Analysis
-
max time kernel
135s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
007d77752a0c281ca7421db22d2f393a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
007d77752a0c281ca7421db22d2f393a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
007d77752a0c281ca7421db22d2f393a_JaffaCakes118.exe
-
Size
98KB
-
MD5
007d77752a0c281ca7421db22d2f393a
-
SHA1
f2c0755be54da11f37f2a4b10a3b82233e6a08f4
-
SHA256
f6fb0b9735cf5b15117c63772451a8c3334684c9748b55231c4148f37d0d9724
-
SHA512
2afca2ea648f42530681b458472b01e96f908b27a03403133e00c04208c7b293ac989bbcd0f59813f0c9c3f686640e756b6f502a295f72f2afe9941f2da531e9
-
SSDEEP
1536:OdSW3HA5cb5mM+sPbi3EoGDoj4LhaMB0nuuLpb9oTMz2vhEFqwi:BeHUcbWsPbi3jBjwhJB0VLpbiAz2vwX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 007d77752a0c281ca7421db22d2f393a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 007d77752a0c281ca7421db22d2f393a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1292 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1292 PING.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3200 007d77752a0c281ca7421db22d2f393a_JaffaCakes118.exe 3200 007d77752a0c281ca7421db22d2f393a_JaffaCakes118.exe 3200 007d77752a0c281ca7421db22d2f393a_JaffaCakes118.exe 3200 007d77752a0c281ca7421db22d2f393a_JaffaCakes118.exe 3200 007d77752a0c281ca7421db22d2f393a_JaffaCakes118.exe 3200 007d77752a0c281ca7421db22d2f393a_JaffaCakes118.exe 3200 007d77752a0c281ca7421db22d2f393a_JaffaCakes118.exe 3200 007d77752a0c281ca7421db22d2f393a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3200 wrote to memory of 976 3200 007d77752a0c281ca7421db22d2f393a_JaffaCakes118.exe 84 PID 3200 wrote to memory of 976 3200 007d77752a0c281ca7421db22d2f393a_JaffaCakes118.exe 84 PID 3200 wrote to memory of 976 3200 007d77752a0c281ca7421db22d2f393a_JaffaCakes118.exe 84 PID 976 wrote to memory of 1292 976 cmd.exe 86 PID 976 wrote to memory of 1292 976 cmd.exe 86 PID 976 wrote to memory of 1292 976 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\007d77752a0c281ca7421db22d2f393a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\007d77752a0c281ca7421db22d2f393a_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rmrf4785.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\PING.EXEping 0.0.0.03⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1292
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253B
MD51f2803ae80a4b00d7ea08c298fd305ee
SHA1a7b401eaf7a6fa526eec301f37875a7ec84deda1
SHA2565b8a2da14bf4f3aeea196ec041a380410ccab49cb651e11cc0af25cc5945a937
SHA512238fd293abc700b88038d83e74b0a509f03e96cab113baad709db85b02eb4f713b23a9a60977dcf6b70e87d82a408a8521e602b24914c1991555ceca9bc33310