Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2024 13:42
Static task
static1
Behavioral task
behavioral1
Sample
185198a888f2556b1535a0076cbf67df_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
185198a888f2556b1535a0076cbf67df_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
185198a888f2556b1535a0076cbf67df
-
SHA1
7622352dd5c86ea18c622a6b950209088d295562
-
SHA256
b964784a350f7f07daa0e8ea12f1f361d7f10bf36ab52232c34c2dd86297e17a
-
SHA512
289fe8deadbd437db6094b196b37ef8e7c8fc58286120f3107dc2d9970ef591d66376e9225e6f9d08eab5a153247e652c513ce87375fc540d74abae142b85429
-
SSDEEP
3072:GwcClHImXEPAVSNhdsqf+wfzuO0ARvAZ:ffImXEPAsNz7ruOPO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 185198a888f2556b1535a0076cbf67df_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
pid Process 4844 winlogon.exe 3112 winlogon.exe 1288 winlogon.exe 3268 winlogon.exe 4604 winlogon.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1684 set thread context of 4312 1684 185198a888f2556b1535a0076cbf67df_JaffaCakes118.exe 83 PID 4844 set thread context of 3112 4844 winlogon.exe 87 PID 3112 set thread context of 1288 3112 winlogon.exe 88 PID 3112 set thread context of 3268 3112 winlogon.exe 101 PID 3112 set thread context of 4604 3112 winlogon.exe 104 -
resource yara_rule behavioral2/memory/4312-3-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/4312-0-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/4312-4-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/4312-5-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/4312-18-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/3112-25-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/3112-22-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/3112-30-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/3112-34-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/3112-39-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/3112-48-0x0000000000400000-0x0000000000419000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 2688 1288 WerFault.exe 88 2744 3268 WerFault.exe 101 1108 4604 WerFault.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 185198a888f2556b1535a0076cbf67df_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 185198a888f2556b1535a0076cbf67df_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4312 185198a888f2556b1535a0076cbf67df_JaffaCakes118.exe 3112 winlogon.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 1684 wrote to memory of 1620 1684 185198a888f2556b1535a0076cbf67df_JaffaCakes118.exe 82 PID 1684 wrote to memory of 1620 1684 185198a888f2556b1535a0076cbf67df_JaffaCakes118.exe 82 PID 1684 wrote to memory of 1620 1684 185198a888f2556b1535a0076cbf67df_JaffaCakes118.exe 82 PID 1684 wrote to memory of 4312 1684 185198a888f2556b1535a0076cbf67df_JaffaCakes118.exe 83 PID 1684 wrote to memory of 4312 1684 185198a888f2556b1535a0076cbf67df_JaffaCakes118.exe 83 PID 1684 wrote to memory of 4312 1684 185198a888f2556b1535a0076cbf67df_JaffaCakes118.exe 83 PID 1684 wrote to memory of 4312 1684 185198a888f2556b1535a0076cbf67df_JaffaCakes118.exe 83 PID 1684 wrote to memory of 4312 1684 185198a888f2556b1535a0076cbf67df_JaffaCakes118.exe 83 PID 1684 wrote to memory of 4312 1684 185198a888f2556b1535a0076cbf67df_JaffaCakes118.exe 83 PID 1684 wrote to memory of 4312 1684 185198a888f2556b1535a0076cbf67df_JaffaCakes118.exe 83 PID 1684 wrote to memory of 4312 1684 185198a888f2556b1535a0076cbf67df_JaffaCakes118.exe 83 PID 4312 wrote to memory of 4844 4312 185198a888f2556b1535a0076cbf67df_JaffaCakes118.exe 85 PID 4312 wrote to memory of 4844 4312 185198a888f2556b1535a0076cbf67df_JaffaCakes118.exe 85 PID 4312 wrote to memory of 4844 4312 185198a888f2556b1535a0076cbf67df_JaffaCakes118.exe 85 PID 4844 wrote to memory of 2532 4844 winlogon.exe 86 PID 4844 wrote to memory of 2532 4844 winlogon.exe 86 PID 4844 wrote to memory of 2532 4844 winlogon.exe 86 PID 4844 wrote to memory of 3112 4844 winlogon.exe 87 PID 4844 wrote to memory of 3112 4844 winlogon.exe 87 PID 4844 wrote to memory of 3112 4844 winlogon.exe 87 PID 4844 wrote to memory of 3112 4844 winlogon.exe 87 PID 4844 wrote to memory of 3112 4844 winlogon.exe 87 PID 4844 wrote to memory of 3112 4844 winlogon.exe 87 PID 4844 wrote to memory of 3112 4844 winlogon.exe 87 PID 4844 wrote to memory of 3112 4844 winlogon.exe 87 PID 3112 wrote to memory of 1288 3112 winlogon.exe 88 PID 3112 wrote to memory of 1288 3112 winlogon.exe 88 PID 3112 wrote to memory of 1288 3112 winlogon.exe 88 PID 3112 wrote to memory of 1288 3112 winlogon.exe 88 PID 3112 wrote to memory of 1288 3112 winlogon.exe 88 PID 3112 wrote to memory of 1288 3112 winlogon.exe 88 PID 3112 wrote to memory of 1288 3112 winlogon.exe 88 PID 3112 wrote to memory of 1288 3112 winlogon.exe 88 PID 3112 wrote to memory of 3268 3112 winlogon.exe 101 PID 3112 wrote to memory of 3268 3112 winlogon.exe 101 PID 3112 wrote to memory of 3268 3112 winlogon.exe 101 PID 3112 wrote to memory of 3268 3112 winlogon.exe 101 PID 3112 wrote to memory of 3268 3112 winlogon.exe 101 PID 3112 wrote to memory of 3268 3112 winlogon.exe 101 PID 3112 wrote to memory of 3268 3112 winlogon.exe 101 PID 3112 wrote to memory of 3268 3112 winlogon.exe 101 PID 3112 wrote to memory of 4604 3112 winlogon.exe 104 PID 3112 wrote to memory of 4604 3112 winlogon.exe 104 PID 3112 wrote to memory of 4604 3112 winlogon.exe 104 PID 3112 wrote to memory of 4604 3112 winlogon.exe 104 PID 3112 wrote to memory of 4604 3112 winlogon.exe 104 PID 3112 wrote to memory of 4604 3112 winlogon.exe 104 PID 3112 wrote to memory of 4604 3112 winlogon.exe 104 PID 3112 wrote to memory of 4604 3112 winlogon.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\185198a888f2556b1535a0076cbf67df_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\185198a888f2556b1535a0076cbf67df_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe2⤵PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\185198a888f2556b1535a0076cbf67df_JaffaCakes118.exe
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe4⤵PID:2532
-
-
C:\Users\Admin\E696D64614\winlogon.exe
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:1288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 126⤵
- Program crash
PID:2688
-
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:3268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 126⤵
- Program crash
PID:2744
-
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:4604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 126⤵
- Program crash
PID:1108
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1288 -ip 12881⤵PID:1228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3268 -ip 32681⤵PID:3244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4604 -ip 46041⤵PID:380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5185198a888f2556b1535a0076cbf67df
SHA17622352dd5c86ea18c622a6b950209088d295562
SHA256b964784a350f7f07daa0e8ea12f1f361d7f10bf36ab52232c34c2dd86297e17a
SHA512289fe8deadbd437db6094b196b37ef8e7c8fc58286120f3107dc2d9970ef591d66376e9225e6f9d08eab5a153247e652c513ce87375fc540d74abae142b85429