Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 16:21
Static task
static1
Behavioral task
behavioral1
Sample
43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe
-
Size
938KB
-
MD5
43136785ec2d4dd0a1cd8e8e85503af9
-
SHA1
4299e5e18caaf89f763ef9a8266abec4b6cb80a8
-
SHA256
74782a5a2f61e2c17ce38d42e181263b22945ec1a6d475804d775ef7a240e738
-
SHA512
8fe08134759d5f08c73c6c554e95c18ccef8426a30ea30a466c6207856293358aca17db3ce2f7c0737dc12791b62894b6a76029443003f0b712e5d85e0b9a993
-
SSDEEP
24576:NBaIIV6Jyt2HVkdro4M3gx7fMxtfAqNn:XJG2ian
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3720 set thread context of 1140 3720 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4100 1140 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3720 wrote to memory of 2284 3720 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 87 PID 3720 wrote to memory of 2284 3720 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 87 PID 3720 wrote to memory of 2284 3720 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 87 PID 3720 wrote to memory of 1140 3720 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 88 PID 3720 wrote to memory of 1140 3720 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 88 PID 3720 wrote to memory of 1140 3720 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 88 PID 3720 wrote to memory of 1140 3720 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 88 PID 3720 wrote to memory of 1140 3720 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 88 PID 3720 wrote to memory of 1140 3720 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 88 PID 3720 wrote to memory of 1140 3720 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 88 PID 3720 wrote to memory of 1140 3720 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 88 PID 3720 wrote to memory of 1140 3720 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 88 PID 3720 wrote to memory of 1140 3720 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 88 PID 3720 wrote to memory of 1140 3720 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 88 PID 3720 wrote to memory of 1140 3720 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 88 PID 3720 wrote to memory of 1140 3720 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 88 PID 3720 wrote to memory of 1140 3720 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵PID:2284
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe2⤵PID:1140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1140 -s 123⤵
- Program crash
PID:4100
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1140 -ip 11401⤵PID:3460