Analysis
-
max time kernel
93s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 22:33
Static task
static1
Behavioral task
behavioral1
Sample
f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe
-
Size
146KB
-
MD5
f4a1a471691c36aa371295464b5482c5
-
SHA1
7bb69b619cfa281c60166bede7b22a0872738681
-
SHA256
7bc212272b8cf5e3abd1fe04a29aeae341553ab9b333798700b166cc294eb62f
-
SHA512
46d5e9496b8722a120a66382e11ccfa30e12b562828044647d8ed301a37768b9b34f370bdc158b963bacd6777bdedd2095a9f5e9e406ef3f45d8175e6e4bf858
-
SSDEEP
3072:AjDbOZg3wL70khr+yFt9bpJpvJlQz9Hck/:wOZd/lJbpz/QzRb/
Malware Config
Extracted
tofsee
64.20.54.234
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
Processes:
pcrfndm.exepcrfndm.exepid process 1856 pcrfndm.exe 4436 pcrfndm.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\pcrfndm.exe\" /r" f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exepcrfndm.exepcrfndm.exedescription pid process target process PID 3800 set thread context of 2604 3800 f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe PID 1856 set thread context of 4436 1856 pcrfndm.exe pcrfndm.exe PID 4436 set thread context of 4372 4436 pcrfndm.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3136 4372 WerFault.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pcrfndm.execmd.exesvchost.exef4a1a471691c36aa371295464b5482c5_JaffaCakes118.exef4a1a471691c36aa371295464b5482c5_JaffaCakes118.exepcrfndm.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pcrfndm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pcrfndm.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exef4a1a471691c36aa371295464b5482c5_JaffaCakes118.exepcrfndm.exepcrfndm.exedescription pid process target process PID 3800 wrote to memory of 2604 3800 f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe PID 3800 wrote to memory of 2604 3800 f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe PID 3800 wrote to memory of 2604 3800 f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe PID 3800 wrote to memory of 2604 3800 f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe PID 3800 wrote to memory of 2604 3800 f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe PID 3800 wrote to memory of 2604 3800 f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe PID 3800 wrote to memory of 2604 3800 f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe PID 3800 wrote to memory of 2604 3800 f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe PID 3800 wrote to memory of 2604 3800 f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe PID 2604 wrote to memory of 1856 2604 f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe pcrfndm.exe PID 2604 wrote to memory of 1856 2604 f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe pcrfndm.exe PID 2604 wrote to memory of 1856 2604 f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe pcrfndm.exe PID 1856 wrote to memory of 4436 1856 pcrfndm.exe pcrfndm.exe PID 1856 wrote to memory of 4436 1856 pcrfndm.exe pcrfndm.exe PID 1856 wrote to memory of 4436 1856 pcrfndm.exe pcrfndm.exe PID 1856 wrote to memory of 4436 1856 pcrfndm.exe pcrfndm.exe PID 1856 wrote to memory of 4436 1856 pcrfndm.exe pcrfndm.exe PID 1856 wrote to memory of 4436 1856 pcrfndm.exe pcrfndm.exe PID 1856 wrote to memory of 4436 1856 pcrfndm.exe pcrfndm.exe PID 1856 wrote to memory of 4436 1856 pcrfndm.exe pcrfndm.exe PID 1856 wrote to memory of 4436 1856 pcrfndm.exe pcrfndm.exe PID 4436 wrote to memory of 4372 4436 pcrfndm.exe svchost.exe PID 4436 wrote to memory of 4372 4436 pcrfndm.exe svchost.exe PID 4436 wrote to memory of 4372 4436 pcrfndm.exe svchost.exe PID 4436 wrote to memory of 4372 4436 pcrfndm.exe svchost.exe PID 4436 wrote to memory of 4372 4436 pcrfndm.exe svchost.exe PID 2604 wrote to memory of 4912 2604 f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe cmd.exe PID 2604 wrote to memory of 4912 2604 f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe cmd.exe PID 2604 wrote to memory of 4912 2604 f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f4a1a471691c36aa371295464b5482c5_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\pcrfndm.exe"C:\Users\Admin\pcrfndm.exe" /r3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\pcrfndm.exe"C:\Users\Admin\pcrfndm.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4372 -s 3206⤵
- Program crash
PID:3136
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6371.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4912
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4372 -ip 43721⤵PID:412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD507483ed1fe8e6772dc41958275c789cf
SHA1ac7aef6b6ec99f4abdc7a588bde977dbb19821ef
SHA2563f3eca4cd2c908052d61c77e9cc858479d9f21e172a41984c62bfc9351466097
SHA5120f13d9532763c5a02d6df5b891b39ea2baed2f0023467ef22f357454c4e42448f885326f8c1e6de9502c01569b4cd1fd9bc2bd24a5793d0f04eb31efd333ece1
-
Filesize
146KB
MD5f4a1a471691c36aa371295464b5482c5
SHA17bb69b619cfa281c60166bede7b22a0872738681
SHA2567bc212272b8cf5e3abd1fe04a29aeae341553ab9b333798700b166cc294eb62f
SHA51246d5e9496b8722a120a66382e11ccfa30e12b562828044647d8ed301a37768b9b34f370bdc158b963bacd6777bdedd2095a9f5e9e406ef3f45d8175e6e4bf858