Analysis
-
max time kernel
140s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 20:49
Static task
static1
Behavioral task
behavioral1
Sample
a40cccf5e2c40728982037f45364bfcd_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
a40cccf5e2c40728982037f45364bfcd_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
a40cccf5e2c40728982037f45364bfcd
-
SHA1
47206db956c6ab9f2b2b2acd107ab3466a8dbebc
-
SHA256
d442614f25d2578ecb03b522fe4360887f1cef5abdf6e3075a88fcb56fac0333
-
SHA512
3e8c6a6360cc8db0ac54403d3be5f54ce639b2f498bd5a37e238cfde7357fa277ebe9ab4c32192867758c2c345b6dcc3063732d5daa02fde724726fc172b9135
-
SSDEEP
24576:LrRhVu0MbopYVea2xnuoa5JHJmG3T11tuVEcLvMwgbjx60p4G4yIjxdT343qGF:LVh0kmeao65vXTfEV/Lvzajx6E4dxZ4f
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation a40cccf5e2c40728982037f45364bfcd_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2948 OUTPUT.EXE -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine OUTPUT.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a40cccf5e2c40728982037f45364bfcd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OUTPUT.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5020 wrote to memory of 2948 5020 a40cccf5e2c40728982037f45364bfcd_JaffaCakes118.exe 83 PID 5020 wrote to memory of 2948 5020 a40cccf5e2c40728982037f45364bfcd_JaffaCakes118.exe 83 PID 5020 wrote to memory of 2948 5020 a40cccf5e2c40728982037f45364bfcd_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\a40cccf5e2c40728982037f45364bfcd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a40cccf5e2c40728982037f45364bfcd_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\OUTPUT.EXE"C:\Users\Admin\AppData\Local\Temp\OUTPUT.EXE"2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5f8373721015a3c3f708547aca2b2e8b4
SHA1fa6d9ca4cf8b579699ff75e6c43076bda65f70f5
SHA2561fdbe92edced85b6817d0e10e150e20bfde44a8f8b3d3f488e2e4cdcf2be2d3f
SHA51225c4d7f0dc348721ceaa906c80fc07f5d713b13f7044cd559c9ba4eea27cedcf5f3f1aff848783bf53cdc424fe9a562f49321963328045fca832cd4be24e4388