Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 15:52
Static task
static1
Behavioral task
behavioral1
Sample
de758ba3ded003b5c88c499bf3cf2a4d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de758ba3ded003b5c88c499bf3cf2a4d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
de758ba3ded003b5c88c499bf3cf2a4d_JaffaCakes118.exe
-
Size
116KB
-
MD5
de758ba3ded003b5c88c499bf3cf2a4d
-
SHA1
c5e2f05c5d988a71ed813300e709e09b81abb181
-
SHA256
562df1e59c300a112d2e6368376bfc601d9e4b7a92a6a9633e1b4eb717b1ae75
-
SHA512
e4151bc38a3c06fa45e156178de01d4c5202eb60b331a2e71bede47fa219c74edb498381bf336be5479166161be67c2cc99c348a7cb49340df3d5f7463cb2899
-
SSDEEP
384:6pxmCzgIoFfvloFfvKvUB8XpZe/pLdquQWOIEPlvieXpQa/Sy3f3HSVUJ+P:6TzUFeFKvU2fmpL8uIIsHtSk5+
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation de758ba3ded003b5c88c499bf3cf2a4d_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation lsass.exe -
Executes dropped EXE 4 IoCs
pid Process 4972 lsass.exe 1992 lsass.exe 1652 lsass.exe 2984 lsass.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmon = "C:\\Windows\\SysWOW64\\1802395716\\lsass.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avpupdt = "C:\\Windows\\system32\\1802395716\\avgupdt.exe" de758ba3ded003b5c88c499bf3cf2a4d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmon = "C:\\Users\\Admin\\AppData\\Local\\Temp\\de758ba3ded003b5c88c499bf3cf2a4d_JaffaCakes118.exe" de758ba3ded003b5c88c499bf3cf2a4d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avpupdt = "C:\\Windows\\system32\\1802395716\\avgupdt.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmon = "C:\\Windows\\SysWOW64\\1802395716\\lsass.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avpupdt = "C:\\Windows\\system32\\1802395716\\avgupdt.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmon = "C:\\Windows\\SysWOW64\\1802395716\\lsass.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avpupdt = "C:\\Windows\\system32\\1802395716\\avgupdt.exe" lsass.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File created C:\Windows\SysWOW64\1802395716\avgupdt.exe lsass.exe File opened for modification C:\Windows\SysWOW64\1802395716\avgupdt.exe lsass.exe File opened for modification C:\Windows\SysWOW64\1802395716 lsass.exe File opened for modification C:\Windows\SysWOW64\1802395716\lsass.exe lsass.exe File created C:\Windows\SysWOW64\1802395716\lsass.exe de758ba3ded003b5c88c499bf3cf2a4d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\1802395716\lsass.exe de758ba3ded003b5c88c499bf3cf2a4d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\1802395716\lsass.exe lsass.exe File opened for modification C:\Windows\SysWOW64\1802395716 lsass.exe File created C:\Windows\SysWOW64\1802395716\lsass.exe lsass.exe File created C:\Windows\SysWOW64\1802395716\avgupdt.exe lsass.exe File created C:\Windows\SysWOW64\1802395716\lsass.exe lsass.exe File created C:\Windows\SysWOW64\1802395716\avgupdt.exe lsass.exe File opened for modification C:\Windows\SysWOW64\1802395716\avgupdt.exe lsass.exe File created C:\Windows\SysWOW64\1802395716\avgupdt.exe de758ba3ded003b5c88c499bf3cf2a4d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\1802395716\avgupdt.exe de758ba3ded003b5c88c499bf3cf2a4d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\1802395716\avgupdt.exe lsass.exe File opened for modification C:\Windows\SysWOW64\1802395716 de758ba3ded003b5c88c499bf3cf2a4d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\1802395716 lsass.exe File created C:\Windows\SysWOW64\1802395716\lsass.exe lsass.exe File opened for modification C:\Windows\SysWOW64\1802395716\lsass.exe lsass.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de758ba3ded003b5c88c499bf3cf2a4d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ de758ba3ded003b5c88c499bf3cf2a4d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 404 wrote to memory of 4972 404 de758ba3ded003b5c88c499bf3cf2a4d_JaffaCakes118.exe 85 PID 404 wrote to memory of 4972 404 de758ba3ded003b5c88c499bf3cf2a4d_JaffaCakes118.exe 85 PID 404 wrote to memory of 4972 404 de758ba3ded003b5c88c499bf3cf2a4d_JaffaCakes118.exe 85 PID 4972 wrote to memory of 1992 4972 lsass.exe 86 PID 4972 wrote to memory of 1992 4972 lsass.exe 86 PID 4972 wrote to memory of 1992 4972 lsass.exe 86 PID 1992 wrote to memory of 1652 1992 lsass.exe 87 PID 1992 wrote to memory of 1652 1992 lsass.exe 87 PID 1992 wrote to memory of 1652 1992 lsass.exe 87 PID 1652 wrote to memory of 2984 1652 lsass.exe 88 PID 1652 wrote to memory of 2984 1652 lsass.exe 88 PID 1652 wrote to memory of 2984 1652 lsass.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\de758ba3ded003b5c88c499bf3cf2a4d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\de758ba3ded003b5c88c499bf3cf2a4d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\1802395716\lsass.exe"C:\Windows\system32\1802395716\lsass.exe" -fake2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\1802395716\lsass.exe"C:\Windows\system32\1802395716\lsass.exe" -fake3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\1802395716\lsass.exe"C:\Windows\system32\1802395716\lsass.exe" -fake4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\1802395716\lsass.exe"C:\Windows\system32\1802395716\lsass.exe" -fake5⤵
- Executes dropped EXE
PID:2984
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5de758ba3ded003b5c88c499bf3cf2a4d
SHA1c5e2f05c5d988a71ed813300e709e09b81abb181
SHA256562df1e59c300a112d2e6368376bfc601d9e4b7a92a6a9633e1b4eb717b1ae75
SHA512e4151bc38a3c06fa45e156178de01d4c5202eb60b331a2e71bede47fa219c74edb498381bf336be5479166161be67c2cc99c348a7cb49340df3d5f7463cb2899
-
Filesize
176B
MD53ee0109233983a91d5ae17d38a5b9ab8
SHA17e78719bca2e01075a2ba11c9950c1e9106071b7
SHA256fc2cea1ccdfcc51650abe6907145700cd23e136a464ffadbb96d6f9f828b9db6
SHA5120f3a80bfac169c8b94d0713ce2fcd5c2a16e40b4ecbb777c3e9ee459ae131894a44fdcaa4694588c62c2c42fd7a3365e46b156d961b92340ad535c500db82fee