Analysis
-
max time kernel
136s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2024, 17:31
Static task
static1
Behavioral task
behavioral1
Sample
8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe
-
Size
1002KB
-
MD5
8017e41b2c71f66ee834d21728a4160b
-
SHA1
cb8019c2aa21d17daf49f1a9a23e13281b8f4ac8
-
SHA256
d83290b80bf412884168a6d24a06fad12edb578cc612ea555476b422a4499613
-
SHA512
08ed4d7ef49248bca16a6ceff5ee2ae5acdb0f3b91b8fd6ffbf8bdcf2f90c5000e6fced84eb82dd9e94d5b358d27552526ce6a0d3896168251f4c7b88789ca03
-
SSDEEP
24576:J7oP3LsrNZqTcIPBz8xAOZmuaWdEIwjS/1aOaxys:loTYqAIPBz8xASvaWt4Q1c
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2600 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2600 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 99 PID 2424 wrote to memory of 2600 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 99 PID 2424 wrote to memory of 2600 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 99 PID 2424 wrote to memory of 1860 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 101 PID 2424 wrote to memory of 1860 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 101 PID 2424 wrote to memory of 1860 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 101 PID 2424 wrote to memory of 1264 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 102 PID 2424 wrote to memory of 1264 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 102 PID 2424 wrote to memory of 1264 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 102 PID 2424 wrote to memory of 1892 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 103 PID 2424 wrote to memory of 1892 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 103 PID 2424 wrote to memory of 1892 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 103 PID 2424 wrote to memory of 3848 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 104 PID 2424 wrote to memory of 3848 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 104 PID 2424 wrote to memory of 3848 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 104 PID 2424 wrote to memory of 4508 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 105 PID 2424 wrote to memory of 4508 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 105 PID 2424 wrote to memory of 4508 2424 8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8017e41b2c71f66ee834d21728a4160b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eGXOLNdIXhOq" /XML "C:\Users\Admin\AppData\Local\Temp\tmp80F3.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2600
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:1860
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:1264
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:1892
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:3848
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:4508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ed99f397d995c4656073cc37986a3c50
SHA1679955c69d077ce04c176a1020b44615495f26da
SHA256e4547302e3000bc202bcbaa8806be79b45eca05fa1fe08bc077a8e12b4c4ec9d
SHA512733a8c770c230de76a514c489a70b3ba43bd4c6ee6d99764fd2e0474c85e12463baca1cc7402b8f9d5ccde0b12120c0b6097aa82a86ef291d95fc3f55652ecf0