Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 15:25
Static task
static1
Behavioral task
behavioral1
Sample
357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe
-
Size
164KB
-
MD5
357f765c8a9933ba3d7a4648ecd5d0f3
-
SHA1
b6c236cf63f9eb754af4174bdf15b06323899fbd
-
SHA256
77b8a767e24da266946c335b5cfdcd599a14a7b13b78e335e29aedcd04c170a9
-
SHA512
fab7ff68711f58c2247c4a670c6ac41af27f4b52fa1b5918c01ef9eecb4a1e751deabbc29d993053d92ef4f23d8794144deeba0583a53f88c0e86eb2e5c6ac96
-
SSDEEP
3072:oqkCzLqWf6CYXHnWNKmp9pj6l7fyp3ZOWHh1z/a:olCzL72Xn/mljtkUhpi
Malware Config
Extracted
tofsee
94.75.255.140
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3440 rjj.exe 4808 rjj.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\rjj.exe\" /r" 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4464 set thread context of 3692 4464 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 84 PID 3440 set thread context of 4808 3440 rjj.exe 86 PID 4808 set thread context of 4164 4808 rjj.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4288 4164 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4464 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4464 wrote to memory of 3692 4464 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 84 PID 4464 wrote to memory of 3692 4464 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 84 PID 4464 wrote to memory of 3692 4464 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 84 PID 4464 wrote to memory of 3692 4464 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 84 PID 4464 wrote to memory of 3692 4464 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 84 PID 4464 wrote to memory of 3692 4464 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 84 PID 4464 wrote to memory of 3692 4464 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 84 PID 4464 wrote to memory of 3692 4464 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 84 PID 3692 wrote to memory of 3440 3692 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 85 PID 3692 wrote to memory of 3440 3692 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 85 PID 3692 wrote to memory of 3440 3692 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 85 PID 3440 wrote to memory of 4808 3440 rjj.exe 86 PID 3440 wrote to memory of 4808 3440 rjj.exe 86 PID 3440 wrote to memory of 4808 3440 rjj.exe 86 PID 3440 wrote to memory of 4808 3440 rjj.exe 86 PID 3440 wrote to memory of 4808 3440 rjj.exe 86 PID 3440 wrote to memory of 4808 3440 rjj.exe 86 PID 3440 wrote to memory of 4808 3440 rjj.exe 86 PID 3440 wrote to memory of 4808 3440 rjj.exe 86 PID 4808 wrote to memory of 4164 4808 rjj.exe 87 PID 4808 wrote to memory of 4164 4808 rjj.exe 87 PID 4808 wrote to memory of 4164 4808 rjj.exe 87 PID 4808 wrote to memory of 4164 4808 rjj.exe 87 PID 4808 wrote to memory of 4164 4808 rjj.exe 87 PID 3692 wrote to memory of 32 3692 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 91 PID 3692 wrote to memory of 32 3692 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 91 PID 3692 wrote to memory of 32 3692 357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\357f765c8a9933ba3d7a4648ecd5d0f3_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\rjj.exe"C:\Users\Admin\rjj.exe" /r3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\rjj.exe"C:\Users\Admin\rjj.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 3206⤵
- Program crash
PID:4288
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5571.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:32
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4164 -ip 41641⤵PID:864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD5d02e3ae2a394e5ce37bf1f37f4956534
SHA19580772968f9e5063c001262f3296a1f12a0e405
SHA2565e5679fdd2ae4a4879d2dd2649e26cab703ac807bf6f27cd25989c1c9d9dbaa3
SHA512a328956bf1979b67ff9818b8b618f2a9ebbce71d2e7718e2fbb75687b5931d270300b97adf5ab82555d2da699170300925972b0f32e6f8ec9f4974d83983f6e1
-
Filesize
164KB
MD5357f765c8a9933ba3d7a4648ecd5d0f3
SHA1b6c236cf63f9eb754af4174bdf15b06323899fbd
SHA25677b8a767e24da266946c335b5cfdcd599a14a7b13b78e335e29aedcd04c170a9
SHA512fab7ff68711f58c2247c4a670c6ac41af27f4b52fa1b5918c01ef9eecb4a1e751deabbc29d993053d92ef4f23d8794144deeba0583a53f88c0e86eb2e5c6ac96