Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2024 16:32
Static task
static1
Behavioral task
behavioral1
Sample
633a5b3f5abc1123356f2c859bcb8e50_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
633a5b3f5abc1123356f2c859bcb8e50_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
633a5b3f5abc1123356f2c859bcb8e50_JaffaCakes118.exe
-
Size
144KB
-
MD5
633a5b3f5abc1123356f2c859bcb8e50
-
SHA1
da720c363b880dbc5623e9584b62523fb4fba909
-
SHA256
35e7dacaff1f83266879f8c1b8b87094b9afe181b397b3927561c74844e38d18
-
SHA512
9fb9e0aa1b2d263e7eec9b065c1af0e5a72ec68f9c4cfa27a3bd46d259f1416f5c60a82cf01e80cdddeddb1463569fb5981fb36d000c8e0ffdfd20af1f353c8e
-
SSDEEP
3072:uaVP6HaGT5SR8fGzIpYDx1cTqO9lkS2jbxWGqXJ:uaGoEpWxSbGqZ
Malware Config
Extracted
tofsee
91.218.39.211
188.130.237.44
91.204.162.103
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 633a5b3f5abc1123356f2c859bcb8e50_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1116 uvnllfxk.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\uvnllfxk.exe\"" 633a5b3f5abc1123356f2c859bcb8e50_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1116 set thread context of 2008 1116 uvnllfxk.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3272 2008 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 633a5b3f5abc1123356f2c859bcb8e50_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uvnllfxk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 404 wrote to memory of 1116 404 633a5b3f5abc1123356f2c859bcb8e50_JaffaCakes118.exe 86 PID 404 wrote to memory of 1116 404 633a5b3f5abc1123356f2c859bcb8e50_JaffaCakes118.exe 86 PID 404 wrote to memory of 1116 404 633a5b3f5abc1123356f2c859bcb8e50_JaffaCakes118.exe 86 PID 1116 wrote to memory of 2008 1116 uvnllfxk.exe 88 PID 1116 wrote to memory of 2008 1116 uvnllfxk.exe 88 PID 1116 wrote to memory of 2008 1116 uvnllfxk.exe 88 PID 1116 wrote to memory of 2008 1116 uvnllfxk.exe 88 PID 1116 wrote to memory of 2008 1116 uvnllfxk.exe 88 PID 404 wrote to memory of 532 404 633a5b3f5abc1123356f2c859bcb8e50_JaffaCakes118.exe 92 PID 404 wrote to memory of 532 404 633a5b3f5abc1123356f2c859bcb8e50_JaffaCakes118.exe 92 PID 404 wrote to memory of 532 404 633a5b3f5abc1123356f2c859bcb8e50_JaffaCakes118.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\633a5b3f5abc1123356f2c859bcb8e50_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\633a5b3f5abc1123356f2c859bcb8e50_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\uvnllfxk.exe"C:\Users\Admin\uvnllfxk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:2008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 3564⤵
- Program crash
PID:3272
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5640.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2008 -ip 20081⤵PID:208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD5d0ab623051d738d5666a14820de62f34
SHA16b3d8b7955e7b45d82c2da848b6ab80e095b4dc2
SHA256e79d4a1cfeadda0793ab8804adec4fc35203cae4ed17e9d5ff8d2589b3fa4a87
SHA5127fa606acfd39a4c3251f36cd2351898c05eb2e96a721be07517244845b241b7633eee5279b36626d842731e5f6a3a6bb48456306ec8a8122dc611ef7f3905bea
-
Filesize
47.6MB
MD58ff5ea035f3fc6cf5a6462e6df391e07
SHA193dd15188e864fa6a211fa964d0b24060d062cf4
SHA256b4466c8b9727d465fd5e253f60bca74128b7ba949533fa1bf6d74df04765e1e7
SHA512c91f678d3875bfdb15f75cf9516cfde3068e9f6d34fb250e4a86cc671559e8ed99551984a1f6cb4bdb74337f3feed75cb4ea6a90974168e7d040a5c7b48e488a