Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 23:05
Static task
static1
Behavioral task
behavioral1
Sample
374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe
-
Size
97KB
-
MD5
374233e7322071a22486cdbaffbcb6d4
-
SHA1
a09dad6765cfbe0021ba3a1f040431be6f02d214
-
SHA256
e6f28175ba508818aac93c59b56a932623b289d3ef4de600d048829b0a7fa04a
-
SHA512
e41d134e6a6c8ab7775ca7d9c219952cf5ab0d29aebc6278009d08474a01a67795079f1528085455625be881a46b6def7fa16e1937188243b10158424f4f6a25
-
SSDEEP
3072:6Sq579Zdq8ohVr4KVSgyL2bkf7Nf5MBzLVpagMR3H40BHHw+ZH/CzVvqhLxYF:3fT7HYMBzLVpagMR3H40BHHw+ZH/8Vvv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation csrs.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation winIogon.exe -
Executes dropped EXE 3 IoCs
pid Process 5028 winIogon.exe 2328 csrs.exe 1760 spooIsv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows DLL Loader = "C:\\Windows\\system32\\spooIsv.exe" spooIsv.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\csrs.exe winIogon.exe File opened for modification C:\Windows\SysWOW64\csrs.exe winIogon.exe File created C:\Windows\SysWOW64\winIogon.exe 374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\winIogon.exe 374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe File created C:\Windows\SysWOW64\oiceery.bat winIogon.exe File created C:\Windows\SysWOW64\spooIsv.exe csrs.exe File opened for modification C:\Windows\SysWOW64\spooIsv.exe csrs.exe File created C:\Windows\SysWOW64\jchl.bat csrs.exe File created C:\Windows\SysWOW64\spooIsv.exe spooIsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winIogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spooIsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4144 wrote to memory of 2140 4144 374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe 86 PID 4144 wrote to memory of 2140 4144 374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe 86 PID 4144 wrote to memory of 2140 4144 374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe 86 PID 4144 wrote to memory of 5028 4144 374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe 88 PID 4144 wrote to memory of 5028 4144 374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe 88 PID 4144 wrote to memory of 5028 4144 374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe 88 PID 5028 wrote to memory of 4980 5028 winIogon.exe 89 PID 5028 wrote to memory of 4980 5028 winIogon.exe 89 PID 5028 wrote to memory of 4980 5028 winIogon.exe 89 PID 5028 wrote to memory of 2328 5028 winIogon.exe 91 PID 5028 wrote to memory of 2328 5028 winIogon.exe 91 PID 5028 wrote to memory of 2328 5028 winIogon.exe 91 PID 2328 wrote to memory of 4744 2328 csrs.exe 92 PID 2328 wrote to memory of 4744 2328 csrs.exe 92 PID 2328 wrote to memory of 4744 2328 csrs.exe 92 PID 2328 wrote to memory of 1760 2328 csrs.exe 94 PID 2328 wrote to memory of 1760 2328 csrs.exe 94 PID 2328 wrote to memory of 1760 2328 csrs.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\riakoy.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2140
-
-
C:\Windows\SysWOW64\winIogon.exeC:\Windows\system32\winIogon.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\SysWOW64\oiceery.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4980
-
-
C:\Windows\SysWOW64\csrs.exeC:\Windows\system32\csrs.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\SysWOW64\jchl.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:4744
-
-
C:\Windows\SysWOW64\spooIsv.exeC:\Windows\system32\spooIsv.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1760
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
242B
MD5c3f5c39391e0694dfdf07da36fdc0266
SHA12333a2cb10e73423b10791abab397a15541674c9
SHA2563a5c8ec18be8c55563defce6d08f1512f0c2efa0f855997184432c7b5a3050a3
SHA512825d3c4287204900bad752448eb8f67596df027a38490fcc480a31172b67e8935772954dbcc7d31da737ff36dc7e477f4f32331827e0ad48573b01cecb21e665
-
Filesize
114B
MD54b75191399b0e82aaa419dee7f5ca624
SHA1ff9ad4ee84740a6bc8fb4823ee81748377a09564
SHA256bebbd5b9b83eec6308cf0604a9675c02f3f45be57002257107715c2882f31963
SHA51242ada85e923243202225b9e6924229dc565793259a7dd114380d860958478929697f86753a5a103d1f2d9d7df39983c9d3e0d8efa0f91e55697a51dca00289d4
-
Filesize
129B
MD57436993e6fd2d89f01d4e8e7859dec9a
SHA1c55d54009e7b8402cddfeb03a1d968953728d9ca
SHA256a18e9a1214e1e01c23880da76c3fb02ca3cd8caed8ebc2781bf8eae1622ecddc
SHA512284c2256646ba6b3767fbe311f637a35537a189274fe536f2d58396f07712fca0b2722808438073074e893da4847c7199479e7f875a573ed40028e565e3d70ab
-
Filesize
97KB
MD5374233e7322071a22486cdbaffbcb6d4
SHA1a09dad6765cfbe0021ba3a1f040431be6f02d214
SHA256e6f28175ba508818aac93c59b56a932623b289d3ef4de600d048829b0a7fa04a
SHA512e41d134e6a6c8ab7775ca7d9c219952cf5ab0d29aebc6278009d08474a01a67795079f1528085455625be881a46b6def7fa16e1937188243b10158424f4f6a25