Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:39
Static task
static1
Behavioral task
behavioral1
Sample
ea840b610aa1636621be214c6502d3a0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea840b610aa1636621be214c6502d3a0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea840b610aa1636621be214c6502d3a0_JaffaCakes118.exe
-
Size
192KB
-
MD5
ea840b610aa1636621be214c6502d3a0
-
SHA1
106e244a768c44f29c336d9390b2c2c55e8f9c9b
-
SHA256
b035879968ec12f8e53cc472eed90a5e9200c0b08cbc2362eee9867903ade086
-
SHA512
269a69123bbdeeae26b655f1ae81e22e0e57cb7ef7e8adfd22daf20ae070c5d1e2f5e15a58f8ed512bc73d1a63762ef0350a99aa887dafcc12bcc8b870941fd8
-
SSDEEP
3072:t2hCMZRDoMZyQmELk/TlkOwyYElrn/gmw4/SeHnkyHTjFaGYO:taP3D1Zy5nZnlrn/bw4/SeHntHTjN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Easypic.bmp ea840b610aa1636621be214c6502d3a0_JaffaCakes118.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea840b610aa1636621be214c6502d3a0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mspaint.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3224 mspaint.exe 3224 mspaint.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3160 ea840b610aa1636621be214c6502d3a0_JaffaCakes118.exe 3160 ea840b610aa1636621be214c6502d3a0_JaffaCakes118.exe 3160 ea840b610aa1636621be214c6502d3a0_JaffaCakes118.exe 3224 mspaint.exe 3224 mspaint.exe 3224 mspaint.exe 3224 mspaint.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3160 wrote to memory of 1404 3160 ea840b610aa1636621be214c6502d3a0_JaffaCakes118.exe 82 PID 3160 wrote to memory of 1404 3160 ea840b610aa1636621be214c6502d3a0_JaffaCakes118.exe 82 PID 3160 wrote to memory of 1404 3160 ea840b610aa1636621be214c6502d3a0_JaffaCakes118.exe 82 PID 1404 wrote to memory of 3224 1404 cmd.exe 84 PID 1404 wrote to memory of 3224 1404 cmd.exe 84 PID 1404 wrote to memory of 3224 1404 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea840b610aa1636621be214c6502d3a0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea840b610aa1636621be214c6502d3a0_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\SysWOW64\cmd.execmd.exe /c start C:\Windows\Easypic.bmp2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Windows\Easypic.bmp"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3224
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:2648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
703KB
MD5ba38e31937cb8a34d2b91f53c308e5e1
SHA1f8a8426a7afc4d73cb74b35b0804e23db053e309
SHA256dbae1c247f764484a4bcbe60010caff85bab2fea4f469dc01da550fa26d3d313
SHA5125d6b57314774a5d74ea3a0a2eec05d57a830a43fc4c19ad8d287f03d96f9f10cd865e17300db451d6711eb471fd9a8476785ad15b030b6533488aba1d84e95de