Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 20:45
Static task
static1
Behavioral task
behavioral1
Sample
2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe
-
Size
208KB
-
MD5
2534418578f45b8c36147bc57c00d82c
-
SHA1
02b85f42b1c1f929c2143fb871cb081bd0f4b3b4
-
SHA256
e914b8f284828ae7171187d3701c37e382484e0874f982cbb0a6add3a1abfaa4
-
SHA512
8c70191537e780934a17ca65c995f8dddf310725728dae41ff6b5e2a6316915def5fb3e161c34635c2de949695bc031018bfc3f007b22ccf38a2fc743ddb12e0
-
SSDEEP
3072:y3WN/YRSyykq3OijFktRcIkw02m6C3mLaa5xHNZ9vROkpkX4Ndo22L0Sdz:y8kH+6PfPDOkpkINVQ0K
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2812 svchost.exe 1732 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchost.exe" 2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1028 set thread context of 2068 1028 2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe 85 PID 2812 set thread context of 1732 2812 svchost.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1028 2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe 2812 svchost.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1028 wrote to memory of 2068 1028 2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe 85 PID 1028 wrote to memory of 2068 1028 2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe 85 PID 1028 wrote to memory of 2068 1028 2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe 85 PID 1028 wrote to memory of 2068 1028 2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe 85 PID 1028 wrote to memory of 2068 1028 2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe 85 PID 1028 wrote to memory of 2068 1028 2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe 85 PID 1028 wrote to memory of 2068 1028 2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe 85 PID 1028 wrote to memory of 2068 1028 2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe 85 PID 1028 wrote to memory of 2068 1028 2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe 85 PID 1028 wrote to memory of 2068 1028 2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe 85 PID 1028 wrote to memory of 2068 1028 2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe 85 PID 1028 wrote to memory of 2068 1028 2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe 85 PID 1028 wrote to memory of 2068 1028 2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe 85 PID 2068 wrote to memory of 2812 2068 2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe 86 PID 2068 wrote to memory of 2812 2068 2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe 86 PID 2068 wrote to memory of 2812 2068 2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe 86 PID 2812 wrote to memory of 1732 2812 svchost.exe 87 PID 2812 wrote to memory of 1732 2812 svchost.exe 87 PID 2812 wrote to memory of 1732 2812 svchost.exe 87 PID 2812 wrote to memory of 1732 2812 svchost.exe 87 PID 2812 wrote to memory of 1732 2812 svchost.exe 87 PID 2812 wrote to memory of 1732 2812 svchost.exe 87 PID 2812 wrote to memory of 1732 2812 svchost.exe 87 PID 2812 wrote to memory of 1732 2812 svchost.exe 87 PID 2812 wrote to memory of 1732 2812 svchost.exe 87 PID 2812 wrote to memory of 1732 2812 svchost.exe 87 PID 2812 wrote to memory of 1732 2812 svchost.exe 87 PID 2812 wrote to memory of 1732 2812 svchost.exe 87 PID 2812 wrote to memory of 1732 2812 svchost.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\2534418578f45b8c36147bc57c00d82c_JaffaCakes118.exe2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exeC:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe4⤵
- Executes dropped EXE
PID:1732
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD52534418578f45b8c36147bc57c00d82c
SHA102b85f42b1c1f929c2143fb871cb081bd0f4b3b4
SHA256e914b8f284828ae7171187d3701c37e382484e0874f982cbb0a6add3a1abfaa4
SHA5128c70191537e780934a17ca65c995f8dddf310725728dae41ff6b5e2a6316915def5fb3e161c34635c2de949695bc031018bfc3f007b22ccf38a2fc743ddb12e0