Analysis
-
max time kernel
126s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 18:16
Static task
static1
Behavioral task
behavioral1
Sample
f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe
-
Size
628KB
-
MD5
f696461ab20b3204f0686bc1babc1a74
-
SHA1
41a7a82f43f75db42c10a12e446fe4d6b8135ce8
-
SHA256
5b9fc60b9f7f549073beb0e9f150b7e8b9d182a4e1e33fef4c45e22b174364ad
-
SHA512
e983a6a737de67653d53448da77e3c75bdcb4d3008a09edf65503bf43dc25d79b9b2f3ff3b388b755b7886da1db7c7d3e4b2dac7fb98b61f38def8ebb935a3bd
-
SSDEEP
6144:R8nal5ONsZ1XX8Ni7wa5GJcibpAlXlrCDJG6dgXoqG4VuvQNIyvx9Gkqbg:qal5OM1H8NNQGJ7dAjsVE6wpNIyDGt
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3128 Exporer32.exe 2056 Exporer32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4992 2056 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Exporer32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA} f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ = "Sync root make available online verb" f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InProcServer32 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InProcServer32\ = "C:\\Windows\\SysWOW64\\shell32.dll" f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InProcServer32\ThreadingModel = "Apartment" f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1772 wrote to memory of 3128 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 89 PID 1772 wrote to memory of 3128 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 89 PID 1772 wrote to memory of 3128 1772 f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe 89 PID 3128 wrote to memory of 2056 3128 Exporer32.exe 90 PID 3128 wrote to memory of 2056 3128 Exporer32.exe 90 PID 3128 wrote to memory of 2056 3128 Exporer32.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f696461ab20b3204f0686bc1babc1a74_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\Exporer32.exe"C:\Users\Admin\AppData\Local\Temp\Exporer32.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\Exporer32.exeStubPath3⤵
- Executes dropped EXE
PID:2056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 4604⤵
- Program crash
PID:4992
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2056 -ip 20561⤵PID:1676
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4048,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=4460 /prefetch:81⤵PID:1728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD52d8b9da737682b88d733dd22a9851e48
SHA10aad0bd464d36ca3ea1a68f43d05cc32408df4df
SHA25682686f2f9420319d2d7c838ee8c33cfa29121f7c2f05ef080bf3a0598ea4cfec
SHA51245d307bcbd20b4ec0f89817f098d2cef085ffbaeb4ce651960a5b5db9ad438c145e8dcd602b5e4a8441acc312572cda96ef384ccc6a503cd4d3f486e7fba00ec