Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 14:21
Static task
static1
Behavioral task
behavioral1
Sample
eb84446224399d6d26dd324d0b31092b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb84446224399d6d26dd324d0b31092b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb84446224399d6d26dd324d0b31092b_JaffaCakes118.exe
-
Size
449KB
-
MD5
eb84446224399d6d26dd324d0b31092b
-
SHA1
4bfb1c14561cb9248a37b9998f02ea3939af0d45
-
SHA256
77be131f564e23d42003c5ccb3ba765e2ecc66d28b0087f3d5313cf2814fcf84
-
SHA512
cd1e31e48851026551b73a3c75ea9c21c60e7987881998dbcaa931d91d01e642d42215c1b90c38f3d19590864a26d00e0192357d894c9dd46fa9a56a59cdb9e9
-
SSDEEP
6144:0NF65XrsQF8FfevZRMPhIbHAtLh4IsuZCPHwI4Gdzi81AOLF:0NF65bvCF2zMybHTHwIpdm8RL
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation eb84446224399d6d26dd324d0b31092b_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 4704 АааССхххХЕtBmc.exe 2584 АааССхххХЕtBoc.exe 4736 АааССхххХЕtBoc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language АааССхххХЕtBoc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb84446224399d6d26dd324d0b31092b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language АааССхххХЕtBmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language АааССхххХЕtBoc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 4736 АааССхххХЕtBoc.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 3280 wrote to memory of 4704 3280 eb84446224399d6d26dd324d0b31092b_JaffaCakes118.exe 82 PID 3280 wrote to memory of 4704 3280 eb84446224399d6d26dd324d0b31092b_JaffaCakes118.exe 82 PID 3280 wrote to memory of 4704 3280 eb84446224399d6d26dd324d0b31092b_JaffaCakes118.exe 82 PID 4704 wrote to memory of 2584 4704 АааССхххХЕtBmc.exe 83 PID 4704 wrote to memory of 2584 4704 АааССхххХЕtBmc.exe 83 PID 4704 wrote to memory of 2584 4704 АааССхххХЕtBmc.exe 83 PID 2584 wrote to memory of 1204 2584 АааССхххХЕtBoc.exe 84 PID 2584 wrote to memory of 1204 2584 АааССхххХЕtBoc.exe 84 PID 2584 wrote to memory of 1204 2584 АааССхххХЕtBoc.exe 84 PID 2584 wrote to memory of 1204 2584 АааССхххХЕtBoc.exe 84 PID 2584 wrote to memory of 1204 2584 АааССхххХЕtBoc.exe 84 PID 2584 wrote to memory of 1204 2584 АааССхххХЕtBoc.exe 84 PID 2584 wrote to memory of 1204 2584 АааССхххХЕtBoc.exe 84 PID 2584 wrote to memory of 1204 2584 АааССхххХЕtBoc.exe 84 PID 2584 wrote to memory of 1204 2584 АааССхххХЕtBoc.exe 84 PID 2584 wrote to memory of 1204 2584 АааССхххХЕtBoc.exe 84 PID 2584 wrote to memory of 1204 2584 АааССхххХЕtBoc.exe 84 PID 2584 wrote to memory of 1204 2584 АааССхххХЕtBoc.exe 84 PID 2584 wrote to memory of 1204 2584 АааССхххХЕtBoc.exe 84 PID 2584 wrote to memory of 1204 2584 АааССхххХЕtBoc.exe 84 PID 2584 wrote to memory of 1204 2584 АааССхххХЕtBoc.exe 84 PID 2584 wrote to memory of 1204 2584 АааССхххХЕtBoc.exe 84 PID 2584 wrote to memory of 1204 2584 АааССхххХЕtBoc.exe 84 PID 4736 wrote to memory of 552 4736 АааССхххХЕtBoc.exe 95 PID 4736 wrote to memory of 552 4736 АааССхххХЕtBoc.exe 95 PID 4736 wrote to memory of 552 4736 АааССхххХЕtBoc.exe 95 PID 4736 wrote to memory of 552 4736 АааССхххХЕtBoc.exe 95 PID 4736 wrote to memory of 552 4736 АааССхххХЕtBoc.exe 95 PID 4736 wrote to memory of 552 4736 АааССхххХЕtBoc.exe 95 PID 4736 wrote to memory of 552 4736 АааССхххХЕtBoc.exe 95 PID 4736 wrote to memory of 552 4736 АааССхххХЕtBoc.exe 95 PID 4736 wrote to memory of 552 4736 АааССхххХЕtBoc.exe 95 PID 4736 wrote to memory of 552 4736 АааССхххХЕtBoc.exe 95 PID 4736 wrote to memory of 552 4736 АааССхххХЕtBoc.exe 95 PID 4736 wrote to memory of 552 4736 АааССхххХЕtBoc.exe 95 PID 4736 wrote to memory of 552 4736 АааССхххХЕtBoc.exe 95 PID 4736 wrote to memory of 552 4736 АааССхххХЕtBoc.exe 95 PID 4736 wrote to memory of 552 4736 АааССхххХЕtBoc.exe 95 PID 4736 wrote to memory of 552 4736 АааССхххХЕtBoc.exe 95 PID 4736 wrote to memory of 552 4736 АааССхххХЕtBoc.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb84446224399d6d26dd324d0b31092b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb84446224399d6d26dd324d0b31092b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\ProgramData\АааССхххХЕtBmc.exe"C:\ProgramData\АааССхххХЕtBmc.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Roaming\diskram\АааССхххХЕtBoc.exeC:\Users\Admin\AppData\Roaming\diskram\АааССхххХЕtBoc.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe4⤵PID:1204
-
-
-
-
C:\Users\Admin\AppData\Roaming\diskram\АааССхххХЕtBoc.exeC:\Users\Admin\AppData\Roaming\diskram\АааССхххХЕtBoc.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
449KB
MD5eb84446224399d6d26dd324d0b31092b
SHA14bfb1c14561cb9248a37b9998f02ea3939af0d45
SHA25677be131f564e23d42003c5ccb3ba765e2ecc66d28b0087f3d5313cf2814fcf84
SHA512cd1e31e48851026551b73a3c75ea9c21c60e7987881998dbcaa931d91d01e642d42215c1b90c38f3d19590864a26d00e0192357d894c9dd46fa9a56a59cdb9e9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2718105630-359604950-2820636825-1000\0f5007522459c86e95ffcc62f32308f1_32404286-a0b5-4a93-9620-6f13fd83251a
Filesize1KB
MD58c42ebf24aed787a7550ea2616b724f4
SHA1d6f79fce9ddc55e38babf5cf2c9564034bf01e07
SHA2562d3213241c959bda5700a499dc8d945c09669b59aff6bda5c6b45c943a5f39ec
SHA51285236fbc612852eb321f1e17c261cbcfbb065ac3ba44b3173d50b51847a2e5e8b57c58f2b497355bc064a82cd3c8321c280b8ed2980db23b04866cb74007bfd4