Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 03:03
Static task
static1
Behavioral task
behavioral1
Sample
29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe
-
Size
672KB
-
MD5
29aa9c4be6616e48f041f9f81dedb75e
-
SHA1
4aa2643ae02f690c9b6220f422927d0956a4914c
-
SHA256
0176bb4179cbc06415449611666ee9035bcc564a554d449f5404363a05bfdfbb
-
SHA512
e911d3652e8e4dc55ecd625e8f589833d5a2f51b91f90374ce96dd4caf9ff76f6c2b3cdaab7896d9fa213f9d4d440505c1d292c5c1f2e163423026e822e2148a
-
SSDEEP
12288:8kQ4PIcBqHybSce3dhPq5nd+qsT1Z7LrA2rItSaItS/:85QIzHyuhiDyrProSaoS/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 116 ¼¦¸ç¸ßÊÖ¼üλ±ä»»(ÐÂÊÖÎóÓÃ).exe 2536 ÐÂ!¸ßÊÖ¼üλ±ä»».exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: ÐÂ!¸ßÊÖ¼üλ±ä»».exe File opened (read-only) \??\D: ¼¦¸ç¸ßÊÖ¼üλ±ä»»(ÐÂÊÖÎóÓÃ).exe -
resource yara_rule behavioral2/files/0x000c000000023b88-5.dat upx behavioral2/memory/116-11-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/files/0x0008000000023c71-16.dat upx behavioral2/memory/2536-18-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/116-20-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/2536-22-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/2536-23-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/116-25-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/116-26-0x0000000000400000-0x0000000000424000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ¼¦¸ç¸ßÊÖ¼üλ±ä»»(ÐÂÊÖÎóÓÃ).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ÐÂ!¸ßÊÖ¼üλ±ä»».exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5008 wrote to memory of 116 5008 29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe 86 PID 5008 wrote to memory of 116 5008 29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe 86 PID 5008 wrote to memory of 116 5008 29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe 86 PID 5008 wrote to memory of 2536 5008 29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe 87 PID 5008 wrote to memory of 2536 5008 29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe 87 PID 5008 wrote to memory of 2536 5008 29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\¼¦¸ç¸ßÊÖ¼üλ±ä»»(ÐÂÊÖÎóÓÃ).exe"C:\Users\Admin\AppData\Local\Temp\¼¦¸ç¸ßÊÖ¼üλ±ä»»(ÐÂÊÖÎóÓÃ).exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:116
-
-
C:\Users\Admin\AppData\Local\Temp\ÐÂ!¸ßÊÖ¼üλ±ä»».exe"C:\Users\Admin\AppData\Local\Temp\ÐÂ!¸ßÊÖ¼üλ±ä»».exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD57577313a4d641886e0ad54ebbcdcabcb
SHA18dfc408292357397130b6f5950a49ebac6ffb568
SHA2566cc49a1ab3c9553d81d0056e875776389e5c052fa9fbe202be1ad3e0980c7d0e
SHA512386ae7f42f13d953c9103d2eac8aee381efac341b3f4241f35429f5d68651adfb6803e01512c067dfbb288957caa1cf6b3346e85f8b7b37ed09bfaed30df0cb8
-
Filesize
52KB
MD5069fa268827d3ee36d680a606c5a7da3
SHA1d63c6761615d64ac6c0d5f7368716ae22cbf8024
SHA2563d3bd4691ae6596d7e5eb46857417cf70a74a07a3cc10583eccadeb4cd3595fd
SHA5124dea24f3d2d4692fab4714991a70fb37f5bcab80578ceeff107b9a1b4646c22465be099144576980acde529840f13dec6c09f1d2c65c36c7ada6fd6ec67a060d