Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 22:32
Static task
static1
Behavioral task
behavioral1
Sample
1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe
-
Size
446KB
-
MD5
1527f16729683e9a8ec69967e7e3a5e5
-
SHA1
c9a0849e053dc05330eb19b5fa7233038fc9c705
-
SHA256
ce551fccb987b8017b92d87c69e099be199f156c8e8de315488bee6a598a5a32
-
SHA512
42a5fad36cb49335a0c408eeb5cc4c43bd23d3aec53b09348fea83fc92f77a32e5173922552e88e477c9058a605d64ada071c09935bb4659e119564d614f0e1b
-
SSDEEP
12288:B2zrqa33OYtZdTodzyKf1wUUzr6nLOxcpH3:B2f3bFodj+UU3cO6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation 1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1128 svchost32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Sun = "\"C:\\Windows\\system32\\svchost32.exe\"" 1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\svchost32.exe 1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe File created C:\Windows\SysWOW64\svchost32.exe 1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost32.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3028 1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe 1128 svchost32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3028 wrote to memory of 4140 3028 1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe 83 PID 3028 wrote to memory of 4140 3028 1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe 83 PID 3028 wrote to memory of 4140 3028 1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe 83 PID 4140 wrote to memory of 1128 4140 cmd.exe 85 PID 4140 wrote to memory of 1128 4140 cmd.exe 85 PID 4140 wrote to memory of 1128 4140 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1527f16729683e9a8ec69967e7e3a5e5_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /cC:\Windows\system32\svchost32.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\svchost32.exeC:\Windows\system32\svchost32.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:1128
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
446KB
MD51527f16729683e9a8ec69967e7e3a5e5
SHA1c9a0849e053dc05330eb19b5fa7233038fc9c705
SHA256ce551fccb987b8017b92d87c69e099be199f156c8e8de315488bee6a598a5a32
SHA51242a5fad36cb49335a0c408eeb5cc4c43bd23d3aec53b09348fea83fc92f77a32e5173922552e88e477c9058a605d64ada071c09935bb4659e119564d614f0e1b