Analysis
-
max time kernel
94s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 07:02
Static task
static1
Behavioral task
behavioral1
Sample
eacfc30298843ceb8c667c400582ee8b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eacfc30298843ceb8c667c400582ee8b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eacfc30298843ceb8c667c400582ee8b_JaffaCakes118.exe
-
Size
324KB
-
MD5
eacfc30298843ceb8c667c400582ee8b
-
SHA1
cec7685fba45ad46ac48aa093488496e5b8b9a1b
-
SHA256
1d32c6f43f551436d40b19a82bc54f121f379a171771f8d5aba8eae2768887d1
-
SHA512
392955c6044f2f622cb88f1fb483e498d4619294265b23716095e7445f4573e97e4f9cc2f535f62029e7628d70894cc74fe87b20675a9c3b94f2dbd11e7bb3a6
-
SSDEEP
1536:tOJVn4JLlfLJ0UYFqeXx57B4JN5eCD8SlNDSSvHFRiCCVGCWPaeSe+eooOoaoCoj:QV4JLlfLIl7B4JN5eI4A
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation eacfc30298843ceb8c667c400582ee8b_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation Del7CB2.tmp -
Deletes itself 1 IoCs
pid Process 2424 Del7CB2.tmp -
Executes dropped EXE 1 IoCs
pid Process 2424 Del7CB2.tmp -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\3323.vbs eacfc30298843ceb8c667c400582ee8b_JaffaCakes118.exe File opened for modification C:\WINDOWS\3323.vbs Del7CB2.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eacfc30298843ceb8c667c400582ee8b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Del7CB2.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "hao.thehh.info" eacfc30298843ceb8c667c400582ee8b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "hao.thehh.info" Del7CB2.tmp -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 436 wrote to memory of 2112 436 eacfc30298843ceb8c667c400582ee8b_JaffaCakes118.exe 82 PID 436 wrote to memory of 2112 436 eacfc30298843ceb8c667c400582ee8b_JaffaCakes118.exe 82 PID 436 wrote to memory of 2112 436 eacfc30298843ceb8c667c400582ee8b_JaffaCakes118.exe 82 PID 436 wrote to memory of 2424 436 eacfc30298843ceb8c667c400582ee8b_JaffaCakes118.exe 83 PID 436 wrote to memory of 2424 436 eacfc30298843ceb8c667c400582ee8b_JaffaCakes118.exe 83 PID 436 wrote to memory of 2424 436 eacfc30298843ceb8c667c400582ee8b_JaffaCakes118.exe 83 PID 2424 wrote to memory of 1620 2424 Del7CB2.tmp 84 PID 2424 wrote to memory of 1620 2424 Del7CB2.tmp 84 PID 2424 wrote to memory of 1620 2424 Del7CB2.tmp 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\eacfc30298843ceb8c667c400582ee8b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eacfc30298843ceb8c667c400582ee8b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\system32\wscript.exe" /nologo C:\WINDOWS\3323.vbs2⤵
- System Location Discovery: System Language Discovery
PID:2112
-
-
C:\Users\Admin\AppData\Local\Temp\Del7CB2.tmpC:\Users\Admin\AppData\Local\Temp\Del7CB2.tmp 736 "C:\Users\Admin\AppData\Local\Temp\eacfc30298843ceb8c667c400582ee8b_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\system32\wscript.exe" /nologo C:\WINDOWS\3323.vbs3⤵
- System Location Discovery: System Language Discovery
PID:1620
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
324KB
MD5eacfc30298843ceb8c667c400582ee8b
SHA1cec7685fba45ad46ac48aa093488496e5b8b9a1b
SHA2561d32c6f43f551436d40b19a82bc54f121f379a171771f8d5aba8eae2768887d1
SHA512392955c6044f2f622cb88f1fb483e498d4619294265b23716095e7445f4573e97e4f9cc2f535f62029e7628d70894cc74fe87b20675a9c3b94f2dbd11e7bb3a6
-
Filesize
266KB
MD51861b0d15a96f0eab78821ef09f11398
SHA19931aec4e49a4075ce680ae5e69069f506f4383c
SHA2560981eb96faa65fe1ea7afde1d97184d67970c06ed442919a1173b48e91ad5d54
SHA5122b49cf513a546e43040fe63f99adf1d4cd49510a65c04d68122e398c9e1687fd5b29094261cc5265d92b740e8ee9fad46994a97d32ce86222abc7669afd97415