Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 02:22
Behavioral task
behavioral1
Sample
JaffaCakes118_0dd86dcb86cc31b25987d1e8a5cc66a9377768d4134dc17c52d0252c04e720a6.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0dd86dcb86cc31b25987d1e8a5cc66a9377768d4134dc17c52d0252c04e720a6.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0dd86dcb86cc31b25987d1e8a5cc66a9377768d4134dc17c52d0252c04e720a6.exe
-
Size
13KB
-
MD5
3b17340ba3d0ae3480e19749deeae596
-
SHA1
2e2a1ac5934433154785333298ecd90afbc4cc7d
-
SHA256
0dd86dcb86cc31b25987d1e8a5cc66a9377768d4134dc17c52d0252c04e720a6
-
SHA512
126844f3dc226ac85d1528c7160b6d7ac7a6b7e7c6aab960bcc5721ce8dab831bf717ccbf58aa259108fb898aa5f6f076fb51a5c9ef9e3f5bd20b9df7cc94fbe
-
SSDEEP
384:zJPrpSI+sAtNS1L8+zWYv+hbzX00aB4sufffffehB:zWSV8+Kxbb0yk
Malware Config
Extracted
purecrypter
http://safeinthehandsofthegoodbois.com/loader/uploads/Aslrz_Ethapkbn.png
Signatures
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Purecrypter family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation JaffaCakes118_0dd86dcb86cc31b25987d1e8a5cc66a9377768d4134dc17c52d0252c04e720a6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 1232 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3204 JaffaCakes118_0dd86dcb86cc31b25987d1e8a5cc66a9377768d4134dc17c52d0252c04e720a6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3204 wrote to memory of 2232 3204 JaffaCakes118_0dd86dcb86cc31b25987d1e8a5cc66a9377768d4134dc17c52d0252c04e720a6.exe 83 PID 3204 wrote to memory of 2232 3204 JaffaCakes118_0dd86dcb86cc31b25987d1e8a5cc66a9377768d4134dc17c52d0252c04e720a6.exe 83 PID 2232 wrote to memory of 1232 2232 cmd.exe 85 PID 2232 wrote to memory of 1232 2232 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0dd86dcb86cc31b25987d1e8a5cc66a9377768d4134dc17c52d0252c04e720a6.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0dd86dcb86cc31b25987d1e8a5cc66a9377768d4134dc17c52d0252c04e720a6.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 102⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\system32\timeout.exetimeout /t 103⤵
- Delays execution with timeout.exe
PID:1232
-
-