Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 14:45
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_79926ac1886dccd96e70f5dd8b9c1eaf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_79926ac1886dccd96e70f5dd8b9c1eaf.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_79926ac1886dccd96e70f5dd8b9c1eaf.exe
-
Size
572KB
-
MD5
79926ac1886dccd96e70f5dd8b9c1eaf
-
SHA1
c335d5467bea19b582a896ab336d547e62184f55
-
SHA256
aedd2dd9535f2d33808c96ad01e6a9b67752565fc513fcac7ec6136f5abdb607
-
SHA512
c020f9975aca8f69f96f6e6b17f41d0b9767dee4340fd37f058854629b9a0bc69a198a34988f8223b3ef6b5930fcc24b15bffe7f1aa90090ffe4891286130a5c
-
SSDEEP
12288:jaTFTmzawPSKKcD5+4K5HJOoQtdG/tRK1u7UuVxg7:eTFfw64D44KhJOoQKo1u7nVx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation JaffaCakes118_79926ac1886dccd96e70f5dd8b9c1eaf.exe -
Executes dropped EXE 1 IoCs
pid Process 4192 aWKfVMakTT.exe -
Loads dropped DLL 4 IoCs
pid Process 4192 aWKfVMakTT.exe 4192 aWKfVMakTT.exe 4192 aWKfVMakTT.exe 4192 aWKfVMakTT.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aWKfVMakTT.exe = "C:\\Users\\Admin\\AppData\\Roaming\\bYHUttVdpSlRoHgHSMeO\\bYHUttVdpSlRoHgHSMeO\\0.0.0.0\\aWKfVMakTT.exe" aWKfVMakTT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_79926ac1886dccd96e70f5dd8b9c1eaf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aWKfVMakTT.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1624 wrote to memory of 4192 1624 JaffaCakes118_79926ac1886dccd96e70f5dd8b9c1eaf.exe 83 PID 1624 wrote to memory of 4192 1624 JaffaCakes118_79926ac1886dccd96e70f5dd8b9c1eaf.exe 83 PID 1624 wrote to memory of 4192 1624 JaffaCakes118_79926ac1886dccd96e70f5dd8b9c1eaf.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_79926ac1886dccd96e70f5dd8b9c1eaf.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_79926ac1886dccd96e70f5dd8b9c1eaf.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\ProgramData\GiGa lnc\GiGa Mini Crypter\1.0.1.0\aWKfVMakTT.exe"C:\ProgramData\GiGa lnc\GiGa Mini Crypter\1.0.1.0\aWKfVMakTT.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5fab881983b01c8b3ff68ad8ed2959048
SHA19caaa13649b36ba2322b44855109b97249dea2a2
SHA256bff981619738f8e371537bd41ed2da690eb7910d0b9807c2a5faaca478ad1f31
SHA5123e95b790247109c8039761672b992f0c94eb140ae4298b4204d14fc811048d2ac30ee0abffccf35e4f34a0b6cced6dfcae1fcbfc52222bb02531e4292b001d70
-
Filesize
18KB
MD551146df205b18e6eca74f5ffcb47eb15
SHA10ed623620ee8bc3714574dbaeddf43969315a675
SHA2565249d995c02e581e0cce9dc2b54924978ca0de7d169770cb14d42efd5ba0d011
SHA5122f7f7de728b4b7c924888bd62018f737f2b867fe7ffbbe6223cdb7a531b1897388e2f75b79c22c137fd3c771d19658fd6c769b60e0d6fb6b564a20f2fff3c8ad