Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 06:41
Static task
static1
Behavioral task
behavioral1
Sample
3e5c938ad6302c14b1f7c6797a3eb2be_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3e5c938ad6302c14b1f7c6797a3eb2be_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3e5c938ad6302c14b1f7c6797a3eb2be_JaffaCakes118.exe
-
Size
78KB
-
MD5
3e5c938ad6302c14b1f7c6797a3eb2be
-
SHA1
2f46ad2960e5f2f1c09ca91b75c36b772dc1eedf
-
SHA256
ab00d908e860746759c34a2727516c05d0208c3bbeee3a7c9d59c2eace36ce02
-
SHA512
6385e2a41549c0df9ff95d7e7b6327873a713d54466dc069103f3b378f1ce1f63b3fd3766c8c80701495fe8fd6b63073b5a7f95cc206ef054eabb7c4548c0b94
-
SSDEEP
1536:jRCHF3M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtek9/G1tL:jRCHF8hASyRxvhTzXPvCbW2Uek9/O
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 3e5c938ad6302c14b1f7c6797a3eb2be_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 212 tmpA19F.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmpA19F.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e5c938ad6302c14b1f7c6797a3eb2be_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpA19F.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2796 3e5c938ad6302c14b1f7c6797a3eb2be_JaffaCakes118.exe Token: SeDebugPrivilege 212 tmpA19F.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2796 wrote to memory of 1732 2796 3e5c938ad6302c14b1f7c6797a3eb2be_JaffaCakes118.exe 85 PID 2796 wrote to memory of 1732 2796 3e5c938ad6302c14b1f7c6797a3eb2be_JaffaCakes118.exe 85 PID 2796 wrote to memory of 1732 2796 3e5c938ad6302c14b1f7c6797a3eb2be_JaffaCakes118.exe 85 PID 1732 wrote to memory of 2284 1732 vbc.exe 88 PID 1732 wrote to memory of 2284 1732 vbc.exe 88 PID 1732 wrote to memory of 2284 1732 vbc.exe 88 PID 2796 wrote to memory of 212 2796 3e5c938ad6302c14b1f7c6797a3eb2be_JaffaCakes118.exe 90 PID 2796 wrote to memory of 212 2796 3e5c938ad6302c14b1f7c6797a3eb2be_JaffaCakes118.exe 90 PID 2796 wrote to memory of 212 2796 3e5c938ad6302c14b1f7c6797a3eb2be_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e5c938ad6302c14b1f7c6797a3eb2be_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3e5c938ad6302c14b1f7c6797a3eb2be_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\a1gpsuo-.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA306.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc5F182B833D0454AA071D8BFBE17BB1C.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2284
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpA19F.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpA19F.tmp.exe" C:\Users\Admin\AppData\Local\Temp\3e5c938ad6302c14b1f7c6797a3eb2be_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51b72e6d626f5707361a0fa798bf11c34
SHA15b35f2ad9ca6360e42d2b7ad87eeb74b7e4a9573
SHA25644f3e683086c67673438aca3009f7023286474e2870fe4eb4204b0add47a9f50
SHA512e96f6cd95e4a8a001afd832825595cceec9b07227945298ee8951e1ae9342ec36e5070c9477fa982467f0a20dfde5f03c999fa9da7798a04d54db28ccebb0ea8
-
Filesize
15KB
MD5877742ce206e19958dcb762eb2e42db8
SHA1e1b4bcd81fb0a5e30a99142197a5c5f518555e80
SHA256452d06e54a7807b520d8b2e7715c4193c92958ece60a972a1fa5a6923fc7ac3b
SHA512b8a7d8a6735c74ec7149ad0efdb443f7b938d0911337fc191ebdd2532aa1892c1d5ac7d5c1e4487a9fc1ec3ef5634020ffd35651ffd6c517ad4732c447610cee
-
Filesize
266B
MD5b68f2c1c4088effb7955c85ea7f1bebe
SHA1e89e172ac826d615ee17c59e89db456b2e929fe3
SHA25631ee11da0ff1e09eda63d0dd18bd40d289ac37a49dbbfac8ed1e96adcc6d1b76
SHA512f9a1cef756d082f0c9ed79eca1a4ed301ef9cd0fbd8a5dd6d5284cd48230c17419303142c5630b215b2f14218750da943aaca65cb65391b2cceedfa1496e5d7a
-
Filesize
78KB
MD5209f1ed9337a8fd367c6e58fe47f68a1
SHA167c7de5a1e7a60b6aeeaef291538e2cc6955e2d8
SHA2567dc33462555f28cc541e50ceb89bd9580ad2c3dd1590984a79ee51069ca40699
SHA512535f450f4cfd8fd57aa4d51bd55c4e6df4e8dfbc48df7c76ba463e3222d55987363715797cc99f3b78b399b26163290c4754a6680a7d0de1050a73050eeba079
-
Filesize
660B
MD5fdf09d8fac9fd162cfcca273d43eb8a2
SHA1772dfb0d0b10e1058735a9aa221181d42e66968b
SHA256cd682108b4071d677ec6f40d23a5caa49a1eaad5d47bd1b91953ab276d62a7d7
SHA51290e7b835fca87cd8921d52f5aa09fada4c3153f991de0f5969940f2135db7c216100a2a0b4dab78f7bed677649838298c25d4b1a124d3537e16c5d09b6d8a94c
-
Filesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c