Analysis
-
max time kernel
139s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 21:28
Static task
static1
Behavioral task
behavioral1
Sample
44440e401570051687836a66db56acf5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
44440e401570051687836a66db56acf5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$_3_.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$_3_.exe
Resource
win10v2004-20241007-en
General
-
Target
44440e401570051687836a66db56acf5_JaffaCakes118.exe
-
Size
967KB
-
MD5
44440e401570051687836a66db56acf5
-
SHA1
5617d7e18e5dc0cbb3ae426da5123c69c4086c12
-
SHA256
fc6f7469250f0c1db4913ab073ee6029031b5f46d0053405238610ffea6c891d
-
SHA512
ba3b8c7b04b53db8aa13bd16256fc9d1cc6ad69cb9e4d87e8a7bb3f228b438c7ccf2e6f3101f39e47f51afd3c7b838f51e5be520f1eeda02c9812a7590fa31e7
-
SSDEEP
24576:ctXCT35bEN60Yc/rMegvH6RK1aeGokgwHG:cKBtV6MjvH6RIrDCG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation internal44440e401570051687836a66db56acf5_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2400 internal44440e401570051687836a66db56acf5_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44440e401570051687836a66db56acf5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language internal44440e401570051687836a66db56acf5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4040 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4040 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2400 internal44440e401570051687836a66db56acf5_JaffaCakes118.exe 2400 internal44440e401570051687836a66db56acf5_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2400 internal44440e401570051687836a66db56acf5_JaffaCakes118.exe 2400 internal44440e401570051687836a66db56acf5_JaffaCakes118.exe 2400 internal44440e401570051687836a66db56acf5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2400 2444 44440e401570051687836a66db56acf5_JaffaCakes118.exe 84 PID 2444 wrote to memory of 2400 2444 44440e401570051687836a66db56acf5_JaffaCakes118.exe 84 PID 2444 wrote to memory of 2400 2444 44440e401570051687836a66db56acf5_JaffaCakes118.exe 84 PID 2400 wrote to memory of 2128 2400 internal44440e401570051687836a66db56acf5_JaffaCakes118.exe 92 PID 2400 wrote to memory of 2128 2400 internal44440e401570051687836a66db56acf5_JaffaCakes118.exe 92 PID 2400 wrote to memory of 2128 2400 internal44440e401570051687836a66db56acf5_JaffaCakes118.exe 92 PID 2128 wrote to memory of 4040 2128 cmd.exe 94 PID 2128 wrote to memory of 4040 2128 cmd.exe 94 PID 2128 wrote to memory of 4040 2128 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\44440e401570051687836a66db56acf5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\44440e401570051687836a66db56acf5_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\nsa7AFE.tmp\internal44440e401570051687836a66db56acf5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\nsa7AFE.tmp\internal44440e401570051687836a66db56acf5_JaffaCakes118.exe C:/Users/Admin/AppData/Local/Temp/nsa7AFE.tmp /baseInstaller='C:/Users/Admin/AppData/Local/Temp/44440e401570051687836a66db56acf5_JaffaCakes118.exe' /fallbackfolder='C:/Users/Admin/AppData/Local/Temp/nsa7AFE.tmp/fallbackfiles/'2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\14547.bat" "C:\Users\Admin\AppData\Local\Temp\C41DCC0FA6B34AA1A33E4F668E9EA6D7\""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 1 -w 10004⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4040
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214B
MD5739fcc7ba42b209fe44bea47e7a8c48f
SHA1bc7a448a7c018133edcf012bc94301623eb42c5b
SHA25669017cdbbe68396f45e41d211b22d800cc1afc0eadbd3440873038585020315c
SHA5122b2b130798b0f4e534626b9fb5deaa10bb1930e6700ac0ba7cf151c1bf3239039a7032ea67ceed86a4a4dbe981064c42a8e0f88fe8361e27002dd8ceb0ea767a
-
C:\Users\Admin\AppData\Local\Temp\C41DCC0FA6B34AA1A33E4F668E9EA6D7\C41DCC0FA6B34AA1A33E4F668E9EA6D7_LogFile.txt
Filesize8KB
MD5d4eb83b9c2f9012c227d6071914f4e39
SHA18822cd1ec56560311b9c9a9d42a4b8f01ecff8a6
SHA2566f9d4620e4f3770bee04a30bd7c9b423fcf6c65db93a2034f38ab814895377dc
SHA512a41125e42eb2a8ee1bc7455dec7d2ca3df879d99954fa7de1a007d6cb958a0868bdb9a6e8a312c1c35a09a7845b6d41843f4bfae1af8a53b78e07f2b925bdf25
-
Filesize
121KB
MD5ac46ffc8a99bbf16aa9446a4af531164
SHA1f8acb42ac53c19915f104b9129a6e762318d2eda
SHA2566383f78004c0d48bf1e0c15cfaa95621f57689fcbb9598a38a128f935d4c091a
SHA512650e4d4a426f966ae3d4407d9f129c95638d552ad1c00f5dc18aaf7f14bb6dbb10b002b5127f69119be5b155973e84edd35eaabdd14644681de38a6ac86963af
-
C:\Users\Admin\AppData\Local\Temp\nsa7AFE.tmp\internal44440e401570051687836a66db56acf5_JaffaCakes118.exe
Filesize1.8MB
MD577bfacca17ee1d89833b57f3a746d9a0
SHA1aa9490c913489c5eafd02f67f875efcb56d23036
SHA25638571b0965110d07c6fbf4813ab628d4017cf52c681c457fb3f184b644fb0b52
SHA51221ecc2fce94a58cd39127964730b01722b9dafa20d3af65b023fe83188c08211ba1324849513ffc10b6a359737f98c4d06770dc1954f8880daff938a06581e6f
-
C:\Users\Admin\AppData\Local\Temp\nsa7AFE.tmp\internal44440e401570051687836a66db56acf5_JaffaCakes118_icon.ico
Filesize11KB
MD5592abe695d3fb84c8a7589b0d2553a97
SHA1d70d6de6fa25ca1924bd02b84075ee94f3870133
SHA256ed59d25e5daf4e4c89c09a4c829ac4d12f1b0e258d167760a07bce6266cebda0
SHA512a8c09f8f35790a0bcf4b69ffa7f26eb60b8e14394ecef6a63c1776e538eb749251545dda48f6a7243c91d9779d24b4d774b39dbd966d32e5fa39071fff9a0978
-
C:\Users\Admin\AppData\Local\Temp\nsa7AFE.tmp\internal44440e401570051687836a66db56acf5_JaffaCakes118_splash.png
Filesize136KB
MD50a8589de904eec91522c276d896216c4
SHA158ba5e9158c3afa3c3112fe1e24567996794c07e
SHA256496d42e72d7c57969f584849a8f7366783afd39862f7f71b59d78b723225cd55
SHA512bea912ebc889e6444532beacbe562038b78c918dff9bfa16d7d9a15e25f52ce90e93a6736636926ef7d45e65eb8f73da92149e3188cf5a4b78a8d248b3b0d9fd