Analysis
-
max time kernel
96s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 17:05
Static task
static1
Behavioral task
behavioral1
Sample
30fd44f0df5d08a1c21fff70bff456d4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
30fd44f0df5d08a1c21fff70bff456d4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
30fd44f0df5d08a1c21fff70bff456d4_JaffaCakes118.exe
-
Size
92KB
-
MD5
30fd44f0df5d08a1c21fff70bff456d4
-
SHA1
0c5fab766212a9dabb05f0a45f19b4cc4a017785
-
SHA256
ed2e4e544de2304b9dfc352737b964202706fd5d669c57d6b35eba85cc2cda11
-
SHA512
4d63cb80e500f669957503a7bf48ef66ce8a7880a63686569152e0247120836d43966d69894c9ef640d2daf902ef65e9bd9a320a2aac0c4f6315f2b726ac4284
-
SSDEEP
768:gtly7VQJBIg9NSqOiNxX+AvivdFrDwh08SaYPDglcfe7A+O2IBlZ8obPvdti8/du:gto7VQDyiNx+FdFrDwzlvAejTq4CTP7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 30fd44f0df5d08a1c21fff70bff456d4_JaffaCakes118.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 30fd44f0df5d08a1c21fff70bff456d4_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 30fd44f0df5d08a1c21fff70bff456d4_JaffaCakes118.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3476 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30fd44f0df5d08a1c21fff70bff456d4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3476 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1028 30fd44f0df5d08a1c21fff70bff456d4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1028 wrote to memory of 3784 1028 30fd44f0df5d08a1c21fff70bff456d4_JaffaCakes118.exe 86 PID 1028 wrote to memory of 3784 1028 30fd44f0df5d08a1c21fff70bff456d4_JaffaCakes118.exe 86 PID 1028 wrote to memory of 3784 1028 30fd44f0df5d08a1c21fff70bff456d4_JaffaCakes118.exe 86 PID 3784 wrote to memory of 3476 3784 cmd.exe 88 PID 3784 wrote to memory of 3476 3784 cmd.exe 88 PID 3784 wrote to memory of 3476 3784 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\30fd44f0df5d08a1c21fff70bff456d4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\30fd44f0df5d08a1c21fff70bff456d4_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 30fd44f0df5d08a1c21fff70bff456d4_J2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3476
-
-