Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 11:49
Static task
static1
Behavioral task
behavioral1
Sample
012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe
-
Size
408KB
-
MD5
012956475b26cbdf95e0c37fb49df4b5
-
SHA1
495780916fd0cf2d293ae78931b942e99edfc5e9
-
SHA256
5a2404f77f0bc03e7b0881c1e44361ca04d3790d30663211c371ad808a49098a
-
SHA512
ba01c3f12d3b1e8accdb8acf123be80ac5db88b8718a34e7e226dc92df16b27c711e320ad08fd1d144b38b1bbdee405fd41dd21f1dd2c20d3a6e74736addedc8
-
SSDEEP
12288:hw7GJF+yDSO+2Rz8++HxBETNUCUeQozxfcI:Wy5WJ/0zZcI
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4932 SERVER.EXE -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\SERVER.EXE 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe File created C:\Windows\COLLINES.JPG 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosDate 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4932 SERVER.EXE 4932 SERVER.EXE 4932 SERVER.EXE 4932 SERVER.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2164 wrote to memory of 4932 2164 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe 85 PID 2164 wrote to memory of 4932 2164 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe 85 PID 2164 wrote to memory of 4932 2164 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe 85 PID 4932 wrote to memory of 3472 4932 SERVER.EXE 56 PID 4932 wrote to memory of 3472 4932 SERVER.EXE 56 PID 4932 wrote to memory of 3472 4932 SERVER.EXE 56 PID 4932 wrote to memory of 3472 4932 SERVER.EXE 56 PID 4932 wrote to memory of 3472 4932 SERVER.EXE 56 PID 4932 wrote to memory of 3472 4932 SERVER.EXE 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe"2⤵
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SERVER.EXE"C:\Windows\SERVER.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4932
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD58fbc616195317fe76e9830ef73649e46
SHA1a20e6898fe63a88dab5f4de21b4cf17405b90147
SHA2568eaca2d838cf928fdf33a322750c0d2a545f022a71138ad9f256d57993390fb0
SHA512227f713e7e83eb9634c8940ed9a8e4af00c31415a7c42784afecf81aeb50edf9b5165726df085481caf78cadf411f47fb866eb5144c8a9dbdb82167484a4fd06