Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 11:09
Static task
static1
Behavioral task
behavioral1
Sample
01021fd92e72a9b06bb95439f3d40046_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
01021fd92e72a9b06bb95439f3d40046_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
01021fd92e72a9b06bb95439f3d40046_JaffaCakes118.exe
-
Size
65KB
-
MD5
01021fd92e72a9b06bb95439f3d40046
-
SHA1
3f74a0c51c1d7b784136ae486256998af2f1d497
-
SHA256
b457adc2504378f22ad2b25184ef84b892e74e17ff3a9c6917ea658c2070cf66
-
SHA512
40dd68308d69d4638ed92115905a97f70274ce16728fbf17b62e8bd1fa74727cd756a0023c4ab629b13b8a42c1f834e65b4eaed21fcdbaa113edb5e59f29003c
-
SSDEEP
1536:RXNzoLxHdAdhK2Y+pe3/lqBmBySysjOKWikWSu:RXpoFC0R+peTjyn4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 01021fd92e72a9b06bb95439f3d40046_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3992 FileTmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01021fd92e72a9b06bb95439f3d40046_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileTmp.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3992 FileTmp.exe 3992 FileTmp.exe 3992 FileTmp.exe 3992 FileTmp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4600 01021fd92e72a9b06bb95439f3d40046_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4600 wrote to memory of 3992 4600 01021fd92e72a9b06bb95439f3d40046_JaffaCakes118.exe 82 PID 4600 wrote to memory of 3992 4600 01021fd92e72a9b06bb95439f3d40046_JaffaCakes118.exe 82 PID 4600 wrote to memory of 3992 4600 01021fd92e72a9b06bb95439f3d40046_JaffaCakes118.exe 82 PID 3992 wrote to memory of 3608 3992 FileTmp.exe 56 PID 3992 wrote to memory of 3608 3992 FileTmp.exe 56 PID 3992 wrote to memory of 3608 3992 FileTmp.exe 56 PID 3992 wrote to memory of 3608 3992 FileTmp.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\01021fd92e72a9b06bb95439f3d40046_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\01021fd92e72a9b06bb95439f3d40046_JaffaCakes118.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\FileTmp.exe"C:\Users\Admin\AppData\Local\Temp\FileTmp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3992
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5a5c922729d07527d4f64768cafdb11c5
SHA1ab2c4165c30b8125044b6fe6fb7bce9f9d5cdc44
SHA256a071c7aca096bd114b03fb7fa4bed989aed2d214c8897385f863918f0e6e38c1
SHA512eaa5b970caf99061d8aba44f99c8c2f4cf5df0c6657d2466f5f0a6a5ffd6318c58f07031a119b5046a4c42ef04830386375a464df714365033241e204867915e