Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 02:34
Static task
static1
Behavioral task
behavioral1
Sample
5501eec4476c9060b3b7a35b0eecd1b5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5501eec4476c9060b3b7a35b0eecd1b5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
5501eec4476c9060b3b7a35b0eecd1b5_JaffaCakes118.exe
-
Size
162KB
-
MD5
5501eec4476c9060b3b7a35b0eecd1b5
-
SHA1
75b7afbfd88f1881de3f0d8873d3b7c68d228028
-
SHA256
0edb44c57e8c91795946d81936a1c4cc02556ad6ddaa2aa1fccd1ea66ab90a17
-
SHA512
431689140db9a8fe80fc5a756e5e09330ace180d748396fd0a13e112209daff0d8d14b9d2e3bfb6b5907a1ce21f8e4e172a5cd3fbd7d73da877799c82effe821
-
SSDEEP
3072:fGeXEfZoW9z/QZAO4brAeGyAEthx1QuCYVuz6QM7aBRDaJLSWXF5F:fGeWyW9z/YAOMrAeGktzOuC+uGQMOKSe
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5501eec4476c9060b3b7a35b0eecd1b5_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: format.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5501eec4476c9060b3b7a35b0eecd1b5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language format.com -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier format.com -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3692 wrote to memory of 4908 3692 5501eec4476c9060b3b7a35b0eecd1b5_JaffaCakes118.exe 84 PID 3692 wrote to memory of 4908 3692 5501eec4476c9060b3b7a35b0eecd1b5_JaffaCakes118.exe 84 PID 3692 wrote to memory of 4908 3692 5501eec4476c9060b3b7a35b0eecd1b5_JaffaCakes118.exe 84 PID 4908 wrote to memory of 2612 4908 cmd.exe 87 PID 4908 wrote to memory of 2612 4908 cmd.exe 87 PID 4908 wrote to memory of 2612 4908 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\5501eec4476c9060b3b7a35b0eecd1b5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5501eec4476c9060b3b7a35b0eecd1b5_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\forr.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\format.comformat d: /q /y3⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2612
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26B
MD5a3c383ff2c6f5742ddc206fef5924092
SHA1b4c371d0cf07795af9a7aa2ee317ca0a76db4f0c
SHA2568430a8a1074c94d4804ca61f4537fbade5165e4a3f7611e33471ae37efb75320
SHA5121dbcd47fd5826e90bd58b501e33c7bcfa53d7593aff787a61503670d9238c9452a43efae51d31e7e2780936df684337d277cd0f06279ecb12673dc4d92d59d8d