Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 11:53
Static task
static1
Behavioral task
behavioral1
Sample
51f4e3dc9be4039ef21ac36678d4210f_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
51f4e3dc9be4039ef21ac36678d4210f_JaffaCakes118.exe
-
Size
3.9MB
-
MD5
51f4e3dc9be4039ef21ac36678d4210f
-
SHA1
e082f5c301d9fa49006c7c0c889926c9e5fe1dc4
-
SHA256
b4f139d8cafc99eccb66fd682df1b01ee06ebddb7a1d74bf71cfa21579fc0fda
-
SHA512
3bca46c02a11843673b97c6bc3c06f4528cbec520a3946ab2f8136f4c70fecf55225582eb1c2067825fc8ee09a1e5aac3260cee2fe0e8ed0a1c3f009b900c1f7
-
SSDEEP
49152:YvX+HmRfhQqJ17dqVDSsQTpY6rXLjtE0SM3Qxexre62Bh4OQ3Plsce20NeL9zNoe:PoTdzXXv6hy76ByR
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000023cd1-173.dat acprotect behavioral2/memory/4600-174-0x0000000073990000-0x000000007399A000-memory.dmp acprotect behavioral2/memory/4600-189-0x0000000073990000-0x000000007399A000-memory.dmp acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 51f4e3dc9be4039ef21ac36678d4210f_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4600 d927Installer.exe -
Loads dropped DLL 18 IoCs
pid Process 4600 d927Installer.exe 4600 d927Installer.exe 4600 d927Installer.exe 4600 d927Installer.exe 4600 d927Installer.exe 4600 d927Installer.exe 4600 d927Installer.exe 4600 d927Installer.exe 4600 d927Installer.exe 4600 d927Installer.exe 4600 d927Installer.exe 4600 d927Installer.exe 4600 d927Installer.exe 4600 d927Installer.exe 4600 d927Installer.exe 4600 d927Installer.exe 4600 d927Installer.exe 4600 d927Installer.exe -
resource yara_rule behavioral2/files/0x0007000000023cd1-173.dat upx behavioral2/memory/4600-174-0x0000000073990000-0x000000007399A000-memory.dmp upx behavioral2/memory/4600-189-0x0000000073990000-0x000000007399A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1660 4600 WerFault.exe 87 4644 4600 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51f4e3dc9be4039ef21ac36678d4210f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d927Installer.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x000a000000023c7a-21.dat nsis_installer_1 behavioral2/files/0x000a000000023c7a-21.dat nsis_installer_2 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4600 d927Installer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2912 wrote to memory of 4600 2912 51f4e3dc9be4039ef21ac36678d4210f_JaffaCakes118.exe 87 PID 2912 wrote to memory of 4600 2912 51f4e3dc9be4039ef21ac36678d4210f_JaffaCakes118.exe 87 PID 2912 wrote to memory of 4600 2912 51f4e3dc9be4039ef21ac36678d4210f_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\51f4e3dc9be4039ef21ac36678d4210f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\51f4e3dc9be4039ef21ac36678d4210f_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\temp\d927Installer.exe"C:\Users\Admin\AppData\Local\temp\d927Installer.exe" /KEYWORD=d927 "/PATHFILES=C:\Users\Admin\AppData\Local\temp\"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4600 -s 16683⤵
- Program crash
PID:1660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4600 -s 15043⤵
- Program crash
PID:4644
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4600 -ip 46001⤵PID:4036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4600 -ip 46001⤵PID:2900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5b027191a02d357dddc850faa08ac634c
SHA13afed1741b1e4f2b8a41794f84b7c08910666a45
SHA2567fe8730370c40bc0ee96051d9988f13ff78eb2ba939ea1a0f4bcdd1c462dfd98
SHA5127e594b9035220d4faf00f94d9ef9700e6a92b7861431accf17ec25ed056a1a0fb9318c75d15d1f3f570da9b1b507f4a7a3f5fb48c1e66d32d771b23138023bcd
-
Filesize
4KB
MD555788069d3fa4e1daf80f3339fa86fe2
SHA1d64e05c1879a92d5a8f9ff2fd2f1a53e1a53ae96
SHA256d6e429a063adf637f4d19d4e2eb094d9ff27382b21a1f6dccf9284afb5ff8c7f
SHA512d3b1eec76e571b657df444c59c48cad73a58d1a10ff463ce9f3acd07acce17d589c3396ad5bdb94da585da08d422d863ffe1de11f64298329455f6d8ee320616
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5f8462e9d1d7fd39789afca89ab6d6046
SHA17e9a518e15b7490245d2bef11a73f209c8d8d59b
SHA25648941e9f5c92a33f1e60a7a844d562dd77ce736fd31b5503c980b49679dfe85e
SHA51257dee2253abd7d17d53811d5e95237f9434288518fb043645524a517786db2d8a91df86a6da732c620f12ad0e7ea30a923b8d5f3de386c65bd3ff240bc0dff69
-
Filesize
109KB
MD5ee1c41db6834538ee4048ccfc45055be
SHA1efbbfc884a3193fadf542b0bef387cffc86923b7
SHA2568904eb2c575ac5509d1a19f7c14b6ab804e88c22e3c2232d45de4198cf9850aa
SHA512312c60a27ee625c9454cb8403c575bd2f9562fd1288ae84ad648018b62e455bf89928acb2508e75be8e76cd19ac1127e873b1187d06fa265ca2e624e02382ffb
-
Filesize
222KB
MD5ea79ad436f5e54ee5dc2aba13fe1b15a
SHA166e248962bfb1f370796dac393621367638c21b1
SHA2560ae09d65f5284409e6d9a2d40d7aaa8cbf1dd1815e67a9c12a9557f5de1f7832
SHA512dbd40403126c6ef6f5747c900809140c8897376f03696247cd8d10431bec7abb0c7191761e8ea551cfde2234059ec087ffbca54510ddf0dc78b8329f598fab2e
-
Filesize
2KB
MD511d93cc535227b3351a70a3c8d8dfeb1
SHA1ce4e0b61c3b08b984e22244a75cdbd2fb4e08584
SHA2560f6c9e02384b109bd440a1d34a1928895b014f56079162b295df55afb73c7e29
SHA512413d7c55a9f8b6267468841f608f0c1e70d25308f3a3b55bc619485ac33336e182a375177e9f32614a44a927b5c2c70d15fe9abb7881ac2ecea2a7a11d294345
-
Filesize
437B
MD5d2ba75d02f6ce99102d03f2fba9c0f68
SHA115821bc60394b163af673a56a38d5615d4d431ee
SHA256ba90a91cdb2eb28c9f06917b3aa73bbc2c3b045969c181d7da8f983ea36c209d
SHA512e00143a31d61e343491f7bcd7090589dac0b94e9797461b3e0192a7c7972e51f8431796fdc9b48cabcfb15cae72baae9f6d3a71eb5c352ac2cdba53eeebda6e2