Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
3de0e6bfc570cbc642a0fee4eabaf9e6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3de0e6bfc570cbc642a0fee4eabaf9e6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3de0e6bfc570cbc642a0fee4eabaf9e6_JaffaCakes118.exe
-
Size
61KB
-
MD5
3de0e6bfc570cbc642a0fee4eabaf9e6
-
SHA1
478430904c3c74a610bc2f0a9764cfee7232a8fe
-
SHA256
6a31ddc622f468f28fb5444b138703eef159c3ac7f50d2b890a043abb7a0a227
-
SHA512
a0d8122fde10c9e21d9a773040329d29e9c1de68ea40c6c392205e5c1791bc793e971d73b775d37230667fa88b2607b7912b50c599749c6d234b7a9448c72078
-
SSDEEP
768:6cTPet5SQ/zOCjpLYL3C9JKT9OZ7Vo3LrryyJN5ScQvGciYP:yHLC3qs9OxV7C5g+IP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation instsp2.exe -
Executes dropped EXE 1 IoCs
pid Process 4988 instsp2.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
resource yara_rule behavioral2/files/0x000c000000023ba4-2.dat upx behavioral2/memory/4988-3-0x00000000003E0000-0x000000000040C000-memory.dmp upx behavioral2/memory/4988-6-0x00000000003E0000-0x000000000040C000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\instsp2.exe 3de0e6bfc570cbc642a0fee4eabaf9e6_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3de0e6bfc570cbc642a0fee4eabaf9e6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language instsp2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3904 3de0e6bfc570cbc642a0fee4eabaf9e6_JaffaCakes118.exe 3904 3de0e6bfc570cbc642a0fee4eabaf9e6_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4988 instsp2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3904 wrote to memory of 4988 3904 3de0e6bfc570cbc642a0fee4eabaf9e6_JaffaCakes118.exe 83 PID 3904 wrote to memory of 4988 3904 3de0e6bfc570cbc642a0fee4eabaf9e6_JaffaCakes118.exe 83 PID 3904 wrote to memory of 4988 3904 3de0e6bfc570cbc642a0fee4eabaf9e6_JaffaCakes118.exe 83 PID 4988 wrote to memory of 3560 4988 instsp2.exe 87 PID 4988 wrote to memory of 3560 4988 instsp2.exe 87 PID 4988 wrote to memory of 3560 4988 instsp2.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\3de0e6bfc570cbc642a0fee4eabaf9e6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3de0e6bfc570cbc642a0fee4eabaf9e6_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\instsp2.exeC:\Windows\instsp2.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\instsp2.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:3560
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD521feb3263c9757a9c71ef036e2054021
SHA197b8fe92b86cea54f9fd86cc30fe290b3c9fe39f
SHA256700d53f76399213fdfccd5650ef238593583380317fcb2344a95b7282eab4d39
SHA512c30e44065f71af39ee1bb5e5b2e5be2fc9339e4c4611ec70564003d9b97e7ebd5825f5ed555c124cee31e753ed973ff8bf44818cfdbd936ab4ba6db88a13e47c