Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:17
Static task
static1
Behavioral task
behavioral1
Sample
ea7c119473ac99556c00728b0483702f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea7c119473ac99556c00728b0483702f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea7c119473ac99556c00728b0483702f_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
ea7c119473ac99556c00728b0483702f
-
SHA1
0418b45580cefe75eeeb05aa2d9d1a25769c2db6
-
SHA256
ef9755072c43bbec747bd1877a331f49e123b69ce81e72b1275cf961629f7b5e
-
SHA512
6c5ede9417d9213a57306f6dbaa58c0722be6149bd2537b5671a7e989f01f4986698eb0ec19b6b1d4a6972a4e30a943b4197061e140b4ee2bd1c36e2c4aa3584
-
SSDEEP
24576:qUWqist/YueXKn5b8IfSlyGP4UqBb5Z1a7t2yJVw3Gbr1XBeD:qUUlupJP/GhKza7tN9br1XC
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation ea7c119473ac99556c00728b0483702f_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4988 InstallProj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea7c119473ac99556c00728b0483702f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallProj.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4988 InstallProj.exe 4988 InstallProj.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1560 wrote to memory of 4988 1560 ea7c119473ac99556c00728b0483702f_JaffaCakes118.exe 82 PID 1560 wrote to memory of 4988 1560 ea7c119473ac99556c00728b0483702f_JaffaCakes118.exe 82 PID 1560 wrote to memory of 4988 1560 ea7c119473ac99556c00728b0483702f_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea7c119473ac99556c00728b0483702f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea7c119473ac99556c00728b0483702f_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\InstallProj.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\InstallProj.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
491KB
MD5fb964d230350eadda0a50e4d6b064ee5
SHA17df8f881a6874f0e8fb9e183635b1e450fb4ee69
SHA2569eda6fbeef8fe18f5b7fc8be31b167980fabe7bbdc24a968bb0dfe7bed7963a5
SHA512f986963cda7e57b2e2dc8bc90a9c4241afb0c7857bca4584d6ce5e5f27d062f00b07dc3dabc0f4546716747bbafbc92e7f06ab9f2e970733c04e5fcf45049792
-
Filesize
5KB
MD59fa757b4f4ede02c89e993170fad3312
SHA104f3fd416264e23c83bbeefad346e320322aa8e0
SHA256a659fc883c7cd1fbb27b6fb29d37dc860351dc98e52b0a08edcb953712cc7275
SHA5125cf47b77135c24ec40ea7ddf7797972450cc0477ce2367c72ef37899189746db4f83f70d42faaa7398c1f36f2fbf51b3248a89a0e744918045575988fc3fb456