Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 21:54
Static task
static1
Behavioral task
behavioral1
Sample
f6edd0eac50f2a0efd32bff77c3af7c7_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f6edd0eac50f2a0efd32bff77c3af7c7_JaffaCakes118.exe
-
Size
903KB
-
MD5
f6edd0eac50f2a0efd32bff77c3af7c7
-
SHA1
4776b641c07d6320b5657e3e14dfaec2c3ef120a
-
SHA256
18e730c58a9d2c93e49fa190c3443891e8015f680985a84e7e811790bee24965
-
SHA512
889cc71cd5de0eca2cab5d83aade9734807d30c237dcbbea26e24ea6d2c6cb4c40ce3c501c4ab3084ca16b256c12fff05b6193e53df55198c9bf418b546aa73b
-
SSDEEP
24576:tAHnh+eWsN3skA4RV1Hom2KXMmHa8TmwHV5:Mh+ZkldoPK8Ya8TmU
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 36 4264 WScript.exe 42 4264 WScript.exe 44 4264 WScript.exe 49 4264 WScript.exe 50 4264 WScript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation f6edd0eac50f2a0efd32bff77c3af7c7_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.js f6edd0eac50f2a0efd32bff77c3af7c7_JaffaCakes118.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6edd0eac50f2a0efd32bff77c3af7c7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings f6edd0eac50f2a0efd32bff77c3af7c7_JaffaCakes118.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 868 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2468 wrote to memory of 4264 2468 f6edd0eac50f2a0efd32bff77c3af7c7_JaffaCakes118.exe 90 PID 2468 wrote to memory of 4264 2468 f6edd0eac50f2a0efd32bff77c3af7c7_JaffaCakes118.exe 90 PID 2468 wrote to memory of 4264 2468 f6edd0eac50f2a0efd32bff77c3af7c7_JaffaCakes118.exe 90 PID 4264 wrote to memory of 868 4264 WScript.exe 91 PID 4264 wrote to memory of 868 4264 WScript.exe 91 PID 4264 wrote to memory of 868 4264 WScript.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6edd0eac50f2a0efd32bff77c3af7c7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6edd0eac50f2a0efd32bff77c3af7c7_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops startup file
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.js"2⤵
- Blocklisted process makes network request
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.js3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5ee4ec8513de7ae050c9bb51431a187ee
SHA105a2d86a1f73ebc5911cdcef1a95f146bdb08243
SHA256661f52553c374d882dbcd5e8b1c7cbe8431e31a56b619b080348dd7e1de46e6d
SHA512a7d015deea0091296f2da9cd63d4aa4cffa05c66bca6be0908a87b39fe4664cbbedd19f4ae4201a0426f231afdc64f0d62864421574ecf3ac878752e63b00307