Analysis
-
max time kernel
113s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2025 18:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ba5416439d1a8a9ec5c5377d125edb4e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ba5416439d1a8a9ec5c5377d125edb4e.exe
Resource
win10v2004-20250207-en
General
-
Target
JaffaCakes118_ba5416439d1a8a9ec5c5377d125edb4e.exe
-
Size
296KB
-
MD5
ba5416439d1a8a9ec5c5377d125edb4e
-
SHA1
488efa82acbb1ecd7335efa761d935689ca4af44
-
SHA256
e60ee4c9ec66cb96aabffce7ba7867a97cf6cd9e48e011cacbefcc6a7875f389
-
SHA512
ea3b66350f24137a5a6fb6b0f80cb29087b6b5c6ba773302406188ee9a7ad0fffa82a28a62e7ea626646df238aec5940cecbbbc46feb3fd4e40be77e0df28562
-
SSDEEP
6144:Q50fpxAfEAy3RLRo5jwBsL5qTm2ZCD+KgCY:dpfAal6cTvZzd
Malware Config
Signatures
-
Downloads MZ/PE file 1 IoCs
flow pid Process 53 4892 Process not Found -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\Control Panel\International\Geo\Nation JaffaCakes118_ba5416439d1a8a9ec5c5377d125edb4e.exe -
Executes dropped EXE 1 IoCs
pid Process 2928 KGtPFvKUDD.exe -
Loads dropped DLL 4 IoCs
pid Process 2928 KGtPFvKUDD.exe 2928 KGtPFvKUDD.exe 2928 KGtPFvKUDD.exe 2928 KGtPFvKUDD.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KGtPFvKUDD.exe = "C:\\Users\\Admin\\AppData\\Roaming\\iHWPyhjEglyverRRsBNp\\iHWPyhjEglyverRRsBNp\\0.0.0.0\\KGtPFvKUDD.exe" KGtPFvKUDD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ba5416439d1a8a9ec5c5377d125edb4e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KGtPFvKUDD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4836 MicrosoftEdgeUpdate.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 556 wrote to memory of 2928 556 JaffaCakes118_ba5416439d1a8a9ec5c5377d125edb4e.exe 93 PID 556 wrote to memory of 2928 556 JaffaCakes118_ba5416439d1a8a9ec5c5377d125edb4e.exe 93 PID 556 wrote to memory of 2928 556 JaffaCakes118_ba5416439d1a8a9ec5c5377d125edb4e.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ba5416439d1a8a9ec5c5377d125edb4e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ba5416439d1a8a9ec5c5377d125edb4e.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:556 -
C:\ProgramData\wktRMprYsxGv\wktRMprYsxGv\1.0.1.0\KGtPFvKUDD.exe"C:\ProgramData\wktRMprYsxGv\wktRMprYsxGv\1.0.1.0\KGtPFvKUDD.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2928
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDcxNzgiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTY4MDM3MTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MDAzNjY0MjEwIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4836
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD58297ac6019f92e308416256d413d5555
SHA1bc71ff35dc0be857d7f5c960e4c1ecd3e7a2307e
SHA2569024aef124827623917b7ad838d697a0edb4bf1e202d9e2b23925848870845ee
SHA51287c1b43e6d0698c1d087a66f384289bdec4133ab1c39f22e9e8fce0dd14d6fc6c346aa7eb5e95c76499be8b1b0ebec2e840effea4f5e79f4ad29a2255486c45d
-
Filesize
18KB
MD5e4b4f52d91c49da13fc81a654763bb61
SHA175b42b5236cbe8ff240a98f3553b17dc4a8ad7cb
SHA25645b2457fc46410edd11de51437e2561a661d37ebf2c3790db31876ad064be0d1
SHA512bcbb042be2ee1d848525e10784b473702a06d7818ad1acfd77cd624bf0750f9aa2d8d172bfe3a916b33561e20ce69a07009f23fbfffb509a54014cd2a58bd288