Analysis
-
max time kernel
97s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 10:53
Static task
static1
Behavioral task
behavioral1
Sample
efa30cffbcb6f1ef76a52df64f1fcde7_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
efa30cffbcb6f1ef76a52df64f1fcde7_JaffaCakes118.exe
-
Size
769KB
-
MD5
efa30cffbcb6f1ef76a52df64f1fcde7
-
SHA1
fb6bb500fecee67baf2494faac26151f0d92d453
-
SHA256
e06c719999058b6eb01a0fee87a3baa7a543521e98390f00bbd1aa8129a7d522
-
SHA512
2c4ac69e29384edb14a3620f3084ba8f97b28cb8fc1f7395a67361557ec38d50655ab10fa0d7a927fe3df280a271343a2dc0b8d56639645b71a71a443a5a26b6
-
SSDEEP
24576:5MrldBZ+ycjx6r4tlXTFKfpXvZRRdmPo2S3:5MrlfZroLeXvmPoB
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation efa30cffbcb6f1ef76a52df64f1fcde7_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 384 Skype Flooder v3.0.exe 2000 Skype.exe 4620 Skype.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Wine Skype.exe Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Wine Skype.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efa30cffbcb6f1ef76a52df64f1fcde7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Skype Flooder v3.0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Skype.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 384 Skype Flooder v3.0.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4404 wrote to memory of 384 4404 efa30cffbcb6f1ef76a52df64f1fcde7_JaffaCakes118.exe 81 PID 4404 wrote to memory of 384 4404 efa30cffbcb6f1ef76a52df64f1fcde7_JaffaCakes118.exe 81 PID 4404 wrote to memory of 384 4404 efa30cffbcb6f1ef76a52df64f1fcde7_JaffaCakes118.exe 81 PID 4404 wrote to memory of 2000 4404 efa30cffbcb6f1ef76a52df64f1fcde7_JaffaCakes118.exe 82 PID 4404 wrote to memory of 2000 4404 efa30cffbcb6f1ef76a52df64f1fcde7_JaffaCakes118.exe 82 PID 4404 wrote to memory of 2000 4404 efa30cffbcb6f1ef76a52df64f1fcde7_JaffaCakes118.exe 82 PID 384 wrote to memory of 4620 384 Skype Flooder v3.0.exe 83 PID 384 wrote to memory of 4620 384 Skype Flooder v3.0.exe 83 PID 384 wrote to memory of 4620 384 Skype Flooder v3.0.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\efa30cffbcb6f1ef76a52df64f1fcde7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\efa30cffbcb6f1ef76a52df64f1fcde7_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\Skype Flooder v3.0.exe"C:\Users\Admin\AppData\Local\Temp\Skype Flooder v3.0.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\Skype.exeC:\Users\Admin\AppData\Local\Temp\Skype Flooder v3.0.exe3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:4620
-
-
-
C:\Users\Admin\AppData\Local\Temp\Skype.exe"C:\Users\Admin\AppData\Local\Temp\Skype.exe"2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:2000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD5866163b557e519b493cb5bd08c76c306
SHA1752495387fe55c2ac583d7b7c914f4bd2d566b45
SHA256a200e105e3029925089f217ad60ffab789b3f0b446d3014e59dee29f5c6a6dae
SHA5129feac03b8a398ef004b49760f7651a0a6443bc1ec1c7467fd8a2df4f8fc077d6fc464d981958942f8f0e308fff840d1230092c5b5f50b78eb22389d1cc4ceed7
-
Filesize
854KB
MD5b7f31116ac382b7664e3b9b987d8a991
SHA1c2daf6b78a621374e00d7750137a6454ecd8e5f3
SHA256e9c524d0ef86384d91ebf81fc0107a649d8d4f747734206ff19337cae38fddad
SHA512d02c17811e2357a2a2dc212f0f9b96f7af1aa98d0bdacf79bd3c946ff2bdc3a41af5915530910f773942b06b923759d7c53d2e3880924ab5bf0ccc2e2e122150