Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 22:50
Static task
static1
Behavioral task
behavioral1
Sample
44904b504bb03c245a0ded8558001825_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
44904b504bb03c245a0ded8558001825_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
44904b504bb03c245a0ded8558001825_JaffaCakes118.exe
-
Size
14KB
-
MD5
44904b504bb03c245a0ded8558001825
-
SHA1
b6f58a653105190bbe6a5add16585310e4d6d91d
-
SHA256
c3e76855c7dea89cb8b78e75ff95a08e1bcf4f8413ee17ea80c1bbe6e53e5265
-
SHA512
be70291de4f955f376480e293ecbe0635a4067bc0e79e3d85f7150ef40a88ce00dc484a6a4b759bb78580aa0139fdfc807e25c8184f93ebe3b3d8d8cc2ce576d
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhY/:hDXWipuE+K3/SSHgxM
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation DEM1FC3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 44904b504bb03c245a0ded8558001825_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation DEMC68C.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation DEM1D37.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation DEM73A4.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation DEMC985.exe -
Executes dropped EXE 6 IoCs
pid Process 3076 DEMC68C.exe 4208 DEM1D37.exe 4120 DEM73A4.exe 4468 DEMC985.exe 3528 DEM1FC3.exe 4360 DEM764F.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMC985.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM1FC3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM764F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44904b504bb03c245a0ded8558001825_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMC68C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM1D37.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM73A4.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2580 wrote to memory of 3076 2580 44904b504bb03c245a0ded8558001825_JaffaCakes118.exe 95 PID 2580 wrote to memory of 3076 2580 44904b504bb03c245a0ded8558001825_JaffaCakes118.exe 95 PID 2580 wrote to memory of 3076 2580 44904b504bb03c245a0ded8558001825_JaffaCakes118.exe 95 PID 3076 wrote to memory of 4208 3076 DEMC68C.exe 100 PID 3076 wrote to memory of 4208 3076 DEMC68C.exe 100 PID 3076 wrote to memory of 4208 3076 DEMC68C.exe 100 PID 4208 wrote to memory of 4120 4208 DEM1D37.exe 103 PID 4208 wrote to memory of 4120 4208 DEM1D37.exe 103 PID 4208 wrote to memory of 4120 4208 DEM1D37.exe 103 PID 4120 wrote to memory of 4468 4120 DEM73A4.exe 105 PID 4120 wrote to memory of 4468 4120 DEM73A4.exe 105 PID 4120 wrote to memory of 4468 4120 DEM73A4.exe 105 PID 4468 wrote to memory of 3528 4468 DEMC985.exe 115 PID 4468 wrote to memory of 3528 4468 DEMC985.exe 115 PID 4468 wrote to memory of 3528 4468 DEMC985.exe 115 PID 3528 wrote to memory of 4360 3528 DEM1FC3.exe 117 PID 3528 wrote to memory of 4360 3528 DEM1FC3.exe 117 PID 3528 wrote to memory of 4360 3528 DEM1FC3.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\44904b504bb03c245a0ded8558001825_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\44904b504bb03c245a0ded8558001825_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\DEMC68C.exe"C:\Users\Admin\AppData\Local\Temp\DEMC68C.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\DEM1D37.exe"C:\Users\Admin\AppData\Local\Temp\DEM1D37.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\DEM73A4.exe"C:\Users\Admin\AppData\Local\Temp\DEM73A4.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\DEMC985.exe"C:\Users\Admin\AppData\Local\Temp\DEMC985.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\DEM1FC3.exe"C:\Users\Admin\AppData\Local\Temp\DEM1FC3.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\DEM764F.exe"C:\Users\Admin\AppData\Local\Temp\DEM764F.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4360
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5db7cc1d897a2482900120df37d987b13
SHA1a7631428af37b62297fc88aa06345dfbc19a5540
SHA2564b5298618a98c1bbf3c3a5d1e338d1932b8e2454e5ba67044bd7aa80c56e7c36
SHA5120dea0f23f403c2e1fcfa0c0b8ffc2bb0e18870f5c6ba5c327a1bd4c6ec07d93d26b55e68240f2184fe76d0a15d719bff3c37312619556ff95a6c6fb33d9c082c
-
Filesize
14KB
MD58502dd614bd0c964b038d9610ff21d7e
SHA1d00fd92bddb224e70f3c4852b965bc13ca96fb4c
SHA2562f13dc8ea4d310ee05f1477033c3a7829215098d108c25e8588799d9a47833f1
SHA51214cb511534b6c43b68f1a89770d8e893dadd2d8f09a1dcfecdca1ffe28c4f0169b1592d0442490f1ba2865fb4f98d16b5fd1647ac51cfb3cf3befab714788710
-
Filesize
14KB
MD50a0231e24e0b2d39a829d02bb6bbf280
SHA1314b6b4c1efa3d7ad25b8aa9b689ef6c1e19b65b
SHA256be64eb95126f27eb14c5d3cd27440f41c2dea99cb79779be4873d19690218bbb
SHA512da6dcc8e91820475270d7aa2712da8d275592849ae94978c30c5879fff1fbe5480e3f63dc757a944ffa1428075369f12f05f65292ccf6a9c36294d958aaac8f5
-
Filesize
14KB
MD54497387b84d81ed9dbba3d46741ee582
SHA1f1e9549cba4a01b6d0006405838457d9711a95e6
SHA256fd310f0ce527d5d0e17d80928f4757b5fb15a65cb7797ab7b3456c37718e3064
SHA512605913113c31ed59ad20d521992e3069582c09b200e19d67781e091150fa49f22cec5d5feab4b490e7a3c5c90e4b307e43077d58d9db5808e53b1e3c4c03e611
-
Filesize
14KB
MD528eef363b396433a78d32df5a5065092
SHA1dffeff45fe00757aa8d38ac993176391ae10589a
SHA2565c097c4cd04c61accf305c9db8cf55a1b07bc4f2c44a3d4dc1f90b0659788915
SHA5122b8d52793592ca64f151fd4ab32143b3bdadb7d4d254cd116a132bf95b06f0f2e175169d3857c272b14de80276f84c9bc38ce2152cff245ac3be1e015e1b6943
-
Filesize
14KB
MD58a41b2632410416bb1129b44da2952cb
SHA1313fc52a1b0aad1bde8a986b3403ab3b84a64eda
SHA2568b5302654d1b01d287ca6255629b45f13d2abfe6c1f84cc33b1d678ef25276b7
SHA51285b01fc63e85c894615f1423996f9c56f0036a33413615ec7c143d9338a2191b0132ea82e5f5920fe1c3ff476050441dde42f0b76da0dffb08e50f760c9564ab