Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 05:55
Static task
static1
Behavioral task
behavioral1
Sample
fba33c4fd02d843d8c5ba13183438d16_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fba33c4fd02d843d8c5ba13183438d16_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fba33c4fd02d843d8c5ba13183438d16_JaffaCakes118.exe
-
Size
404KB
-
MD5
fba33c4fd02d843d8c5ba13183438d16
-
SHA1
792f663e417e213614346f4470cad73fcb74404c
-
SHA256
91d0fed9d4ffdce38cc0e93207008c63dca622e689c18592c7911ce64a813a43
-
SHA512
366ef325389935cbce72d18696567379571475b029a50854f930a5e3216ab8feed2084ae78f5ff6ba7a0cba4593016c1bb59c1b26f426c4b44b8d2dcd2dde8ba
-
SSDEEP
6144:JliLMpWQbFK5bw4khFr8hZCsHNODtZL/GGdWvTndYqCr38:KQb45bw7r8DC0RVbJCrs
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation fba33c4fd02d843d8c5ba13183438d16_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 4588 Magazine - BBC Electric Proms 2009 - mp4.exe 1900 7za.exe 1524 ic1.exe -
Loads dropped DLL 1 IoCs
pid Process 3472 fba33c4fd02d843d8c5ba13183438d16_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fba33c4fd02d843d8c5ba13183438d16_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Magazine - BBC Electric Proms 2009 - mp4.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4588 Magazine - BBC Electric Proms 2009 - mp4.exe 4588 Magazine - BBC Electric Proms 2009 - mp4.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3472 wrote to memory of 4588 3472 fba33c4fd02d843d8c5ba13183438d16_JaffaCakes118.exe 82 PID 3472 wrote to memory of 4588 3472 fba33c4fd02d843d8c5ba13183438d16_JaffaCakes118.exe 82 PID 3472 wrote to memory of 4588 3472 fba33c4fd02d843d8c5ba13183438d16_JaffaCakes118.exe 82 PID 3472 wrote to memory of 1900 3472 fba33c4fd02d843d8c5ba13183438d16_JaffaCakes118.exe 83 PID 3472 wrote to memory of 1900 3472 fba33c4fd02d843d8c5ba13183438d16_JaffaCakes118.exe 83 PID 3472 wrote to memory of 1900 3472 fba33c4fd02d843d8c5ba13183438d16_JaffaCakes118.exe 83 PID 3472 wrote to memory of 1524 3472 fba33c4fd02d843d8c5ba13183438d16_JaffaCakes118.exe 85 PID 3472 wrote to memory of 1524 3472 fba33c4fd02d843d8c5ba13183438d16_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\fba33c4fd02d843d8c5ba13183438d16_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fba33c4fd02d843d8c5ba13183438d16_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\Magazine - BBC Electric Proms 2009 - mp4.exe"C:\Users\Admin\AppData\Local\Temp\Magazine - BBC Electric Proms 2009 - mp4.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4588
-
-
C:\Users\Admin\AppData\Local\Temp\7za.exeC:\Users\Admin\AppData\Local\Temp\7za.exe x C:\Users\Admin\AppData\Local\Temp\a1.7z -aoa -oC:\Users\Admin\AppData\Local\Temp -plolmilf2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1900
-
-
C:\Users\Admin\AppData\Local\Temp\ic1.exe"C:\Users\Admin\AppData\Local\Temp\ic1.exe"2⤵
- Executes dropped EXE
PID:1524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
523KB
MD5e92604e043f51c604b6d1ac3bcd3a202
SHA14154dda4a1e2a5ed14303dc3d36f448953ff6d33
SHA256fa252e501332b7486a972e7e471cf6915daa681af35c6aa102213921093eb2a3
SHA512ef396d94d83fd7a588c6e645ea5fcfe24390440a03b3bf0ecd05ca6749fd3f9561dfafe725ee0edea51a34d52af26cd311e768aa72f75686cc796abee4757d43
-
Filesize
162KB
MD570b7c6e977a05ccd9ba2a3ada7d14bee
SHA10ff0986ba250e29dd68e76efb613dead3be0d5a6
SHA25683331dc150a4326c7b50cedfe9d61660f5e94d75809736a334f9f0b28b2933ac
SHA5124ebae7f4d01fd30cd72f39ae20a0e0ed4710159ec4d6822ac25aa28eaec7e89db414ee57cae7ff3c11cf691954d8d8e2755e03a8f1fd9f7def26eef0823448b3
-
Filesize
7KB
MD50e95182baf5543903f671c45bbf285f7
SHA11849a45389a30b0b714f880cfade0a88ee8a9a9b
SHA2564a964646ca0d6373c0280561053ac9cc6591c1ec7b3650834b87bef8a294dd04
SHA512c74bb13fa4904ed91a9a6e23091a057b329519440255c5fe90db67d382f46e78128715bb7458239bc4b7e0d36ddca7439eeff7cea9720d9121e09dfc8b1c06e4
-
Filesize
18KB
MD5b64b538899d4588a05d7d3db92918448
SHA1b2d0b29a9c69bac6b22f696474eb031cca664f9a
SHA256803abec016d53636f2817c972f2c769beb36501fc8bd30c73994958eb94cfb29
SHA512ba4732c7a25dfdd636009a5ec8597e233c7c2b736b9c08a07dce13de70d9e0e08652b7f323ab590a29b57da12bf6a347675b2103bdfef06a80dbfd555ad09727
-
Filesize
5KB
MD5a7cd6206240484c8436c66afb12bdfbf
SHA10bb3e24a7eb0a9e5a8eae06b1c6e7551a7ec9919
SHA25669ac56d2fdf3c71b766d3cc49b33b36f1287cc2503310811017467dfcb455926
SHA512b9ee7803301e50a8ec20ab3f87eb9e509ea24d11a69e90005f30c1666acc4ed0a208bd56e372e2e5c6a6d901d45f04a12427303d74761983593d10b344c79904