Analysis
-
max time kernel
95s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 07:09
Static task
static1
Behavioral task
behavioral1
Sample
ead2372ac5779d6737eb9fa6a766067a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ead2372ac5779d6737eb9fa6a766067a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ead2372ac5779d6737eb9fa6a766067a_JaffaCakes118.exe
-
Size
555KB
-
MD5
ead2372ac5779d6737eb9fa6a766067a
-
SHA1
6c604141cb6b03b9cad66b74078a9fbdf52b0aa5
-
SHA256
906a687ef5b9e577b1c35792cb5fc02d258f4508cf386be83ce26efd15648539
-
SHA512
d08b57aa43e0df06c0cc756584ad4dc6781d0c143c1faf4e89865a2d6629a96e7f98b17263668bb48f8530cdcc4848fafbf1be8bfb7c4d6a1d7e865174277af0
-
SSDEEP
12288:n5Ooq9fQ+qrcKHdy/pbAMTQDa8YYsv0ldgO:nIz9eAKkRbTTQW86vigO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation SetA77B.tmp -
Executes dropped EXE 2 IoCs
pid Process 2604 SetA77B.tmp 220 SmartInstaller.exe -
Loads dropped DLL 1 IoCs
pid Process 220 SmartInstaller.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ead2372ac5779d6737eb9fa6a766067a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SetA77B.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SmartInstaller.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz SmartInstaller.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SmartInstaller.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch SmartInstaller.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" SmartInstaller.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\IESettingSync SmartInstaller.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" SmartInstaller.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 220 SmartInstaller.exe 220 SmartInstaller.exe 220 SmartInstaller.exe 220 SmartInstaller.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 964 wrote to memory of 2604 964 ead2372ac5779d6737eb9fa6a766067a_JaffaCakes118.exe 82 PID 964 wrote to memory of 2604 964 ead2372ac5779d6737eb9fa6a766067a_JaffaCakes118.exe 82 PID 964 wrote to memory of 2604 964 ead2372ac5779d6737eb9fa6a766067a_JaffaCakes118.exe 82 PID 2604 wrote to memory of 220 2604 SetA77B.tmp 83 PID 2604 wrote to memory of 220 2604 SetA77B.tmp 83 PID 2604 wrote to memory of 220 2604 SetA77B.tmp 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ead2372ac5779d6737eb9fa6a766067a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ead2372ac5779d6737eb9fa6a766067a_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\SetA77B.tmp"C:\Users\Admin\AppData\Local\Temp\SetA77B.tmp"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\PartyPoker.it_Installer\SmartInstaller.exe"C:\Users\Admin\AppData\Local\Temp\PartyPoker.it_Installer\SmartInstaller.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:220
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD54a3f1052237bd361f8f608ee944db1ed
SHA1e2b14766ce9b4efc252596a27a0ac50779d830b4
SHA25630d63f9a677c65bfbb99f6de7f9127cd0bff16c4b4032e281410b926380b90ab
SHA512ae2107761c89bc944b308197caff1add0851b0eea54b78eb5ba0780daaf3561c562f12b885dcb9d4e6bcff5b7d82b0a936a7ee65f6b797061dabc2a76434cc0e
-
Filesize
1KB
MD53f73662367e12e4a0c083e57ea7295d2
SHA1086256aec26fdbc77bdcf1fe33b1743c0700d9dc
SHA256cf511ff6c8103ac4863a6807c990ca636fb8d9ae94496e0bb4180cb764acdcb8
SHA5121ea899e739e632f0ed04540afedb7037e4ee7620bf915e8dfd2d7d2a492d41cc73a6fb67ff9af781419b31dbf6e57232972903a26c568430096dec92ea17a645
-
Filesize
7KB
MD5d05a3df7fef0a46af46e39c74dd33fd1
SHA178c74d19e9dda8ac75d418fcda3ebd1e0f10c898
SHA256c095fe5753c76fdf3ec8d9750861c963fcb0eefacca87de8b2786a0960de341e
SHA512c808d2ec184d6d32205e1e6164aee18024de5fb3d6cbad70cd56cf96d4674fb3c21f46e6628940cbf12c2bd2d7d3410ebba6656e1497711bed4997f470baf311
-
Filesize
99KB
MD5edf6a7dda2d8f879a042ef0fd0095368
SHA1feb08049acfeedf5dfd3db257c948a0213ba3e84
SHA256480ed2b18683d03228b8e5193c9efb9f4476fe529eddfd07596c66c289734865
SHA512c4eae6f47a98414eff74bf7af2cf76feba950ec5619253c2e629550bb8b9fa2e179d5948cfdb6932bdf4a86246b0364df55c124a9e0ee81b9dcd2e86090e2552
-
Filesize
645KB
MD53911ad8b535e9dc396ee19d68b056c9b
SHA1c429c8290d824d52d9228c5249ba3f21103750d7
SHA2565c3f19400a73a9fe33f9cedfd2a88d4678312c757f440cf0fd532240fc80ffa7
SHA51236406eb539ecbf9c684e44728b3315c3e6a4074ddab15d79aeb8b1349e036dc54767dd1ddca9af22356c06fa70bdb4046af9e9aba1bf6fc510039fd0bbbb681c
-
Filesize
52KB
MD54965107d112666d3835308a831a29274
SHA150439b99ce525ecb74c554e1dc43ddb39481dfa4
SHA256105280995cd5746078d67b8651dfe4ad2abcd532d7ad528d3100c535b0b538af
SHA51238fa8f0eeadd75bf212eaab458833cfd3445d00f3d77f1f8a86b7c3ba99376231c8b3fc3cfdff6f02f2ca9c90956c76f9055717712d35a7ca7b30172a0010b59
-
Filesize
521KB
MD537979f6da3c6b86244c16c7eac16cfa3
SHA1a4f20516c89093ffbdd097aa613b30fe9902c572
SHA256c84445e1bedccd19afa08eb3c6165a74ffa25f7da9ff7a9a4e6b7107b8ac7e60
SHA512e67d795106ba4c4300b41a3c4a5686e602139ce8190ef1719a8fd39e5cbcdf12a9437ab023694843690d355d09288d117527e57fec61d8d09c9f95aef228212c