Analysis
-
max time kernel
141s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 03:56
Static task
static1
Behavioral task
behavioral1
Sample
ffe9bedfdceb9632db99bfce7a3e001d_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ffe9bedfdceb9632db99bfce7a3e001d_JaffaCakes118.exe
-
Size
807KB
-
MD5
ffe9bedfdceb9632db99bfce7a3e001d
-
SHA1
bc8dde1594f5e3919b5013cf95ad3a7fc7d1c901
-
SHA256
1b1a2f97904e4efff2d2c2079349ff7782a1620ab17fa4b4eef90fb07f82a29f
-
SHA512
0317d69fb69ea9393b06af1b4d2e02f172586830b2edb57a75c3784af695a5b96a5f4c82fc8118722ac313a445750eaa292b4618763088ac37ae6ae047918192
-
SSDEEP
12288:j1DYrJszH0+oyH3wNhyd2iC/t4QbegIzk1VE5UroSS6bj:jdYdiU0qhDt19DE5U5bj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation ffe9bedfdceb9632db99bfce7a3e001d_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2996 svchost.exe 4708 mbam.exe -
resource yara_rule behavioral2/files/0x00070000000235d5-7.dat upx behavioral2/memory/2996-15-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral2/memory/2996-31-0x0000000000400000-0x0000000000443000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\Acrobat Update.job svchost.exe File opened for modification C:\Windows\Tasks\Acrobat Update.job svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mbam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffe9bedfdceb9632db99bfce7a3e001d_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4708 mbam.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3232 wrote to memory of 2996 3232 ffe9bedfdceb9632db99bfce7a3e001d_JaffaCakes118.exe 89 PID 3232 wrote to memory of 2996 3232 ffe9bedfdceb9632db99bfce7a3e001d_JaffaCakes118.exe 89 PID 3232 wrote to memory of 2996 3232 ffe9bedfdceb9632db99bfce7a3e001d_JaffaCakes118.exe 89 PID 3232 wrote to memory of 4708 3232 ffe9bedfdceb9632db99bfce7a3e001d_JaffaCakes118.exe 90 PID 3232 wrote to memory of 4708 3232 ffe9bedfdceb9632db99bfce7a3e001d_JaffaCakes118.exe 90 PID 3232 wrote to memory of 4708 3232 ffe9bedfdceb9632db99bfce7a3e001d_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffe9bedfdceb9632db99bfce7a3e001d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ffe9bedfdceb9632db99bfce7a3e001d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\mbam.exe"C:\Users\Admin\AppData\Local\Temp\mbam.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4336,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=4324 /prefetch:81⤵PID:412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
586KB
MD558d2857fde1a773f48e326c5e5f16718
SHA18fa1a648b26edb362222e377776b40d81d56a69a
SHA25697f6b2b0024cc7a99ff62e0cfb4896ed0e7e60942ccee611815c320eab9140c9
SHA512a97a34314d7821607f9ed7cf7221b4df9054e6c0599c2771887617e052c93ca6ddce1c8c0e0f740a880be5a9064ae8b80525cb1fceb1155bfa4f5d610e70f07a
-
Filesize
106KB
MD55d3b20dfe5325b53d85e1a594ec99cca
SHA1335a5692f2953170f3694c461e053dc33578cf1f
SHA256ddfdc27797af616604fc49fca676672d2cfbe8b447ece97ac0636feb898ec2ec
SHA51243c70807b82f78a6c2cd3607aaa7239910ba076eb6f802353c7344dae6da680d1c8c74d9dc78112e1f5705e8071d3409ba2240949ed67e0c32802df505a92557