Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 07:03
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_dde3ef9c2300ebec4b5fac503ab5acb4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_dde3ef9c2300ebec4b5fac503ab5acb4.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_dde3ef9c2300ebec4b5fac503ab5acb4.exe
-
Size
908KB
-
MD5
dde3ef9c2300ebec4b5fac503ab5acb4
-
SHA1
87638ce4b31891a5e66b2482b7b0c1e2faddf7e4
-
SHA256
1af076d3e8324da6ef21fa16c24aacdb316af29d66aab0f3ab336680ecb8c1e0
-
SHA512
c94ecb5e47c928f33084721bc8fb6a689cbf1a5efba130b902562fa06174dee14ee8794d852d624a483c1a121e7953c2512d297cb8fb02939065e65d3c546b50
-
SSDEEP
12288:QqjqRBa80gi+TCUQpd6KA26mY6nltHnhm9FXRt:QwqN0gi+TCUQvHEFX3
Malware Config
Signatures
-
Imminent family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation JaffaCakes118_dde3ef9c2300ebec4b5fac503ab5acb4.exe -
Executes dropped EXE 1 IoCs
pid Process 3668 print.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\model = "C:\\Users\\Admin\\AppData\\Roaming\\model\\print.exe" JaffaCakes118_dde3ef9c2300ebec4b5fac503ab5acb4.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3668 set thread context of 4848 3668 print.exe 102 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_dde3ef9c2300ebec4b5fac503ab5acb4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language print.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3668 print.exe 3668 print.exe 3668 print.exe 3668 print.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4848 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3668 print.exe Token: SeDebugPrivilege 4848 RegAsm.exe Token: 33 4848 RegAsm.exe Token: SeIncBasePriorityPrivilege 4848 RegAsm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4848 RegAsm.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1444 wrote to memory of 3668 1444 JaffaCakes118_dde3ef9c2300ebec4b5fac503ab5acb4.exe 99 PID 1444 wrote to memory of 3668 1444 JaffaCakes118_dde3ef9c2300ebec4b5fac503ab5acb4.exe 99 PID 1444 wrote to memory of 3668 1444 JaffaCakes118_dde3ef9c2300ebec4b5fac503ab5acb4.exe 99 PID 3668 wrote to memory of 3224 3668 print.exe 100 PID 3668 wrote to memory of 3224 3668 print.exe 100 PID 3668 wrote to memory of 3224 3668 print.exe 100 PID 3668 wrote to memory of 2556 3668 print.exe 101 PID 3668 wrote to memory of 2556 3668 print.exe 101 PID 3668 wrote to memory of 2556 3668 print.exe 101 PID 3668 wrote to memory of 4848 3668 print.exe 102 PID 3668 wrote to memory of 4848 3668 print.exe 102 PID 3668 wrote to memory of 4848 3668 print.exe 102 PID 3668 wrote to memory of 4848 3668 print.exe 102 PID 3668 wrote to memory of 4848 3668 print.exe 102 PID 3668 wrote to memory of 4848 3668 print.exe 102 PID 3668 wrote to memory of 4848 3668 print.exe 102 PID 3668 wrote to memory of 4848 3668 print.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dde3ef9c2300ebec4b5fac503ab5acb4.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dde3ef9c2300ebec4b5fac503ab5acb4.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Roaming\model\print.exe"C:\Users\Admin\AppData\Roaming\model\print.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:3224
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:2556
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4848
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
908KB
MD5a9917ca1f6e7122322d271ecd0894194
SHA195205439aff84d7d162e672fc69dd5d47f3a9e45
SHA256292e28a94abfcdbe42450189e3e06a34b5ddb796896fb31537977843c1149469
SHA512c42f45c3a155f3a7edeb355281fbd9353cf35ceef46fb53a5856097192d1ab7dd90b39d056d43d44da839a0e684c6ff8e941dc4d63ef6fa7be1aeb5a2df44350