Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 00:48
Static task
static1
Behavioral task
behavioral1
Sample
548f6abbaa1258cd35aac4ba588c2487_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
548f6abbaa1258cd35aac4ba588c2487_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
548f6abbaa1258cd35aac4ba588c2487_JaffaCakes118.exe
-
Size
14KB
-
MD5
548f6abbaa1258cd35aac4ba588c2487
-
SHA1
cff3bd002e38e7265adf3b8e872e092b3147bd50
-
SHA256
aa34cdf87b9db56b727daa5c26c9fadf1002de12be6e9249dc096d87d872c4d0
-
SHA512
365809b01e029c26e2446dee18f47b29ef6bf1099fb99e4a6c86021575764aad331777e79bac9fac4cdbd03db9cb08560cb83e388846e380d603246698401e18
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYu0+:hDXWipuE+K3/SSHgxmZ+
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 548f6abbaa1258cd35aac4ba588c2487_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation DEM614A.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation DEMB7D6.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation DEMDF5.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation DEM6397.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation DEMB9E5.exe -
Executes dropped EXE 6 IoCs
pid Process 1104 DEM614A.exe 3088 DEMB7D6.exe 1652 DEMDF5.exe 5016 DEM6397.exe 2080 DEMB9E5.exe 8 DEM1061.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMDF5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM6397.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMB9E5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM1061.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 548f6abbaa1258cd35aac4ba588c2487_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM614A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMB7D6.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3988 wrote to memory of 1104 3988 548f6abbaa1258cd35aac4ba588c2487_JaffaCakes118.exe 95 PID 3988 wrote to memory of 1104 3988 548f6abbaa1258cd35aac4ba588c2487_JaffaCakes118.exe 95 PID 3988 wrote to memory of 1104 3988 548f6abbaa1258cd35aac4ba588c2487_JaffaCakes118.exe 95 PID 1104 wrote to memory of 3088 1104 DEM614A.exe 100 PID 1104 wrote to memory of 3088 1104 DEM614A.exe 100 PID 1104 wrote to memory of 3088 1104 DEM614A.exe 100 PID 3088 wrote to memory of 1652 3088 DEMB7D6.exe 103 PID 3088 wrote to memory of 1652 3088 DEMB7D6.exe 103 PID 3088 wrote to memory of 1652 3088 DEMB7D6.exe 103 PID 1652 wrote to memory of 5016 1652 DEMDF5.exe 105 PID 1652 wrote to memory of 5016 1652 DEMDF5.exe 105 PID 1652 wrote to memory of 5016 1652 DEMDF5.exe 105 PID 5016 wrote to memory of 2080 5016 DEM6397.exe 115 PID 5016 wrote to memory of 2080 5016 DEM6397.exe 115 PID 5016 wrote to memory of 2080 5016 DEM6397.exe 115 PID 2080 wrote to memory of 8 2080 DEMB9E5.exe 117 PID 2080 wrote to memory of 8 2080 DEMB9E5.exe 117 PID 2080 wrote to memory of 8 2080 DEMB9E5.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\548f6abbaa1258cd35aac4ba588c2487_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\548f6abbaa1258cd35aac4ba588c2487_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\DEM614A.exe"C:\Users\Admin\AppData\Local\Temp\DEM614A.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\DEMB7D6.exe"C:\Users\Admin\AppData\Local\Temp\DEMB7D6.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\DEMDF5.exe"C:\Users\Admin\AppData\Local\Temp\DEMDF5.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\DEM6397.exe"C:\Users\Admin\AppData\Local\Temp\DEM6397.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\DEMB9E5.exe"C:\Users\Admin\AppData\Local\Temp\DEMB9E5.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\DEM1061.exe"C:\Users\Admin\AppData\Local\Temp\DEM1061.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:8
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5ba19ba1fed20d6fa5d1c1965e6f502e6
SHA1add1b16979c7db48c3732e9e23eebfae0016f0f4
SHA2565c33e6db03abf3b2efad2542b958d839dd800dfdb672d7d781aaaa409be66f87
SHA51223b12d7ee2e991fc4ba0df6b52546e1517fffb2a34217c80f0166c522751f0be12bd49002db25190a4c6a9ed9ff27e5068f2b5cd50ada91a60383fa2265e20df
-
Filesize
14KB
MD531fb758e82479231421bc9815f4213a3
SHA18f6c33f7e3901d62b5e6a377aaa0545bd0368a91
SHA256b92f98aea4dee0c3a87cb19da1732ae059882b16a2760e9182cf92c71da679cc
SHA512510a19fc1468eebdcbd31f02348087015cc488cb0859121c6acfcf0145137dfd6367427c3496e0f82a3f4c00b1d7fa1f2da02736c129f385266676b7dd59eaa3
-
Filesize
14KB
MD5f68572ef07b69cd3b59eab0af04860a2
SHA1bdf42d6b43c8bcaaf97da8f8aa7a64b02fd2eaef
SHA2568829cee491233243ece46c94c72147405b01c7f0f3d5a6526e1c9dca62e2f76b
SHA51233465ca6f804606e8961af8c2f8eccc5936c024726c5c52c1959f76442562887a6a65ae7fb2ebbe4b3a224affc7ae05c5f671d2719c0de5ca5860cf7fcb07d04
-
Filesize
14KB
MD5e81d37176d727c5970b9e8340550a710
SHA13c9f8d3b8099db0a894cd4135a37194912733d96
SHA2565c85e001aa37168ddbda15163c6564e55c999a7d13c2c4e523a64edb62f15ea7
SHA512cc92cff5e0a9e71491b7643f47328e77ba5c8dc330d59fc8d5644a37134095486738eb42167ca68b7ec7ebe54a180406852f19c8b03f1f6167914b8bfaf41f37
-
Filesize
14KB
MD510ebb785d295005d476d0ef383f3713c
SHA1f2d42714bd2f338cf6418c768587921726cad9f6
SHA256af4b4753286149204f5260aba1ad2b3534518c7f9db0be9113de3dc0ea737a76
SHA512726bf84629ebe4c544a123c4f93dd81e8e7b132e9733a172d046431921fb2022da3727fc92028088e68cca68ee753c2afa5f5376aee058f229f0391ac64679d1
-
Filesize
14KB
MD538990ba941cd9a0769e4873e2168aa8b
SHA1a4cdca8e814911436c05f9de0c6abbdda8a9af94
SHA25679e288027dc7168261153528c634f61875a1e20033601157c33943ddcfecf446
SHA512e955aa84aee46826e871001f974e770ecb96d605d6515874a4ef0781f823d942469212ee6b43528f1e5ab7add87ff701fb34a628a794c41e938b1e0416ff98fa