512692c5b3cd0648e6887ca9f34c3756be08f51e05705c27c1f13871eb6701c84642677bfc40c256f3b5d7c9b25b789e27cce2ecc5463c25e4ea504cad94e192e05
-
Filesize
468KB
MD5de3887dc05ec99f98ac67ccf91d98f95
SHA1dd766453f4731d0354affc6bc336e67c7eab6652
SHA2563af259a408a9125799299da641bf453571e1c8e1c07948fb222cd8987514211a
SHA512b04e9d52b86aeac5c4a0b2425c8e7b3f072c4afb87e6d4515d32f0ef89505df30f344ece03392bcb13eec98abe5bb445d664d701ad454e6d975d2849b0addd64