Analysis
-
max time kernel
147s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 13:14
Static task
static1
Behavioral task
behavioral1
Sample
fe9b1802206a69b36317262ddbdf9a40_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fe9b1802206a69b36317262ddbdf9a40_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fe9b1802206a69b36317262ddbdf9a40_JaffaCakes118.exe
-
Size
373KB
-
MD5
fe9b1802206a69b36317262ddbdf9a40
-
SHA1
da07d54a22e08fffe0da8758455a7b76da1c5ae0
-
SHA256
ece5022b8068a2648f6e0fc46c1545236bf54b694c091879476c45780da81143
-
SHA512
397bb8ea462e126839af1d82140397837bd5e08adef6481bb7c0f615c32af948a9c17937eeee5a45208900b47107eafbb80b9da8a318835a9775d11a514a1bad
-
SSDEEP
6144:6d40a8eI6BzmkLVe7qFDUlMpr5TbNV+V+vKiH01VSKJfkoft:S4tIemkLc7WDUlibNZvpcZRkoft
Malware Config
Extracted
C:\Users\Admin\Documents\!HELP_SOS.hta
http://'+s.bp
http://'+s.bp+s.txp+tx
Signatures
-
Contacts a large (7709) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation fe9b1802206a69b36317262ddbdf9a40_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Rj3fNWF3.exe -
Deletes itself 1 IoCs
pid Process 1956 WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 1592 Rj3fNWF3.exe 2484 Rj3fNWF3.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: Rj3fNWF3.exe File opened (read-only) \??\L: Rj3fNWF3.exe File opened (read-only) \??\Q: Rj3fNWF3.exe File opened (read-only) \??\S: Rj3fNWF3.exe File opened (read-only) \??\W: Rj3fNWF3.exe File opened (read-only) \??\Z: Rj3fNWF3.exe File opened (read-only) \??\G: Rj3fNWF3.exe File opened (read-only) \??\M: Rj3fNWF3.exe File opened (read-only) \??\N: Rj3fNWF3.exe File opened (read-only) \??\O: Rj3fNWF3.exe File opened (read-only) \??\P: Rj3fNWF3.exe File opened (read-only) \??\X: Rj3fNWF3.exe File opened (read-only) \??\Y: Rj3fNWF3.exe File opened (read-only) \??\H: Rj3fNWF3.exe File opened (read-only) \??\R: Rj3fNWF3.exe File opened (read-only) \??\T: Rj3fNWF3.exe File opened (read-only) \??\I: Rj3fNWF3.exe File opened (read-only) \??\J: Rj3fNWF3.exe File opened (read-only) \??\U: Rj3fNWF3.exe File opened (read-only) \??\V: Rj3fNWF3.exe File opened (read-only) \??\E: Rj3fNWF3.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\Desktop\Wallpaper Rj3fNWF3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\DDx.bmp" Rj3fNWF3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe9b1802206a69b36317262ddbdf9a40_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe9b1802206a69b36317262ddbdf9a40_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rj3fNWF3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rj3fNWF3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies Control Panel 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\Desktop Rj3fNWF3.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-19 Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-20 Rj3fNWF3.exe -
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\sage.notice\shell\open Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\sage.notice Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\.sage Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\sage.notice\DefaultIcon Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\sage.notice\FriendlyTypeName Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\htafile Rj3fNWF3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\htafile\DefaultIcon\ = "%WinDir%\\SysWow64\\shell32.dll,44" Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings fe9b1802206a69b36317262ddbdf9a40_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\sage.notice\FriendlyTypeName\ = "encrypted by SAGE" Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\sage.notice\shell Rj3fNWF3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\sage.notice\DefaultIcon\ = "%WinDir%\\SysWow64\\shell32.dll,47" Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\sage.notice\shell\open\command Rj3fNWF3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\sage.notice\shell\open\command\ = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\f1.hta\" \"%1\"" Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\htafile\DefaultIcon Rj3fNWF3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\.sage\ = "sage.notice" Rj3fNWF3.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4648 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1592 Rj3fNWF3.exe 1592 Rj3fNWF3.exe 1592 Rj3fNWF3.exe 1592 Rj3fNWF3.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4156 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4156 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 516 wrote to memory of 3120 516 fe9b1802206a69b36317262ddbdf9a40_JaffaCakes118.exe 89 PID 516 wrote to memory of 3120 516 fe9b1802206a69b36317262ddbdf9a40_JaffaCakes118.exe 89 PID 516 wrote to memory of 3120 516 fe9b1802206a69b36317262ddbdf9a40_JaffaCakes118.exe 89 PID 516 wrote to memory of 4648 516 fe9b1802206a69b36317262ddbdf9a40_JaffaCakes118.exe 90 PID 516 wrote to memory of 4648 516 fe9b1802206a69b36317262ddbdf9a40_JaffaCakes118.exe 90 PID 516 wrote to memory of 4648 516 fe9b1802206a69b36317262ddbdf9a40_JaffaCakes118.exe 90 PID 516 wrote to memory of 1592 516 fe9b1802206a69b36317262ddbdf9a40_JaffaCakes118.exe 95 PID 516 wrote to memory of 1592 516 fe9b1802206a69b36317262ddbdf9a40_JaffaCakes118.exe 95 PID 516 wrote to memory of 1592 516 fe9b1802206a69b36317262ddbdf9a40_JaffaCakes118.exe 95 PID 516 wrote to memory of 1956 516 fe9b1802206a69b36317262ddbdf9a40_JaffaCakes118.exe 96 PID 516 wrote to memory of 1956 516 fe9b1802206a69b36317262ddbdf9a40_JaffaCakes118.exe 96 PID 516 wrote to memory of 1956 516 fe9b1802206a69b36317262ddbdf9a40_JaffaCakes118.exe 96 PID 1592 wrote to memory of 2484 1592 Rj3fNWF3.exe 99 PID 1592 wrote to memory of 2484 1592 Rj3fNWF3.exe 99 PID 1592 wrote to memory of 2484 1592 Rj3fNWF3.exe 99 PID 1592 wrote to memory of 4632 1592 Rj3fNWF3.exe 106 PID 1592 wrote to memory of 4632 1592 Rj3fNWF3.exe 106 PID 1592 wrote to memory of 4632 1592 Rj3fNWF3.exe 106 PID 1592 wrote to memory of 2852 1592 Rj3fNWF3.exe 107 PID 1592 wrote to memory of 2852 1592 Rj3fNWF3.exe 107 PID 1592 wrote to memory of 2852 1592 Rj3fNWF3.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe9b1802206a69b36317262ddbdf9a40_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe9b1802206a69b36317262ddbdf9a40_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Local\Temp\fe9b1802206a69b36317262ddbdf9a40_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe9b1802206a69b36317262ddbdf9a40_JaffaCakes118.exe" g2⤵
- System Location Discovery: System Language Discovery
PID:3120
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "N0mFUQoa" /TR "C:\Users\Admin\AppData\Roaming\Rj3fNWF3.exe" /SC ONLOGON /RL HIGHEST /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4648
-
-
C:\Users\Admin\AppData\Roaming\Rj3fNWF3.exe"C:\Users\Admin\AppData\Roaming\Rj3fNWF3.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Enumerates connected drives
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Roaming\Rj3fNWF3.exe"C:\Users\Admin\AppData\Roaming\Rj3fNWF3.exe" g3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2484
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\!HELP_SOS.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- System Location Discovery: System Language Discovery
PID:4632
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f1.vbs"3⤵
- System Location Discovery: System Language Discovery
PID:2852
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f252888.vbs"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4100,i,15336851255456239337,16379811035920490645,262144 --variations-seed-version --mojo-platform-channel-handle=4616 /prefetch:81⤵PID:1348
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x51c 0x52c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD537219fd2d09abee4189a1ae33de93e2d
SHA15e4cc26e169b6bd16843bcc86806556dac372c57
SHA2562a0d2418a2504ad14960dcff54f0892339eeed53e359585c9b04a29c4e6e4274
SHA512626b89eb5b132ac43a6fb2d5dcc1c62349a6a48045a486835aa51c17348b0c4849cf5d56b4b56359c7bab5bdccaa04adf659f7486de84f9c14d86032272e5069
-
Filesize
574B
MD5b3902b20a3d4361d42b2867a8dd81d29
SHA1b412c206cf8c863e300d8ed85223eae85f69ea19
SHA25615a9b8d47555ebb0962fc306fe063fdf8cf219789d477fed421b7b9195f36a03
SHA512c383de0fb49eb05ca0f70893de239858e91ec87af48a91f5149bee83887c4a2dcfe0a5406e76627d1995cd13e44b20b392b7408f86a1b9070d012f4fe5a7a751
-
Filesize
373KB
MD5fe9b1802206a69b36317262ddbdf9a40
SHA1da07d54a22e08fffe0da8758455a7b76da1c5ae0
SHA256ece5022b8068a2648f6e0fc46c1545236bf54b694c091879476c45780da81143
SHA512397bb8ea462e126839af1d82140397837bd5e08adef6481bb7c0f615c32af948a9c17937eeee5a45208900b47107eafbb80b9da8a318835a9775d11a514a1bad
-
Filesize
72B
MD5bb3b9db4011784a983d850d2d16bae1d
SHA153a1094417433ab31473a4f7dc681c3a1294caf7
SHA256950c8fb6aeda779b733f123c346e6b05abab49b82f200e560f7c163b69a0fbaa
SHA5121dfaa47d34b77d4032586f67cb6a1a769d05f08f0033adddc7f97953534ccdb0aa1e65f86dccea501d6173c273a1b7ffeb6eda02d0e7e5b395f936bd48e20bf2
-
Filesize
99KB
MD5233de1e08c6c97143c5ba2d2063c9a69
SHA1a469b8579a8c639659908a571cd4f79bcdc2cd37
SHA256ae6de78d6feba8c768b879897f0a546e7c48278630e2fb2ba9528425b1b83a3a
SHA5121037430ac6bc98fef3e4d9487c0ee419a6bdf096a330fa85c22c8d7971ded75e5b6db33e65e5768aff89aba52caca9580e0bc66dbe45bd0f2b3687f8cc978ad7