Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-10-2024 01:46
Static task
static1
Behavioral task
behavioral1
Sample
75b7e4f3b01e4cd62a83ed1aca10e497_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
75b7e4f3b01e4cd62a83ed1aca10e497_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
75b7e4f3b01e4cd62a83ed1aca10e497_JaffaCakes118.exe
-
Size
503KB
-
MD5
75b7e4f3b01e4cd62a83ed1aca10e497
-
SHA1
6647e17778fec92a27d34caa7e8f0015ac602a98
-
SHA256
c60d84e06944cfe3219b64107d04608960a4fc2cf6abe4763f13bb1fa46903d7
-
SHA512
97b5304f058265ede2679ce80dec3fd9224a18a4a32aaf822d3a48d26d361f0cfbdf9e9c1997d65c419e834e5c1aa3a3c8e61fae45106f30df0e8ee3c5fd1ffa
-
SSDEEP
12288:5HGC8w0ueY7YZzU4LAsLrYpKCEgplake5NhitJE95bf:wC8wfzqUsLrYppEaYv5b8WHbf
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
75b7e4f3b01e4cd62a83ed1aca10e497_JaffaCakes118.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 75b7e4f3b01e4cd62a83ed1aca10e497_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
Processes:
1.exeFreeCryptor.exepid Process 4424 1.exe 1960 FreeCryptor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 4532 4424 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
75b7e4f3b01e4cd62a83ed1aca10e497_JaffaCakes118.exe1.exeFreeCryptor.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75b7e4f3b01e4cd62a83ed1aca10e497_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FreeCryptor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
75b7e4f3b01e4cd62a83ed1aca10e497_JaffaCakes118.exedescription pid Process procid_target PID 3532 wrote to memory of 4424 3532 75b7e4f3b01e4cd62a83ed1aca10e497_JaffaCakes118.exe 93 PID 3532 wrote to memory of 4424 3532 75b7e4f3b01e4cd62a83ed1aca10e497_JaffaCakes118.exe 93 PID 3532 wrote to memory of 4424 3532 75b7e4f3b01e4cd62a83ed1aca10e497_JaffaCakes118.exe 93 PID 3532 wrote to memory of 1960 3532 75b7e4f3b01e4cd62a83ed1aca10e497_JaffaCakes118.exe 94 PID 3532 wrote to memory of 1960 3532 75b7e4f3b01e4cd62a83ed1aca10e497_JaffaCakes118.exe 94 PID 3532 wrote to memory of 1960 3532 75b7e4f3b01e4cd62a83ed1aca10e497_JaffaCakes118.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\75b7e4f3b01e4cd62a83ed1aca10e497_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\75b7e4f3b01e4cd62a83ed1aca10e497_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 5483⤵
- Program crash
PID:4532
-
-
-
C:\Users\Admin\AppData\Local\Temp\FreeCryptor.exe"C:\Users\Admin\AppData\Local\Temp\FreeCryptor.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4424 -ip 44241⤵PID:4188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
659KB
MD54fd74e6219c0325aa77c1f9a2b93ea21
SHA134275051b24702f4eaff5fbc9bdd1d63ea115113
SHA256efdc3759d6b3acfa8d016a4d3c48ef683f38ddad4900ade0e00f8555f77ec145
SHA5128f3f82f77da3fc1e9b925c635bdbbf17e9e850d4e37bf92e1126c99480b70759f08ea490ca1b66cae029dd6f7affe4e33ceac5ac761658653a24a25135c887ba
-
Filesize
29KB
MD5e11341b03bdb5c57d2eb2d5c58682e18
SHA14abe9584d36840808cac0a1726003af505acd63b
SHA25639256fb67d025860790025b7576925df76a4ef1c4f8ea59015ccb8499623c0da
SHA5124c08da90eeee01d3b14fe31b433fdd231fc158c8f6a0aff056055da2748b3525a36360dbffedef369261cce5db31e556d06c2e5f7f8659c7009fcc10dc67dd15