Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 14:46
Static task
static1
Behavioral task
behavioral1
Sample
f63dd470b2658cae1772828fd1f5b252_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f63dd470b2658cae1772828fd1f5b252_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f63dd470b2658cae1772828fd1f5b252_JaffaCakes118.exe
-
Size
196KB
-
MD5
f63dd470b2658cae1772828fd1f5b252
-
SHA1
48a8c6ee5e1d20d141ea10948a2e01366fa65c67
-
SHA256
ccdb941fb889bb96b74297126bd885defdb1310c22e69dd4404ab78216375577
-
SHA512
51b20a1ace3db56c227050c347f83ff78e225b1d7175e1c2ca85c7e2ae1573c2fe1cf23f205e6df0026f8c7ae6b34bd3f16efe707f3f0b38ad949587ae4276dd
-
SSDEEP
1536:RXs9wrnUh4d7ygVpn0uv77P11gqu87hhofg7dB/y:RXYw4+dGgLn0sP11gqPofgRty
Malware Config
Extracted
Protocol: ftp- Host:
ftp.alizametal.com.tr - Port:
21 - Username:
alizametal.com.tr - Password:
hd611
Extracted
Protocol: ftp- Host:
ftp.yesimcopy.com - Port:
21 - Username:
yesimcopy1 - Password:
825cyf
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation f63dd470b2658cae1772828fd1f5b252_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2756 jusched.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\43c0207a\jusched.exe f63dd470b2658cae1772828fd1f5b252_JaffaCakes118.exe File created C:\Program Files (x86)\43c0207a\43c0207a f63dd470b2658cae1772828fd1f5b252_JaffaCakes118.exe File created C:\Program Files (x86)\43c0207a\info_a f63dd470b2658cae1772828fd1f5b252_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job f63dd470b2658cae1772828fd1f5b252_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f63dd470b2658cae1772828fd1f5b252_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4420 wrote to memory of 2756 4420 f63dd470b2658cae1772828fd1f5b252_JaffaCakes118.exe 86 PID 4420 wrote to memory of 2756 4420 f63dd470b2658cae1772828fd1f5b252_JaffaCakes118.exe 86 PID 4420 wrote to memory of 2756 4420 f63dd470b2658cae1772828fd1f5b252_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\f63dd470b2658cae1772828fd1f5b252_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f63dd470b2658cae1772828fd1f5b252_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Program Files (x86)\43c0207a\jusched.exe"C:\Program Files (x86)\43c0207a\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD56ff89798e0e63d75115c777af43a2cd9
SHA1e8b994ccbbe64951afe91fc3dd377f88fe6c9ba8
SHA2563b3947957c6e0abb19d91b256521bdb3826d88d9b7b53995e177a58cebf0d479
SHA51246557f9bf6f5c5b3316891a9b623a7d11d8d8ff1973ca84cfbcf8d898746f2dbded7fee837c9a70c2e36f9b46a357fe2ba53585bf5307950d2fef6ee1dcb28a3
-
Filesize
12B
MD5599f593ce65d372c4323de6ce6bf2c53
SHA13047d05a3295763a07338be7481b594635d8b4c1
SHA25669cd5db26918a6be74f92b4ceda778cc10b4dffab4d70fee3ca0d72f00803400
SHA512473faa1fdd5e3bb6b5d3c84380e68c425f23f2d97a7a74d211f47799431a2f2d994bfc43010837f2a06fa9c2e61da2b7e8806075dd2e19e008873a4900dd407d
-
Filesize
196KB
MD5bd6822141acf65afdba099e1e401fff6
SHA11305e6b78f06620e962cebc80299f9761256bda5
SHA256cc08323696df8df833fbe7c2fb4ce9ad5cd3718390e7e1735c846fd3a930d457
SHA512d86124c7af51e0139c2a9fc431355c09bd89e115278eb2b3be5508a17207f063a4feed80b51f36d1e186ea597bc694efe5adcdb9b63bf6793a508cc08df79179