Analysis
-
max time kernel
93s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:13
Static task
static1
Behavioral task
behavioral1
Sample
ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe
-
Size
196KB
-
MD5
ea7adddaab831ed5adb649427ed208b9
-
SHA1
21b80e11adf4b78f71a41ccd7dbad4de6a729910
-
SHA256
3fc702bd7d98fd6548ea0e425082c331138eaedd24e16eb89dc249849f3b89b9
-
SHA512
2a2a3618798f438e2c98abc439359d382871e2cac83e466a8c35d9ac85be3b8c3756e7d5f0087f6c1625585c662e00c97f1e50809bc22171be5d31e3678b066a
-
SSDEEP
3072:IZLvq8JxIKltUUP0ZJBeDkO2tg24BkeDkO2tg24BqWg11DOH6kzvVpWhf4BCJaA4:cxVltUUPCg/bH/baGpWhQnJ0/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation mscn.exe -
Executes dropped EXE 1 IoCs
pid Process 1556 mscn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Update = "C:\\Users\\Admin\\AppData\\Local\\mscn.exe" ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings mscn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2480 ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe Token: 33 2480 ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2480 ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe Token: SeDebugPrivilege 1556 mscn.exe Token: 33 1556 mscn.exe Token: SeIncBasePriorityPrivilege 1556 mscn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2480 ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe 1556 mscn.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2480 wrote to memory of 1556 2480 ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe 82 PID 2480 wrote to memory of 1556 2480 ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe 82 PID 2480 wrote to memory of 1556 2480 ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe 82 PID 1556 wrote to memory of 4484 1556 mscn.exe 83 PID 1556 wrote to memory of 4484 1556 mscn.exe 83 PID 1556 wrote to memory of 4484 1556 mscn.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea7adddaab831ed5adb649427ed208b9_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\mscn.exe"C:\Users\Admin\AppData\Local\mscn.exe" ONCE2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\PAYMENT COPY.txt3⤵
- System Location Discovery: System Language Discovery
PID:4484
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD5ea7adddaab831ed5adb649427ed208b9
SHA121b80e11adf4b78f71a41ccd7dbad4de6a729910
SHA2563fc702bd7d98fd6548ea0e425082c331138eaedd24e16eb89dc249849f3b89b9
SHA5122a2a3618798f438e2c98abc439359d382871e2cac83e466a8c35d9ac85be3b8c3756e7d5f0087f6c1625585c662e00c97f1e50809bc22171be5d31e3678b066a