Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 05:13
Static task
static1
Behavioral task
behavioral1
Sample
2b79c03d6fcf8125d98c8436e9a07f3a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2b79c03d6fcf8125d98c8436e9a07f3a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2b79c03d6fcf8125d98c8436e9a07f3a_JaffaCakes118.exe
-
Size
16KB
-
MD5
2b79c03d6fcf8125d98c8436e9a07f3a
-
SHA1
ac0b41e4430807da01a3232e8793b36a10b2205c
-
SHA256
2596dd7ff1a0da8a4f4fa31dc35c14e7189cc0e4985935714e5d462559043594
-
SHA512
bdfa281834a2c2482998402e64f3902ca4c1d14460c8ba06e28b3ac1de8e4587cbd3d1f3e1f8f9ef3930b8bd53ebf669ca9b3002f3304dc0ffb24cd2dac70c39
-
SSDEEP
96:kv1nVErQXRHfZCsIbiYYipKccUKxKjLiB45+/piOYC3kEfNqiY:KnVErwm9YRLUrjLiEjOq
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 2b79c03d6fcf8125d98c8436e9a07f3a_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 2b79c03d6fcf8125d98c8436e9a07f3a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b79c03d6fcf8125d98c8436e9a07f3a_JaffaCakes118.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1788 ipconfig.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2240 2b79c03d6fcf8125d98c8436e9a07f3a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1788 2240 2b79c03d6fcf8125d98c8436e9a07f3a_JaffaCakes118.exe 85 PID 2240 wrote to memory of 1788 2240 2b79c03d6fcf8125d98c8436e9a07f3a_JaffaCakes118.exe 85 PID 2240 wrote to memory of 1788 2240 2b79c03d6fcf8125d98c8436e9a07f3a_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b79c03d6fcf8125d98c8436e9a07f3a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2b79c03d6fcf8125d98c8436e9a07f3a_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a48249517f2f7a1b7e87e31b58d676d2
SHA1e7e21a080b40af4df354e6dd2f5451b06870caf0
SHA25618cf01cdfe2084e965e0358192de6b8fb2abdeee6ec47f00e772642e97bc5326
SHA512fc4933d4a84671877e5c61a4b5232e6e1bb9faecb0e45bfb145f9d73be81b9047cf79ebaaaa74b95439b9559688f16f487ff1dc4cc4ba9711f3aea8357d30c73