Analysis
-
max time kernel
133s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:31
Static task
static1
Behavioral task
behavioral1
Sample
eaad4d6b2d66f87160215d32100ff63b_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eaad4d6b2d66f87160215d32100ff63b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eaad4d6b2d66f87160215d32100ff63b_JaffaCakes118.exe
-
Size
14KB
-
MD5
eaad4d6b2d66f87160215d32100ff63b
-
SHA1
cfa86fa8d88f447fb7d0e79db9c51091ee3f7ce8
-
SHA256
a19167c5eb4ac1338105d7597d6c4fc212a0bc5acbe03fee16c99d9449c8b620
-
SHA512
216d31c397b5640cfcb6eef119b0181bde1546637c5172b8fc6b7f2d1727d0819fc03054cfc2ceac6eee293270cbe50b6cb4a6a8354a76ecca1096e639c52ad5
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhW2:hDXWipuE+K3/SSHgxc2
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation DEMECB.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation DEM6519.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation DEMBC32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation eaad4d6b2d66f87160215d32100ff63b_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation DEM60F7.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation DEMB84F.exe -
Executes dropped EXE 6 IoCs
pid Process 224 DEM60F7.exe 1052 DEMB84F.exe 1908 DEMECB.exe 3168 DEM6519.exe 3432 DEMBC32.exe 1540 DEM131C.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMB84F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMECB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM6519.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMBC32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM131C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaad4d6b2d66f87160215d32100ff63b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM60F7.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 232 wrote to memory of 224 232 eaad4d6b2d66f87160215d32100ff63b_JaffaCakes118.exe 98 PID 232 wrote to memory of 224 232 eaad4d6b2d66f87160215d32100ff63b_JaffaCakes118.exe 98 PID 232 wrote to memory of 224 232 eaad4d6b2d66f87160215d32100ff63b_JaffaCakes118.exe 98 PID 224 wrote to memory of 1052 224 DEM60F7.exe 102 PID 224 wrote to memory of 1052 224 DEM60F7.exe 102 PID 224 wrote to memory of 1052 224 DEM60F7.exe 102 PID 1052 wrote to memory of 1908 1052 DEMB84F.exe 104 PID 1052 wrote to memory of 1908 1052 DEMB84F.exe 104 PID 1052 wrote to memory of 1908 1052 DEMB84F.exe 104 PID 1908 wrote to memory of 3168 1908 DEMECB.exe 106 PID 1908 wrote to memory of 3168 1908 DEMECB.exe 106 PID 1908 wrote to memory of 3168 1908 DEMECB.exe 106 PID 3168 wrote to memory of 3432 3168 DEM6519.exe 108 PID 3168 wrote to memory of 3432 3168 DEM6519.exe 108 PID 3168 wrote to memory of 3432 3168 DEM6519.exe 108 PID 3432 wrote to memory of 1540 3432 DEMBC32.exe 110 PID 3432 wrote to memory of 1540 3432 DEMBC32.exe 110 PID 3432 wrote to memory of 1540 3432 DEMBC32.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaad4d6b2d66f87160215d32100ff63b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaad4d6b2d66f87160215d32100ff63b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\DEM60F7.exe"C:\Users\Admin\AppData\Local\Temp\DEM60F7.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\DEMB84F.exe"C:\Users\Admin\AppData\Local\Temp\DEMB84F.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\DEMECB.exe"C:\Users\Admin\AppData\Local\Temp\DEMECB.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\DEM6519.exe"C:\Users\Admin\AppData\Local\Temp\DEM6519.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\DEMBC32.exe"C:\Users\Admin\AppData\Local\Temp\DEMBC32.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\DEM131C.exe"C:\Users\Admin\AppData\Local\Temp\DEM131C.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1540
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3908,i,8231329449558834090,4540802069600791165,262144 --variations-seed-version --mojo-platform-channel-handle=4128 /prefetch:81⤵PID:3684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD53bc4ef81448e4270340b6ca760cb4b59
SHA1aeca4a98f8b5eff1b382af5ca6b18ce9aa4e6607
SHA256d2501ab10deaf074d1640e63a2da92115e10d40cfd301651c590751ad0f55f7c
SHA5121dd4206eea8d9c7e41192fd5bebc2cb2dcc06245629401aac504831e2b82256be63c2d00269457bbda1cf676b402c6bc79cbe8bed7b2d7082ae0e5e11d3f3a14
-
Filesize
14KB
MD5fb6c168c6527a6c5ee2a16ff8e7ee739
SHA1ae569af7ebb11517c52beed545feb196b92ad142
SHA2561e455ae2de2438986d2462de2d34b3c409f853449d5e68095a6ca53e573b7bf5
SHA512f028d9851d9ac745905f80b67019a92ee73a231091da4cf4d25075791315672c0f4a190c798a2286de95cec924eed7854ce890e052c81e744dfc9fd1c6f36dec
-
Filesize
14KB
MD5b6b0a8835cd22657d5851da219aab829
SHA10edd9dae27df876c30afe9237558da8b1f692499
SHA256c7363f45c4f1e5291f5fd778f3303e5bcdcaed049a34b1ae0bf3006af2809d06
SHA5123458ea6967df0f78da050b7e513e2576ee33d2c552f86bec59cc25c50c11fb2b5e5921f68c2cd5b1eeb5a237c4aa643cd0774618f710c28e31f30228b6fe5741
-
Filesize
14KB
MD5f5d3d6c46099a1759ac1d1f451de4ac3
SHA145e50c4d959d4a9f548d34e1e4627de0137e614e
SHA2567c70389b3d6c8aa492ba103a1e99976aead88a2ba531f3646dd74dc223ce8115
SHA51240aef5307a43c17a0aac76b84a8a7c56bfbfb0101511cb6568abef87637d3801a2470d798667967c877178c65b1e781dbe877a829f803b4af4572d4bb5d5f9a7
-
Filesize
14KB
MD5ba3e262f932b95e0caaa418a8a1cc5bf
SHA1361bd92e728c5626662576ed54b738f2fb242730
SHA2561396a79af3bd9115d8d726befe2947bd69e4f9cca035a5255f2819bb2d33d36d
SHA512446370060c3722a26325b15a01f601bf028b15cd9b578d4a12e57e5cdb881f9e8236c95c5a3dccc9b4a9187e81b22413fe9616c68c01b5c014ee2c5d76abebff
-
Filesize
14KB
MD5c145c0748371de3e6fae6fd1dba03f23
SHA1404318956f679494a770db19749fd2b86a27b5e9
SHA25697388161827853c2d78c19d578ff0e9164d0a4c591a5ef82f0a9ee366efc8b79
SHA5128bfd5d3da9b8ce0f6c4aff20cdade8fc9423927bf71f4b15cfc3d12f03c053bfb07c6dacc98d0e0fae78481223726acb8e0b18b6155cc744bc4570e7c395fc19