Analysis
-
max time kernel
129s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 15:38
Static task
static1
Behavioral task
behavioral1
Sample
ede78b690c429d70a8e0c7c57fb42e96_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ede78b690c429d70a8e0c7c57fb42e96_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ede78b690c429d70a8e0c7c57fb42e96_JaffaCakes118.exe
-
Size
208KB
-
MD5
ede78b690c429d70a8e0c7c57fb42e96
-
SHA1
b87348ade98a93aa230bf669b9df633fbfe1fdc3
-
SHA256
65084092ad6ebba7a62d4dea9e70fedb51a95e4c0c143a69ee119036452a0f6f
-
SHA512
d04b631aca7aa7bff3c56757d54b4398bc04b9f6a73289ecdb5700a3ac79e55a787cbc52ed6a27f2d284f81de16d019477fe16a299ed2826901a65753153957d
-
SSDEEP
3072:bVHgCc4xGvbwcU9KQ2BBAHmaPxNVoab5E1:yCc4xGxWKQ2Bonxi
Malware Config
Extracted
Protocol: ftp- Host:
ftp.byethost12.com - Port:
21 - Username:
b12_8082975 - Password:
951753zx
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation ede78b690c429d70a8e0c7c57fb42e96_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2148 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\9dc9abfc\jusched.exe ede78b690c429d70a8e0c7c57fb42e96_JaffaCakes118.exe File created C:\Program Files (x86)\9dc9abfc\9dc9abfc ede78b690c429d70a8e0c7c57fb42e96_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job ede78b690c429d70a8e0c7c57fb42e96_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ede78b690c429d70a8e0c7c57fb42e96_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2148 2324 ede78b690c429d70a8e0c7c57fb42e96_JaffaCakes118.exe 86 PID 2324 wrote to memory of 2148 2324 ede78b690c429d70a8e0c7c57fb42e96_JaffaCakes118.exe 86 PID 2324 wrote to memory of 2148 2324 ede78b690c429d70a8e0c7c57fb42e96_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ede78b690c429d70a8e0c7c57fb42e96_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ede78b690c429d70a8e0c7c57fb42e96_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\9dc9abfc\jusched.exe"C:\Program Files (x86)\9dc9abfc\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD5134c1d489094d6d3399f65b0e9aebc1f
SHA1612a57fbe6ed3ab9c15b39451171d813314a28d5
SHA25654f9150d1268f7b4b83dd9fc3ec32274bf749715a5806ff3ca5262f5427d6781
SHA512b09bf60e4850d05261d81a124a647dd111f42480224eae8a3bd2f64736c38119953703f868ad34194a7ae6dad6aabff4081ba73df262bbe9f5327867c56a48ed
-
Filesize
208KB
MD5cfcea5d982407d5e229b3a535905c582
SHA181f12797904863ef4bf9e3ede697f1f203fce09a
SHA2567697da41b876672b90e65209025440c6806e0e9d372605dbbc2af7077018de74
SHA51257a7ccfc85f6621eb6b63326d7e7535eb46cb8a5a3742a8e8925cd7bd8aee8561cbbba3c5bcb67382b433aaaffa5da569fc67d53fbdc7b57da12100fa7503b2c