Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 12:45
Static task
static1
Behavioral task
behavioral1
Sample
fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe
-
Size
205KB
-
MD5
fe8e61ef43583c2d6a67c49f626c657c
-
SHA1
0f067362b6285e4858250c606c4d1587e4e41e72
-
SHA256
ca90cb41af3bd78fcfd594aa6e92ba713bc8f39928f577036f97b62b9f2a8be3
-
SHA512
6b8139d7c51c057c886d68e06998a0899756d81fb3cf9288c36accd1146c05213f7715b8e34ac9be2bb78f652ef67cd1282a7c57bbdbcaf39fa608038618eae1
-
SSDEEP
6144:JMmdbOsHCU8TCOXlUS9f6mLTjr5/FUv0A+YpYA9OTZIu:OISsHCU8T5f9imLndyv0A16Tv
Malware Config
Extracted
tofsee
94.75.255.140
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2912 oyssbax.exe 468 oyssbax.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\oyssbax.exe\" /r" fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4304 set thread context of 5032 4304 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 82 PID 2912 set thread context of 468 2912 oyssbax.exe 84 PID 468 set thread context of 3096 468 oyssbax.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 640 3096 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oyssbax.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oyssbax.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4304 wrote to memory of 5032 4304 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 82 PID 4304 wrote to memory of 5032 4304 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 82 PID 4304 wrote to memory of 5032 4304 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 82 PID 4304 wrote to memory of 5032 4304 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 82 PID 4304 wrote to memory of 5032 4304 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 82 PID 4304 wrote to memory of 5032 4304 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 82 PID 4304 wrote to memory of 5032 4304 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 82 PID 4304 wrote to memory of 5032 4304 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 82 PID 5032 wrote to memory of 2912 5032 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 83 PID 5032 wrote to memory of 2912 5032 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 83 PID 5032 wrote to memory of 2912 5032 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 83 PID 2912 wrote to memory of 468 2912 oyssbax.exe 84 PID 2912 wrote to memory of 468 2912 oyssbax.exe 84 PID 2912 wrote to memory of 468 2912 oyssbax.exe 84 PID 2912 wrote to memory of 468 2912 oyssbax.exe 84 PID 2912 wrote to memory of 468 2912 oyssbax.exe 84 PID 2912 wrote to memory of 468 2912 oyssbax.exe 84 PID 2912 wrote to memory of 468 2912 oyssbax.exe 84 PID 2912 wrote to memory of 468 2912 oyssbax.exe 84 PID 468 wrote to memory of 3096 468 oyssbax.exe 85 PID 468 wrote to memory of 3096 468 oyssbax.exe 85 PID 468 wrote to memory of 3096 468 oyssbax.exe 85 PID 468 wrote to memory of 3096 468 oyssbax.exe 85 PID 468 wrote to memory of 3096 468 oyssbax.exe 85 PID 5032 wrote to memory of 3508 5032 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 89 PID 5032 wrote to memory of 3508 5032 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 89 PID 5032 wrote to memory of 3508 5032 fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe8e61ef43583c2d6a67c49f626c657c_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\oyssbax.exe"C:\Users\Admin\oyssbax.exe" /r3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\oyssbax.exe"C:\Users\Admin\oyssbax.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:3096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 3206⤵
- Program crash
PID:640
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1726.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:3508
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3096 -ip 30961⤵PID:4544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD5e314b01cc421e267c0805d1136bddd36
SHA1802252dc01db55c376a018e8b3d2be91f60c3cd2
SHA256e6b5a94f7aa7a037a520ee8022951b82084ad6de79a54cd2abfd4bbf61c47dfb
SHA51224290d19bf06b68d4d491aebe7df5497f38ee7d6f841ddb8b98b27a7bd2e37dd38ff73758bce998058d889b50a1636bbaf596c31008d58773ab3f61d82e127c1
-
Filesize
205KB
MD5fe8e61ef43583c2d6a67c49f626c657c
SHA10f067362b6285e4858250c606c4d1587e4e41e72
SHA256ca90cb41af3bd78fcfd594aa6e92ba713bc8f39928f577036f97b62b9f2a8be3
SHA5126b8139d7c51c057c886d68e06998a0899756d81fb3cf9288c36accd1146c05213f7715b8e34ac9be2bb78f652ef67cd1282a7c57bbdbcaf39fa608038618eae1