Analysis
-
max time kernel
95s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 12:27
Static task
static1
Behavioral task
behavioral1
Sample
0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe
-
Size
98KB
-
MD5
0aa8fb62abfbb62ec43076dd164d8751
-
SHA1
597819616e16889167bc74372127f6eb62193212
-
SHA256
96429043f3a30c01b205e2da6599782a864822dfb07b3cb016986c6e65a12ca5
-
SHA512
ad6d9fdaf53afd2a2023fa0aca81e7f2fe9c3caaf249504505c8c6b7345312cd5e100663e9783d8d415aceded4be967079c0db5fb9b1bbbca0fd673e3cb21461
-
SSDEEP
1536:rIcnFivCOLJVj7hH+sONVP/XtVtxGOBA+rRhCkQskMHUjO7pVE/AJe31ryelqa4K:rrsJHO3dnxxfrRh7QPMRa/AJKsNARFd
Malware Config
Extracted
tofsee
64.20.54.234
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
Processes:
igl.exeigl.exepid process 432 igl.exe 4396 igl.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\igl.exe\" /r" 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exeigl.exeigl.exedescription pid process target process PID 2748 set thread context of 904 2748 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe PID 432 set thread context of 4396 432 igl.exe igl.exe PID 4396 set thread context of 4760 4396 igl.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 692 4760 WerFault.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
svchost.exe0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exeigl.exeigl.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exepid process 2748 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exeigl.exeigl.exedescription pid process target process PID 2748 wrote to memory of 904 2748 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe PID 2748 wrote to memory of 904 2748 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe PID 2748 wrote to memory of 904 2748 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe PID 2748 wrote to memory of 904 2748 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe PID 2748 wrote to memory of 904 2748 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe PID 2748 wrote to memory of 904 2748 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe PID 2748 wrote to memory of 904 2748 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe PID 2748 wrote to memory of 904 2748 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe PID 904 wrote to memory of 432 904 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe igl.exe PID 904 wrote to memory of 432 904 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe igl.exe PID 904 wrote to memory of 432 904 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe igl.exe PID 432 wrote to memory of 4396 432 igl.exe igl.exe PID 432 wrote to memory of 4396 432 igl.exe igl.exe PID 432 wrote to memory of 4396 432 igl.exe igl.exe PID 432 wrote to memory of 4396 432 igl.exe igl.exe PID 432 wrote to memory of 4396 432 igl.exe igl.exe PID 432 wrote to memory of 4396 432 igl.exe igl.exe PID 432 wrote to memory of 4396 432 igl.exe igl.exe PID 432 wrote to memory of 4396 432 igl.exe igl.exe PID 4396 wrote to memory of 4760 4396 igl.exe svchost.exe PID 4396 wrote to memory of 4760 4396 igl.exe svchost.exe PID 4396 wrote to memory of 4760 4396 igl.exe svchost.exe PID 4396 wrote to memory of 4760 4396 igl.exe svchost.exe PID 4396 wrote to memory of 4760 4396 igl.exe svchost.exe PID 904 wrote to memory of 4628 904 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe cmd.exe PID 904 wrote to memory of 4628 904 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe cmd.exe PID 904 wrote to memory of 4628 904 0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0aa8fb62abfbb62ec43076dd164d8751_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\igl.exe"C:\Users\Admin\igl.exe" /r3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\igl.exe"C:\Users\Admin\igl.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 3206⤵
- Program crash
PID:692
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7248.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4628
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4760 -ip 47601⤵PID:1052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD561bfeeb438fd19c602653cc8f1ae584d
SHA1542ad13a588d96dd5d57582746dfd98c64311c16
SHA256831c590b0b044160db45645686c5459a23bdf935c0e989aae896fb9e54f80279
SHA5123b6f6419bcbf79086773354fba9cb5e96c6d7e41d7e14a2c5bd2a7909ebcaf60b4dbf09946b0f127c313b2a6e65e7e8369cc1c0bfa6f103ee995eba610f9afc2
-
Filesize
98KB
MD50aa8fb62abfbb62ec43076dd164d8751
SHA1597819616e16889167bc74372127f6eb62193212
SHA25696429043f3a30c01b205e2da6599782a864822dfb07b3cb016986c6e65a12ca5
SHA512ad6d9fdaf53afd2a2023fa0aca81e7f2fe9c3caaf249504505c8c6b7345312cd5e100663e9783d8d415aceded4be967079c0db5fb9b1bbbca0fd673e3cb21461