Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 22:21
Static task
static1
Behavioral task
behavioral1
Sample
e1275e4f624ffb14752823c819e03bed_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1275e4f624ffb14752823c819e03bed_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e1275e4f624ffb14752823c819e03bed_JaffaCakes118.exe
-
Size
104KB
-
MD5
e1275e4f624ffb14752823c819e03bed
-
SHA1
543c08d8d9768a17b59f5c8b58756f55d8fb069e
-
SHA256
206e24eb762399555a6901c5c40b2b0d4e6a151a3e2da5564b9cd222559ba0b2
-
SHA512
8c29709d1bab5f2a2956107eb017135d5a7b4e1d5eb33411bca39cb39ebdf2e06b7001ed7611df2c0ad67016d02d43c9635c622ad53246c4dc5c6b99c6cbe3c9
-
SSDEEP
1536:aoGBRBV2wn4h17HxxVEFSQAJs8m9RERgRcRHRQRZkjjE3JGX2WGH4dFkSJLMktBZ:zG9cu27x+FlA2wgZ5z4CY
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation e1275e4f624ffb14752823c819e03bed_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3100 twkueb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1275e4f624ffb14752823c819e03bed_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language twkueb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2576 e1275e4f624ffb14752823c819e03bed_JaffaCakes118.exe 3100 twkueb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2576 wrote to memory of 3100 2576 e1275e4f624ffb14752823c819e03bed_JaffaCakes118.exe 90 PID 2576 wrote to memory of 3100 2576 e1275e4f624ffb14752823c819e03bed_JaffaCakes118.exe 90 PID 2576 wrote to memory of 3100 2576 e1275e4f624ffb14752823c819e03bed_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1275e4f624ffb14752823c819e03bed_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1275e4f624ffb14752823c819e03bed_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\twkueb.exe"C:\Users\Admin\twkueb.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD59126f915a25bd97e78f38f6254f841a0
SHA1b9e5890cfb61b467c7be4fada5953c7e6e19721a
SHA2567dd0a14fd45ae40d6f96c8573e3f3333f4c2ea25b120f43e049f9675b630f319
SHA5129567ebbf89a61449aa92488ac4b38aefef95daa9ee3181d597cc9dcb8c13f491193d5df495e3e477b2b956626ef37388219f76402a4a6eddf7e0f1b340dc5d02