Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 19:51
Static task
static1
Behavioral task
behavioral1
Sample
db41f178eabb3457b41e7fce3b4a91cd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db41f178eabb3457b41e7fce3b4a91cd_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
db41f178eabb3457b41e7fce3b4a91cd_JaffaCakes118.exe
-
Size
744KB
-
MD5
db41f178eabb3457b41e7fce3b4a91cd
-
SHA1
efd01a7d4274f14d1d1f42df709b1ddd37febd2b
-
SHA256
c07f5336104d9278335284a64ac8cd89e368302a8450b05755b119d9501303ca
-
SHA512
8b1a8c074459cfc87441eaed59a06558a9f984f9947160c337dfe34f3fde359c3cec8186515ff59b4856a9009df892145e0d90acbd6f1527e7cf182dd12538a8
-
SSDEEP
12288:j7svate7LEZ2OjImXJS+bz5xHR2zXqVhLR:te7LEZ2KIa7UzXqD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation db41f178eabb3457b41e7fce3b4a91cd_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3872 1.exe 1992 2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1992 2.exe 1992 2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 636 wrote to memory of 3872 636 db41f178eabb3457b41e7fce3b4a91cd_JaffaCakes118.exe 84 PID 636 wrote to memory of 3872 636 db41f178eabb3457b41e7fce3b4a91cd_JaffaCakes118.exe 84 PID 636 wrote to memory of 3872 636 db41f178eabb3457b41e7fce3b4a91cd_JaffaCakes118.exe 84 PID 636 wrote to memory of 1992 636 db41f178eabb3457b41e7fce3b4a91cd_JaffaCakes118.exe 85 PID 636 wrote to memory of 1992 636 db41f178eabb3457b41e7fce3b4a91cd_JaffaCakes118.exe 85 PID 636 wrote to memory of 1992 636 db41f178eabb3457b41e7fce3b4a91cd_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\db41f178eabb3457b41e7fce3b4a91cd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\db41f178eabb3457b41e7fce3b4a91cd_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3872
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
334KB
MD5015ca54e0e65c287f95abbb631c5e3b0
SHA1e5fa05bf5bf511d9733c5ae18b46d8661b1552fd
SHA2563484dd4555db62c7cc5b6ca979395bf46d43dd8c52c1f8988126ae13e7ce3364
SHA51208de10fe2bbf9dabb1bcf038824a7caedf9c08e7f8326a2060a279d361a33a7c9006ca81b209994b097ce6f27da637682a0e3bab69c23dd1aa963d2a4c1eccab
-
Filesize
392KB
MD5b6f969853adc93c62c3aa07071c41e1b
SHA11b2307cce0c77cbb88ef1a2d323e908fd44dc562
SHA2562d9b9ada9abd46e52e7e07ee0d52c94da0b45267956719464f51e36bf569c452
SHA5121788ee60f7363b0c08df2b4ed322a8d089b2992def18aa857637cf9880499cfc8226f84d249ba381dfc3a20c7a1a727c124c21a2f3dbb15e6ebf85fb8b6c0337