Analysis
-
max time kernel
140s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 03:25
Static task
static1
Behavioral task
behavioral1
Sample
ffdcce032d53e6200017211986fadfd2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffdcce032d53e6200017211986fadfd2_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
ffdcce032d53e6200017211986fadfd2_JaffaCakes118.exe
-
Size
63KB
-
MD5
ffdcce032d53e6200017211986fadfd2
-
SHA1
b78e98fd5cb45cc7092edcec43ff8982967709aa
-
SHA256
564c9830f41d21d268725ea1f0493148c95bcaacc8c33c6cee57f32da58ec442
-
SHA512
a1f8791a9e56054f1e183a630f955e5e348f5c6e1b573cc7df7eee9f0516a1235e6bf06fdd989bfd2b59a9c59841e7752b69e30111e929f563b346c0aa74b279
-
SSDEEP
1536:KKwR0EGeZ0jCnP9wbr7FI+Cxd/FGGw1ah2EcdYs8JqYgQh:KKwKGGCVICbdGj02fGq
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation ffdcce032d53e6200017211986fadfd2_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 2212 3.exe 3012 keygen.exe 4636 3.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1036 set thread context of 4616 1036 ffdcce032d53e6200017211986fadfd2_JaffaCakes118.exe 85 PID 2212 set thread context of 4636 2212 3.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffdcce032d53e6200017211986fadfd2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffdcce032d53e6200017211986fadfd2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keygen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4636 3.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1036 wrote to memory of 4616 1036 ffdcce032d53e6200017211986fadfd2_JaffaCakes118.exe 85 PID 1036 wrote to memory of 4616 1036 ffdcce032d53e6200017211986fadfd2_JaffaCakes118.exe 85 PID 1036 wrote to memory of 4616 1036 ffdcce032d53e6200017211986fadfd2_JaffaCakes118.exe 85 PID 1036 wrote to memory of 4616 1036 ffdcce032d53e6200017211986fadfd2_JaffaCakes118.exe 85 PID 1036 wrote to memory of 4616 1036 ffdcce032d53e6200017211986fadfd2_JaffaCakes118.exe 85 PID 4616 wrote to memory of 2212 4616 ffdcce032d53e6200017211986fadfd2_JaffaCakes118.exe 87 PID 4616 wrote to memory of 2212 4616 ffdcce032d53e6200017211986fadfd2_JaffaCakes118.exe 87 PID 4616 wrote to memory of 2212 4616 ffdcce032d53e6200017211986fadfd2_JaffaCakes118.exe 87 PID 4616 wrote to memory of 3012 4616 ffdcce032d53e6200017211986fadfd2_JaffaCakes118.exe 89 PID 4616 wrote to memory of 3012 4616 ffdcce032d53e6200017211986fadfd2_JaffaCakes118.exe 89 PID 4616 wrote to memory of 3012 4616 ffdcce032d53e6200017211986fadfd2_JaffaCakes118.exe 89 PID 2212 wrote to memory of 4636 2212 3.exe 90 PID 2212 wrote to memory of 4636 2212 3.exe 90 PID 2212 wrote to memory of 4636 2212 3.exe 90 PID 2212 wrote to memory of 4636 2212 3.exe 90 PID 2212 wrote to memory of 4636 2212 3.exe 90 PID 4636 wrote to memory of 3440 4636 3.exe 56 PID 4636 wrote to memory of 3440 4636 3.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\ffdcce032d53e6200017211986fadfd2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ffdcce032d53e6200017211986fadfd2_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\ffdcce032d53e6200017211986fadfd2_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ffdcce032d53e6200017211986fadfd2_JaffaCakes118.exe3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\3.exeC:\Users\Admin\AppData\Local\Temp\3.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4636
-
-
-
C:\Users\Admin\AppData\Local\Temp\keygen.exe"C:\Users\Admin\AppData\Local\Temp\keygen.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3012
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5eba5c48e49d6657bb7049c2d166860e6
SHA1d3b4cd73a0a1994b7b89a1315bee67117efb32f7
SHA256c84d082416390fd6821196d34ff9cab896892567a4bb53ad9c16bb59d631c090
SHA51253b0465395afa73cdbcdbbd6340d5caec6b010cb1b2aa889484f11b6da93637ea2bb7948620ade594059ca2ff488fa69a12e6de1a7088d8ebf2c506ddb9f98dd
-
Filesize
40KB
MD55831d6f6cbe1cb95ce95050b40fb05c6
SHA17dd1746b3d66a0c47906d386e712fcca1d5b0679
SHA256a87235792c0e2d7f92bd3084777f23535505f6bdf4a11ab0c02e044a571a6d6a
SHA512cc236681e93556f3136ee5834fe97e334dc9388342400886b1b187ced48690b9778b2c1765ab6fbf4c80dc68d66872fe7ed3330e08030a427e81b5e923c38f06