Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 14:21
Static task
static1
Behavioral task
behavioral1
Sample
eb840ccdab283227762c1b097063f278_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb840ccdab283227762c1b097063f278_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb840ccdab283227762c1b097063f278_JaffaCakes118.exe
-
Size
34KB
-
MD5
eb840ccdab283227762c1b097063f278
-
SHA1
311561e8904ee0aaabc9544d0e6f65ce68a14f97
-
SHA256
83005a3a661280203721cd5be27261aae7973497fea01a3c93717e14a44e7688
-
SHA512
ba5e74a165f2330e79514a8930894d60c94ae46fdb164791bfdf31c6f5b92721c539b66359468f6d45b8951b6002e14efc5be0908b4080d5172dfc9743eb2d16
-
SSDEEP
768:mzQYScGrIubHuYtvdxwYHw5FAe2Qgncwx7:gQTIubHy5wQgf
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation eb840ccdab283227762c1b097063f278_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2924 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\655862b8\jusched.exe eb840ccdab283227762c1b097063f278_JaffaCakes118.exe File created C:\Program Files (x86)\655862b8\655862b8 eb840ccdab283227762c1b097063f278_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb840ccdab283227762c1b097063f278_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe 2924 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3448 wrote to memory of 2924 3448 eb840ccdab283227762c1b097063f278_JaffaCakes118.exe 82 PID 3448 wrote to memory of 2924 3448 eb840ccdab283227762c1b097063f278_JaffaCakes118.exe 82 PID 3448 wrote to memory of 2924 3448 eb840ccdab283227762c1b097063f278_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb840ccdab283227762c1b097063f278_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb840ccdab283227762c1b097063f278_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Program Files (x86)\655862b8\jusched.exe"C:\Program Files (x86)\655862b8\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
34KB
MD51fd0ff499a3662409b09d0fb7b7b44cd
SHA125964cc4f7a65493459384c0bf0812b3f11f2f55
SHA256a3fb8a807882d79d3b6a5c2726304387b473e1c257f0a8d03b3e463919d7867b
SHA5128b4706353e02e3bf55ca90fed22907d1b932a4d54369c1186529837441bd1a4f622be9439eb17f9bc883cbfafb0342f93080222cd9da3b0817c9c27c78295334