Analysis
-
max time kernel
93s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 16:01
Behavioral task
behavioral1
Sample
066fd26854b51d91d228bc370ef83faf_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
066fd26854b51d91d228bc370ef83faf_JaffaCakes118.exe
-
Size
327KB
-
MD5
066fd26854b51d91d228bc370ef83faf
-
SHA1
d2f798954ac425f72b8dcfb42390161c6e5b215c
-
SHA256
e46fd684446165eb58472280ecb09ab1d594a6b1c15cce362fc48a50c9f2c580
-
SHA512
d94d7bece6865ceb4b927b446ffe88449ccdeff3551dcbe2a8367637c15cae1a056deeebb4a5da55fc00a7dfb3b82b766f5184a1d5b339c4a81412317b9876b2
-
SSDEEP
6144:ElZ/zUMu4pDSxsCMRzf7x3SfS1JAzXBtL76lLIOBBL+XRe:EHLUMuiv9RgfSjAzRtyzBR2Re
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation logiciel.exe -
Executes dropped EXE 2 IoCs
pid Process 5056 logiciel.exe 4276 pdqt.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3996-10-0x0000000000400000-0x00000000004B8000-memory.dmp autoit_exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\pdqt.exe logiciel.exe -
resource yara_rule behavioral2/memory/3996-0-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral2/memory/3996-10-0x0000000000400000-0x00000000004B8000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 066fd26854b51d91d228bc370ef83faf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language logiciel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdqt.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4276 pdqt.exe 4276 pdqt.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3996 wrote to memory of 5056 3996 066fd26854b51d91d228bc370ef83faf_JaffaCakes118.exe 82 PID 3996 wrote to memory of 5056 3996 066fd26854b51d91d228bc370ef83faf_JaffaCakes118.exe 82 PID 3996 wrote to memory of 5056 3996 066fd26854b51d91d228bc370ef83faf_JaffaCakes118.exe 82 PID 5056 wrote to memory of 4276 5056 logiciel.exe 83 PID 5056 wrote to memory of 4276 5056 logiciel.exe 83 PID 5056 wrote to memory of 4276 5056 logiciel.exe 83 PID 4276 wrote to memory of 3400 4276 pdqt.exe 55 PID 4276 wrote to memory of 3400 4276 pdqt.exe 55 PID 4276 wrote to memory of 3400 4276 pdqt.exe 55 PID 4276 wrote to memory of 3400 4276 pdqt.exe 55 PID 4276 wrote to memory of 3400 4276 pdqt.exe 55 PID 4276 wrote to memory of 3400 4276 pdqt.exe 55
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\066fd26854b51d91d228bc370ef83faf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\066fd26854b51d91d228bc370ef83faf_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\logiciel.exeC:\Users\Admin\AppData\Local\Temp/logiciel.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\pdqt.exe"C:\Windows\system32\pdqt.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4276
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD534a5bf486fbf56f4afa7ec4112a93039
SHA1ab1798ddb387bfc0237cd796df12232d2ccb50bd
SHA256162d2d0fa4601458c8fb92b17404b6916b1f7950608179947a94f6c2362e6bd5
SHA5127e40361914524d4ba254edbb5c4d83087926e0a64cd8791dd31b88770bb43ed4a4075cb39b5187d8944df365c37d04251966bf9097cb34880e8980c7e89243ec
-
Filesize
45KB
MD5759cbe38a439cb1e8a55d032f1864df7
SHA1f28c063d474f062beabc865abe09048b35cbd75b
SHA256f43a0e927f263ad7e4d1d0c881c2bb7acd1797253aad86614b7b867587348b22
SHA51287387820af37b59211f1310541daa0e78b69b73ad601df8e9a4cac932b8f5c519dbf742766473046268acc4fa80cc3e3e4d4491da9b70d3255bd79ea62eb671d