Analysis
-
max time kernel
132s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 15:17
Static task
static1
Behavioral task
behavioral1
Sample
de6c93027c33413b8e7a1e54eb5b1a4a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
de6c93027c33413b8e7a1e54eb5b1a4a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
de6c93027c33413b8e7a1e54eb5b1a4a_JaffaCakes118.exe
-
Size
15KB
-
MD5
de6c93027c33413b8e7a1e54eb5b1a4a
-
SHA1
437ac2d99ff9790880ce7075112841cd8c52cff0
-
SHA256
3ce20da33f839e3ba6f037b1443e5a3afb62c78cf8d8d6bf6ca7a31202ee5caf
-
SHA512
c8f66ca5d47b8d6020351d108f65167ccff79f751f6c8f188c8975c4ee644567e9a729c88f80a4cb79bb02bb79e021894339bc4b5cb782f5df4ba6d27d003e12
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4Yhv5i:hDXWipuE+K3/SSHgxl5i
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation DEM5DEF.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation DEMB46B.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation DEMAA9.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation DEM60D8.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation DEMB6D8.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation de6c93027c33413b8e7a1e54eb5b1a4a_JaffaCakes118.exe -
Executes dropped EXE 6 IoCs
pid Process 4744 DEM5DEF.exe 4260 DEMB46B.exe 1780 DEMAA9.exe 4372 DEM60D8.exe 980 DEMB6D8.exe 3860 DEMCF6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de6c93027c33413b8e7a1e54eb5b1a4a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM5DEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMB46B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMAA9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM60D8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMB6D8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMCF6.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4936 wrote to memory of 4744 4936 de6c93027c33413b8e7a1e54eb5b1a4a_JaffaCakes118.exe 94 PID 4936 wrote to memory of 4744 4936 de6c93027c33413b8e7a1e54eb5b1a4a_JaffaCakes118.exe 94 PID 4936 wrote to memory of 4744 4936 de6c93027c33413b8e7a1e54eb5b1a4a_JaffaCakes118.exe 94 PID 4744 wrote to memory of 4260 4744 DEM5DEF.exe 98 PID 4744 wrote to memory of 4260 4744 DEM5DEF.exe 98 PID 4744 wrote to memory of 4260 4744 DEM5DEF.exe 98 PID 4260 wrote to memory of 1780 4260 DEMB46B.exe 100 PID 4260 wrote to memory of 1780 4260 DEMB46B.exe 100 PID 4260 wrote to memory of 1780 4260 DEMB46B.exe 100 PID 1780 wrote to memory of 4372 1780 DEMAA9.exe 102 PID 1780 wrote to memory of 4372 1780 DEMAA9.exe 102 PID 1780 wrote to memory of 4372 1780 DEMAA9.exe 102 PID 4372 wrote to memory of 980 4372 DEM60D8.exe 104 PID 4372 wrote to memory of 980 4372 DEM60D8.exe 104 PID 4372 wrote to memory of 980 4372 DEM60D8.exe 104 PID 980 wrote to memory of 3860 980 DEMB6D8.exe 106 PID 980 wrote to memory of 3860 980 DEMB6D8.exe 106 PID 980 wrote to memory of 3860 980 DEMB6D8.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\de6c93027c33413b8e7a1e54eb5b1a4a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\de6c93027c33413b8e7a1e54eb5b1a4a_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\DEM5DEF.exe"C:\Users\Admin\AppData\Local\Temp\DEM5DEF.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\DEMB46B.exe"C:\Users\Admin\AppData\Local\Temp\DEMB46B.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\DEMAA9.exe"C:\Users\Admin\AppData\Local\Temp\DEMAA9.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\DEM60D8.exe"C:\Users\Admin\AppData\Local\Temp\DEM60D8.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\DEMB6D8.exe"C:\Users\Admin\AppData\Local\Temp\DEMB6D8.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\DEMCF6.exe"C:\Users\Admin\AppData\Local\Temp\DEMCF6.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3860
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD537b8fab2081026acd1b3d1f3e781059a
SHA1078e89f1499b311092fda930e0e3667f83f08044
SHA256c6504daaeb9404c8762b3c8434269ab3211109d6a7cb96e67478858e79636094
SHA5128fa02a52f26105533295664c56399adc0e9fa4e1098710ac3faa44003ac1571bb0c46674ed0fb49ce5c77b527201058f93a14d78018cbfd004cac802c9f09ad9
-
Filesize
15KB
MD57dad293723f906b32e7cc9efab841954
SHA1c85a946613afedd7d6463fbd1281fad8d25a0881
SHA25683d81e71067e498a8617e2ccfe67b47ca7b572e8c5b10c590036f0f4e42cffc9
SHA5123f15e83d79d215b840ba9f193adbd563167c1c18f09b2d81f6b504f52c125a3bd2218179f781582c0d6c8d820ed17d20d81940579107491a9caa5996c64e402b
-
Filesize
15KB
MD5897cd4582c8d61f8c0d8e72f6cb8aab9
SHA1e2a19b39af97cbd8f0fc5aa049c32968737b59bf
SHA256963473c3259b4c5d4b263efc6b3b2b9553abbd19037fb8393c0487a376afb7e0
SHA512858cf4c87f1d1a370ab607340e0edfd0ce886e7a691a71df2de4f34a17402adf4933df786a4e1ff5b7671a2221eb5202aa9b8a7a5fbb611f57bfdffc790d4c0a
-
Filesize
15KB
MD51943a5e5bd1f44af9682d1b0610377ac
SHA1e697e220edf79627c66a6b7ab0e040a0ffb21eaa
SHA256d31ceacff420cb5105bd0d2e1c9502063904ca63330f597022f85bc02b22ce72
SHA51229cdc30a2b6b2b4d0c90d15ef74cee78bd02ac79b646f363bba8eafecd8d315a2338ee9cc76d496ae66c4d60aeff81ac7d13f795216f43876e61b14d9189fe3f
-
Filesize
15KB
MD5edf26721dba778e86f9818a7c8dc64e9
SHA179b0bfc8cabb17dca563d6ecea24f37f859038e9
SHA25681a9336f2be17b68d483677941972129163da7611e32031fd36e7c6a7b063459
SHA512fff439e11d12f494fbcd27a48c4c7622fefc525c6524872a726674d8b508926a0f0245852ba1f95a5109dc3a3b1071e1218056202a18a74ef60fbbb939c20abd
-
Filesize
15KB
MD59e1b19b59e165302a2850098a1853f32
SHA1f3c43da73ca9ef95d066fe3e5b91a9db0ee1c16d
SHA2564548c3a4fd4952487a5c582d45e997732aa15b9b4c099f8c3fd86f831401f2b8
SHA5128587d188828c0dd05b784314f29eae2c09ee8c1d84f09bf67abc3c0d88e83774364abddf1871e08bfb1208ef844c4416d95bacd6e0e0760730d2d2c818b91800