Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2025, 05:11 UTC
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f7dcaa60ffe64e2421db9b13644a8b20.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f7dcaa60ffe64e2421db9b13644a8b20.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f7dcaa60ffe64e2421db9b13644a8b20.exe
-
Size
58KB
-
MD5
f7dcaa60ffe64e2421db9b13644a8b20
-
SHA1
639135235d6553595f1b31d828f0b8f184bafd66
-
SHA256
a672a2d57642bb0aaa88eb8ccad46c977baf71e0f1417fd36ae15ade682bade4
-
SHA512
d74061c4410e65f7dad2ca0dba7fb07899b5af14a1bde7446bc1703f2bf51b5c3e2a916a4e73dadf4e9a926f9d22b23efaf176cd6aa5a759dd1a463d0ecc4678
-
SSDEEP
1536:iZioIoCwbYP4nuEApQK4TQbtY2gA9DX+ytBO8c3G3eTJ/m:iEoIlwIguEA4c5DgA9DOyq0eFO
Malware Config
Signatures
-
Sakula family
-
Sakula payload 4 IoCs
resource yara_rule behavioral2/memory/1900-6-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/1480-8-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/1900-13-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/1480-17-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation JaffaCakes118_f7dcaa60ffe64e2421db9b13644a8b20.exe -
Executes dropped EXE 1 IoCs
pid Process 1480 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" JaffaCakes118_f7dcaa60ffe64e2421db9b13644a8b20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f7dcaa60ffe64e2421db9b13644a8b20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3304 cmd.exe 4344 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4344 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1900 JaffaCakes118_f7dcaa60ffe64e2421db9b13644a8b20.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1900 wrote to memory of 1480 1900 JaffaCakes118_f7dcaa60ffe64e2421db9b13644a8b20.exe 83 PID 1900 wrote to memory of 1480 1900 JaffaCakes118_f7dcaa60ffe64e2421db9b13644a8b20.exe 83 PID 1900 wrote to memory of 1480 1900 JaffaCakes118_f7dcaa60ffe64e2421db9b13644a8b20.exe 83 PID 1900 wrote to memory of 3304 1900 JaffaCakes118_f7dcaa60ffe64e2421db9b13644a8b20.exe 100 PID 1900 wrote to memory of 3304 1900 JaffaCakes118_f7dcaa60ffe64e2421db9b13644a8b20.exe 100 PID 1900 wrote to memory of 3304 1900 JaffaCakes118_f7dcaa60ffe64e2421db9b13644a8b20.exe 100 PID 3304 wrote to memory of 4344 3304 cmd.exe 102 PID 3304 wrote to memory of 4344 3304 cmd.exe 102 PID 3304 wrote to memory of 4344 3304 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f7dcaa60ffe64e2421db9b13644a8b20.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f7dcaa60ffe64e2421db9b13644a8b20.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1480
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f7dcaa60ffe64e2421db9b13644a8b20.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4344
-
-
Network
-
Remote address:8.8.8.8:53Requestcitrix.vipreclod.comIN AResponse
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request64.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request97.17.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestcitrix.vipreclod.comIN AResponse
-
Remote address:8.8.8.8:53Request56.163.245.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request32.187.41.23.in-addr.arpaIN PTRResponse32.187.41.23.in-addr.arpaIN PTRa23-41-187-32deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestcitrix.vipreclod.comIN AResponse
-
Remote address:8.8.8.8:53Requestcitrix.vipreclod.comIN AResponse
-
Remote address:8.8.8.8:53Request23.236.111.52.in-addr.arpaIN PTRResponse
-
66 B 134 B 1 1
DNS Request
citrix.vipreclod.com
-
71 B 157 B 1 1
DNS Request
13.86.106.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
64.159.190.20.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
97.17.167.52.in-addr.arpa
-
66 B 134 B 1 1
DNS Request
citrix.vipreclod.com
-
71 B 157 B 1 1
DNS Request
56.163.245.4.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
32.187.41.23.in-addr.arpa
-
66 B 134 B 1 1
DNS Request
citrix.vipreclod.com
-
66 B 134 B 1 1
DNS Request
citrix.vipreclod.com
-
72 B 158 B 1 1
DNS Request
23.236.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD574438f9f49c3301835839b9bf9bb2fd1
SHA1ec66255a2f00050afaa31326f1a7ea4030a9d0ec
SHA256c1e7e2b32a6eb012e231d82aa4dbd6911c4833056298fc1e0d433809533f4ab1
SHA5127df74008a1bcab67e902daf02c3f2c6c3609356554475563c6209c8d3dc3f1fae01405072421996c8d9cd3bf72e27b144156f49d0f08aff5dd32b76d1b9d1984