Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 16:40
Static task
static1
Behavioral task
behavioral1
Sample
229206674159b840bbf5aa6ad232f238_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
229206674159b840bbf5aa6ad232f238_JaffaCakes118.exe
-
Size
450KB
-
MD5
229206674159b840bbf5aa6ad232f238
-
SHA1
91a0e5acc4ca3078be2ec9e5bbd539fae16ca35b
-
SHA256
32b870cd93337815674a72fc3d334ef4a88c05f93002bd5bf70aaaa586c80f52
-
SHA512
3910fbd13fcd12629524b99277b3dba9740a3906ccc167561967ea3dd8a7b2c8d25da6cc96965e6456beb7edc9743217a1fef8433577b73adbb15a451706ad2a
-
SSDEEP
6144:fsDtWbyJoK1nWbCbcRtmDzyn3Qo6k7UtPclWUHI8tYV:ktWbaoAntcvQnLPw7HO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 229206674159b840bbf5aa6ad232f238_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 14 iplogger.org 16 iplogger.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 freegeoip.app -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3500 1948 WerFault.exe 82 3144 1948 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 229206674159b840bbf5aa6ad232f238_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 1 IoCs
pid Process 3724 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3724 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1948 wrote to memory of 4056 1948 229206674159b840bbf5aa6ad232f238_JaffaCakes118.exe 86 PID 1948 wrote to memory of 4056 1948 229206674159b840bbf5aa6ad232f238_JaffaCakes118.exe 86 PID 1948 wrote to memory of 4056 1948 229206674159b840bbf5aa6ad232f238_JaffaCakes118.exe 86 PID 4056 wrote to memory of 3724 4056 cmd.exe 91 PID 4056 wrote to memory of 3724 4056 cmd.exe 91 PID 4056 wrote to memory of 3724 4056 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\229206674159b840bbf5aa6ad232f238_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\229206674159b840bbf5aa6ad232f238_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "229206674159b840bbf5aa6ad232f238_JaffaCakes118.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\229206674159b840bbf5aa6ad232f238_JaffaCakes118.exe" & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "229206674159b840bbf5aa6ad232f238_JaffaCakes118.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 17762⤵
- Program crash
PID:3500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 17842⤵
- Program crash
PID:3144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1948 -ip 19481⤵PID:1060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1948 -ip 19481⤵PID:868