Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 07:54
Behavioral task
behavioral1
Sample
fa042e8a0d68b71d32f542f32867b540_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa042e8a0d68b71d32f542f32867b540_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fa042e8a0d68b71d32f542f32867b540_JaffaCakes118.exe
-
Size
840KB
-
MD5
fa042e8a0d68b71d32f542f32867b540
-
SHA1
47782c5a168077e676e1cb7cbcd5776d012544cd
-
SHA256
12869439e685998781384fdaf2c391675a364dc4bbcdd44123fe2d74f2852a61
-
SHA512
ea605a2585fbf464c32b18b6b03053edbf3082e4b82f1462feca62374eea1d27b8366962543783ec540e2ce8f5f6ad6dc9d57b8de63af5f76e80c069b1f34d73
-
SSDEEP
24576:jMq1NY2oyR2I7NlC/VG96r1/kGlVZshDhwd:wye/U9E19lPshwd
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops file in Windows directory 1 IoCs
Processes:
mspaint.exedescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
fa042e8a0d68b71d32f542f32867b540_JaffaCakes118.execmd.exemspaint.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa042e8a0d68b71d32f542f32867b540_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mspaint.exe -
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
mspaint.exepid process 3944 mspaint.exe 3944 mspaint.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
fa042e8a0d68b71d32f542f32867b540_JaffaCakes118.exemspaint.exepid process 3272 fa042e8a0d68b71d32f542f32867b540_JaffaCakes118.exe 3272 fa042e8a0d68b71d32f542f32867b540_JaffaCakes118.exe 3272 fa042e8a0d68b71d32f542f32867b540_JaffaCakes118.exe 3944 mspaint.exe 3944 mspaint.exe 3944 mspaint.exe 3944 mspaint.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
fa042e8a0d68b71d32f542f32867b540_JaffaCakes118.execmd.exedescription pid process target process PID 3272 wrote to memory of 4464 3272 fa042e8a0d68b71d32f542f32867b540_JaffaCakes118.exe cmd.exe PID 3272 wrote to memory of 4464 3272 fa042e8a0d68b71d32f542f32867b540_JaffaCakes118.exe cmd.exe PID 3272 wrote to memory of 4464 3272 fa042e8a0d68b71d32f542f32867b540_JaffaCakes118.exe cmd.exe PID 4464 wrote to memory of 3944 4464 cmd.exe mspaint.exe PID 4464 wrote to memory of 3944 4464 cmd.exe mspaint.exe PID 4464 wrote to memory of 3944 4464 cmd.exe mspaint.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa042e8a0d68b71d32f542f32867b540_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa042e8a0d68b71d32f542f32867b540_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3944
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:2492