Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe
-
Size
120KB
-
MD5
41129ca9c4a2816e4c5a745cc4b62b94
-
SHA1
4cbaf0b4eb2c32c9a396b44216afab18f0aa2ca9
-
SHA256
f63e42990c20419aacbc5df21562ad512a227efa8b8f8be986a5fcbc5901e446
-
SHA512
93b1442bbbcbe8b3c3aa5c4aabcbc5af3c3a045f281745d7ed3749324cbf81769cbb5904135e0dab537f4697d06f1195489b6b7aef4c56b42254dc18be9e8cfc
-
SSDEEP
768:66M96MuZw+V0dQd3zKipFJyHX3NRb3wLpS/bnuooVokckCady8Hy999999F:hMgMu6YYKUHNRb3YwDnHDkXFS999999F
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2308 arx32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\web\arx32.exe 41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe File created C:\Windows\web\arx32.exe 41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1332 41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe 1332 41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe 1332 41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe 1332 41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe 1332 41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe 1332 41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe 1332 41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe 1332 41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe 1332 41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe 1332 41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe 1332 41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe 1332 41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe 1332 41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe 1332 41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe 1332 41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe 1332 41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe 2308 arx32.exe 2308 arx32.exe 2308 arx32.exe 2308 arx32.exe 2308 arx32.exe 2308 arx32.exe 2308 arx32.exe 2308 arx32.exe 2308 arx32.exe 2308 arx32.exe 2308 arx32.exe 2308 arx32.exe 2308 arx32.exe 2308 arx32.exe 2308 arx32.exe 2308 arx32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1332 wrote to memory of 2308 1332 41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe 85 PID 1332 wrote to memory of 2308 1332 41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe 85 PID 1332 wrote to memory of 2308 1332 41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe 85 PID 2308 wrote to memory of 208 2308 arx32.exe 86 PID 2308 wrote to memory of 208 2308 arx32.exe 86 PID 2308 wrote to memory of 208 2308 arx32.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\41129ca9c4a2816e4c5a745cc4b62b94_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\web\arx32.exe"C:\Windows\web\arx32.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\reg.exereg add "hkcu\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v "load" /t reg_sz /d "C:\Windows\web\arx32.exe" /f3⤵
- System Location Discovery: System Language Discovery
PID:208
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD541129ca9c4a2816e4c5a745cc4b62b94
SHA14cbaf0b4eb2c32c9a396b44216afab18f0aa2ca9
SHA256f63e42990c20419aacbc5df21562ad512a227efa8b8f8be986a5fcbc5901e446
SHA51293b1442bbbcbe8b3c3aa5c4aabcbc5af3c3a045f281745d7ed3749324cbf81769cbb5904135e0dab537f4697d06f1195489b6b7aef4c56b42254dc18be9e8cfc