Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 03:40
Static task
static1
Behavioral task
behavioral1
Sample
fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
fb6dbaf1a03527d3da835cb56e6b4267
-
SHA1
6b7b9f20b3d3e3274227524607f2fb13db857f8e
-
SHA256
6655aea7aaceb1b878caa3d0af776f2a373096e3a9e90b9c53d0b2c3e4d02932
-
SHA512
eb47d7bbe275799b1055f2856e4340f034296cf6924036cc49250ab526c5bb967c549b2fc08f65d66ea070f53fef62c7f41c87e18d18cc8bef406998ad681828
-
SSDEEP
49152:2cW4fg5dV56+WGHI2gum5Al98uTB6sSwT:2X4U6f2guXQsSwT
Malware Config
Extracted
socelars
http://www.zhxxjs.pw/Info/
http://www.allinfo.pw/
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.tmpdescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.tmp -
Processes:
resource yara_rule behavioral2/files/0x000700000002346a-16.dat upx behavioral2/memory/1920-21-0x0000000000400000-0x0000000000540000-memory.dmp upx behavioral2/memory/1920-22-0x0000000000400000-0x0000000000540000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Executes dropped EXE 2 IoCs
Processes:
fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.tmpDiskScan.exepid Process 1356 fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.tmp 1920 DiskScan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 3836 1920 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.exefb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.tmpDiskScan.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DiskScan.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.tmppid Process 1356 fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.tmp 1356 fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.tmppid Process 1356 fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.exefb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.tmpdescription pid Process procid_target PID 4156 wrote to memory of 1356 4156 fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.exe 82 PID 4156 wrote to memory of 1356 4156 fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.exe 82 PID 4156 wrote to memory of 1356 4156 fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.exe 82 PID 1356 wrote to memory of 1920 1356 fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.tmp 83 PID 1356 wrote to memory of 1920 1356 fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.tmp 83 PID 1356 wrote to memory of 1920 1356 fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.tmp 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\is-UPOO5.tmp\fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-UPOO5.tmp\fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.tmp" /SL5="$1B0054,1295727,809984,C:\Users\Admin\AppData\Local\Temp\fb6dbaf1a03527d3da835cb56e6b4267_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\DiskProtect190919\DiskScan.exe"C:\Users\Admin\AppData\Local\Temp\DiskProtect190919\DiskScan.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 11924⤵
- Program crash
PID:3836
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1920 -ip 19201⤵PID:4700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
565KB
MD5d97c08deaf8983bff067981637aabcb5
SHA116118b72a2fbc425266a226b6cdf9d1b143ea713
SHA256c4c26e50f05688c5a99ff761dcbb781dbaa37ef53da825620f4112af6c84b666
SHA51275116aff3e45b6e0b5ae334fd047bfc764853d117218eaf9b20d414318fa296bd7246bce4eda64269d779cd64648714bedcbdd8b6bc3afb96aa4dcb32b495f1d
-
Filesize
2.5MB
MD5f1a8d39557d542d14b37b96bcc280d6d
SHA11ebd5499f268960b0484c47a221af26daba36fc3
SHA256b03568a979662b32547007dfefc0d41188e1f4edfc306dfae7e13316f678d2ca
SHA51257600930ddd2ea845a60f1e5b767e7edb86d26ccf3569047474f57880d37f67afd4de017d9e59a5a894b7aadc575e26ede620f347b4851a52a901b8be5c9dd21