Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
3bee4852c699d00487863ad632024170_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
3bee4852c699d00487863ad632024170_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
3bee4852c699d00487863ad632024170
-
SHA1
1333d8ef2ca8b8252de4958752376b8d1408e1d7
-
SHA256
995605a4cc3598dde1a301cdf177514cdc6dcce2c8155f5f2bec753e56cbc48d
-
SHA512
f4a0b630b5aee623514a393388d5909d1a7aa6d63ee5ddb3ec9bf875f051b92e73008554179e3f23fe9e7ec005503ec8290a82f9d85ba231d491af0a3532dbd0
-
SSDEEP
1536:zIpv7+fwehaRivCVr0Ivr0evJi4WWlxw5tOpvFrP+D2cFnoh:MpvScYCl19YdWlxmovZ2DLF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 3bee4852c699d00487863ad632024170_JaffaCakes118.exe -
Executes dropped EXE 7 IoCs
pid Process 2532 winlogon.exe 216 winlogon.exe 5008 winlogon.exe 4908 winlogon.exe 4436 winlogon.exe 5080 winlogon.exe 2936 winlogon.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 1784 set thread context of 1532 1784 3bee4852c699d00487863ad632024170_JaffaCakes118.exe 84 PID 2532 set thread context of 216 2532 winlogon.exe 90 PID 216 set thread context of 5008 216 winlogon.exe 92 PID 216 set thread context of 4908 216 winlogon.exe 99 PID 216 set thread context of 4436 216 winlogon.exe 104 PID 216 set thread context of 5080 216 winlogon.exe 107 PID 216 set thread context of 2936 216 winlogon.exe 110 -
resource yara_rule behavioral2/memory/1532-0-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/1532-2-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/1532-4-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/1532-5-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/1532-18-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/216-29-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/216-35-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/216-40-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/216-45-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/216-50-0x0000000000400000-0x0000000000419000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 2516 5008 WerFault.exe 92 1228 4908 WerFault.exe 99 3452 4436 WerFault.exe 104 4552 5080 WerFault.exe 107 2676 2936 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bee4852c699d00487863ad632024170_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bee4852c699d00487863ad632024170_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1532 3bee4852c699d00487863ad632024170_JaffaCakes118.exe 216 winlogon.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1784 wrote to memory of 4580 1784 3bee4852c699d00487863ad632024170_JaffaCakes118.exe 83 PID 1784 wrote to memory of 4580 1784 3bee4852c699d00487863ad632024170_JaffaCakes118.exe 83 PID 1784 wrote to memory of 4580 1784 3bee4852c699d00487863ad632024170_JaffaCakes118.exe 83 PID 1784 wrote to memory of 1532 1784 3bee4852c699d00487863ad632024170_JaffaCakes118.exe 84 PID 1784 wrote to memory of 1532 1784 3bee4852c699d00487863ad632024170_JaffaCakes118.exe 84 PID 1784 wrote to memory of 1532 1784 3bee4852c699d00487863ad632024170_JaffaCakes118.exe 84 PID 1784 wrote to memory of 1532 1784 3bee4852c699d00487863ad632024170_JaffaCakes118.exe 84 PID 1784 wrote to memory of 1532 1784 3bee4852c699d00487863ad632024170_JaffaCakes118.exe 84 PID 1784 wrote to memory of 1532 1784 3bee4852c699d00487863ad632024170_JaffaCakes118.exe 84 PID 1784 wrote to memory of 1532 1784 3bee4852c699d00487863ad632024170_JaffaCakes118.exe 84 PID 1784 wrote to memory of 1532 1784 3bee4852c699d00487863ad632024170_JaffaCakes118.exe 84 PID 1532 wrote to memory of 2532 1532 3bee4852c699d00487863ad632024170_JaffaCakes118.exe 88 PID 1532 wrote to memory of 2532 1532 3bee4852c699d00487863ad632024170_JaffaCakes118.exe 88 PID 1532 wrote to memory of 2532 1532 3bee4852c699d00487863ad632024170_JaffaCakes118.exe 88 PID 2532 wrote to memory of 3988 2532 winlogon.exe 89 PID 2532 wrote to memory of 3988 2532 winlogon.exe 89 PID 2532 wrote to memory of 3988 2532 winlogon.exe 89 PID 2532 wrote to memory of 216 2532 winlogon.exe 90 PID 2532 wrote to memory of 216 2532 winlogon.exe 90 PID 2532 wrote to memory of 216 2532 winlogon.exe 90 PID 2532 wrote to memory of 216 2532 winlogon.exe 90 PID 2532 wrote to memory of 216 2532 winlogon.exe 90 PID 2532 wrote to memory of 216 2532 winlogon.exe 90 PID 2532 wrote to memory of 216 2532 winlogon.exe 90 PID 2532 wrote to memory of 216 2532 winlogon.exe 90 PID 216 wrote to memory of 5008 216 winlogon.exe 92 PID 216 wrote to memory of 5008 216 winlogon.exe 92 PID 216 wrote to memory of 5008 216 winlogon.exe 92 PID 216 wrote to memory of 5008 216 winlogon.exe 92 PID 216 wrote to memory of 5008 216 winlogon.exe 92 PID 216 wrote to memory of 5008 216 winlogon.exe 92 PID 216 wrote to memory of 5008 216 winlogon.exe 92 PID 216 wrote to memory of 5008 216 winlogon.exe 92 PID 216 wrote to memory of 4908 216 winlogon.exe 99 PID 216 wrote to memory of 4908 216 winlogon.exe 99 PID 216 wrote to memory of 4908 216 winlogon.exe 99 PID 216 wrote to memory of 4908 216 winlogon.exe 99 PID 216 wrote to memory of 4908 216 winlogon.exe 99 PID 216 wrote to memory of 4908 216 winlogon.exe 99 PID 216 wrote to memory of 4908 216 winlogon.exe 99 PID 216 wrote to memory of 4908 216 winlogon.exe 99 PID 216 wrote to memory of 4436 216 winlogon.exe 104 PID 216 wrote to memory of 4436 216 winlogon.exe 104 PID 216 wrote to memory of 4436 216 winlogon.exe 104 PID 216 wrote to memory of 4436 216 winlogon.exe 104 PID 216 wrote to memory of 4436 216 winlogon.exe 104 PID 216 wrote to memory of 4436 216 winlogon.exe 104 PID 216 wrote to memory of 4436 216 winlogon.exe 104 PID 216 wrote to memory of 4436 216 winlogon.exe 104 PID 216 wrote to memory of 5080 216 winlogon.exe 107 PID 216 wrote to memory of 5080 216 winlogon.exe 107 PID 216 wrote to memory of 5080 216 winlogon.exe 107 PID 216 wrote to memory of 5080 216 winlogon.exe 107 PID 216 wrote to memory of 5080 216 winlogon.exe 107 PID 216 wrote to memory of 5080 216 winlogon.exe 107 PID 216 wrote to memory of 5080 216 winlogon.exe 107 PID 216 wrote to memory of 5080 216 winlogon.exe 107 PID 216 wrote to memory of 2936 216 winlogon.exe 110 PID 216 wrote to memory of 2936 216 winlogon.exe 110 PID 216 wrote to memory of 2936 216 winlogon.exe 110 PID 216 wrote to memory of 2936 216 winlogon.exe 110 PID 216 wrote to memory of 2936 216 winlogon.exe 110 PID 216 wrote to memory of 2936 216 winlogon.exe 110 PID 216 wrote to memory of 2936 216 winlogon.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bee4852c699d00487863ad632024170_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3bee4852c699d00487863ad632024170_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe2⤵PID:4580
-
-
C:\Users\Admin\AppData\Local\Temp\3bee4852c699d00487863ad632024170_JaffaCakes118.exe
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe4⤵PID:3988
-
-
C:\Users\Admin\E696D64614\winlogon.exe
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:5008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 126⤵
- Program crash
PID:2516
-
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:4908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 126⤵
- Program crash
PID:1228
-
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:4436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 126⤵
- Program crash
PID:3452
-
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:5080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 126⤵
- Program crash
PID:4552
-
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:2936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 126⤵
- Program crash
PID:2676
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5008 -ip 50081⤵PID:2704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4908 -ip 49081⤵PID:3724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4436 -ip 44361⤵PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5080 -ip 50801⤵PID:1936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2936 -ip 29361⤵PID:2848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD53bee4852c699d00487863ad632024170
SHA11333d8ef2ca8b8252de4958752376b8d1408e1d7
SHA256995605a4cc3598dde1a301cdf177514cdc6dcce2c8155f5f2bec753e56cbc48d
SHA512f4a0b630b5aee623514a393388d5909d1a7aa6d63ee5ddb3ec9bf875f051b92e73008554179e3f23fe9e7ec005503ec8290a82f9d85ba231d491af0a3532dbd0