Analysis
-
max time kernel
96s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 20:05
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4f5c3f32faa0d219ed022c95539f7211.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4f5c3f32faa0d219ed022c95539f7211.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_4f5c3f32faa0d219ed022c95539f7211.exe
-
Size
433KB
-
MD5
4f5c3f32faa0d219ed022c95539f7211
-
SHA1
50cd991911e9ec04c8f865f59dd8fdbbb04d3b86
-
SHA256
15c0a4f340e3dc9e3a89fa9c7262ae904554297ce1c260d2f5db5ac7fce8211a
-
SHA512
d381ed93bd51320ffaeb3e998edee395408fab48a00b4fd1e2c36df9b07beb75349df3a69d660e5308469a699aa846432dc4e52188c71fdebf14094e9e7b8753
-
SSDEEP
6144:ARhpnVa2DE5n7ikdWOZModCJ6cTZiPy4h4pcVI/4SmPBTVzEFFAwtT:unkV5nekBMUCfMipT/4LP5VYFFAI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation JaffaCakes118_4f5c3f32faa0d219ed022c95539f7211.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation key.exe -
Executes dropped EXE 4 IoCs
pid Process 392 svchost.exe 2632 key.exe 3808 audiohdE.exe 3604 taskmgr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\High Definition Audio Component = "\"C:\\Program Files (x86)\\Common Files\\audiohdE.exe\"" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3808 set thread context of 3604 3808 audiohdE.exe 93 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\audiohdE.exe svchost.exe File opened for modification C:\Program Files (x86)\Common Files\audiohdE.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4472 3604 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4f5c3f32faa0d219ed022c95539f7211.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language key.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language audiohdE.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 392 svchost.exe 392 svchost.exe 392 svchost.exe 392 svchost.exe 392 svchost.exe 392 svchost.exe 392 svchost.exe 392 svchost.exe 3808 audiohdE.exe 3808 audiohdE.exe 3808 audiohdE.exe 3808 audiohdE.exe 3808 audiohdE.exe 3808 audiohdE.exe 3808 audiohdE.exe 3808 audiohdE.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 392 svchost.exe Token: SeDebugPrivilege 3808 audiohdE.exe Token: SeDebugPrivilege 2632 key.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 736 wrote to memory of 392 736 JaffaCakes118_4f5c3f32faa0d219ed022c95539f7211.exe 85 PID 736 wrote to memory of 392 736 JaffaCakes118_4f5c3f32faa0d219ed022c95539f7211.exe 85 PID 736 wrote to memory of 392 736 JaffaCakes118_4f5c3f32faa0d219ed022c95539f7211.exe 85 PID 736 wrote to memory of 2632 736 JaffaCakes118_4f5c3f32faa0d219ed022c95539f7211.exe 86 PID 736 wrote to memory of 2632 736 JaffaCakes118_4f5c3f32faa0d219ed022c95539f7211.exe 86 PID 736 wrote to memory of 2632 736 JaffaCakes118_4f5c3f32faa0d219ed022c95539f7211.exe 86 PID 392 wrote to memory of 3808 392 svchost.exe 91 PID 392 wrote to memory of 3808 392 svchost.exe 91 PID 392 wrote to memory of 3808 392 svchost.exe 91 PID 3808 wrote to memory of 3604 3808 audiohdE.exe 93 PID 3808 wrote to memory of 3604 3808 audiohdE.exe 93 PID 3808 wrote to memory of 3604 3808 audiohdE.exe 93 PID 3808 wrote to memory of 3604 3808 audiohdE.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4f5c3f32faa0d219ed022c95539f7211.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4f5c3f32faa0d219ed022c95539f7211.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Program Files (x86)\Common Files\audiohdE.exe"C:\Program Files (x86)\Common Files\audiohdE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\ProgramData\taskmgr.exeC:\ProgramData\taskmgr.exe4⤵
- Executes dropped EXE
PID:3604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 125⤵
- Program crash
PID:4472
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\key.exe"C:\Users\Admin\AppData\Local\Temp\key.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3604 -ip 36041⤵PID:5064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD536c689700adbb227867e409938607270
SHA16123e236f73faa37600a60107a5b167980b83a61
SHA256a2158014ecd471868954d0e97397f9df43e310c48d56fa0b5a6ef908dc654adf
SHA512c75728ed30135032a6755e33b9034b98c871554c33a4b8ba1586e0b3282dbc65e3b61571d407365b24289dae2de56b514ef0db744f85e6648dc6432a33b85fef
-
Filesize
114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
Filesize
5KB
MD5ec799873792eb9f5fbc887a9ed00a9c1
SHA1f1fc4216d10d73991ed390b129463a5c351365c1
SHA256e8cff59baccc98dae40be7354ab3f9f85c4d09a599aeb7e624d618d427d9f0d3
SHA512f53ccec4e1ab9de478510e8a513737f96233fef8ecf71ab8b3767c584707641cacbbc4a1d332ea7110f20c08ef5ca51a227a38d1f136f6989d751f514922e69a
-
Filesize
656KB
MD5cfdbc30ac5b0a86bec0ad8779d5fabeb
SHA172b7aa96b1dfe8655842a4e514e8148aaafca959
SHA2568cdb373a5639fd51b07957b7e663b7eb9a5e4d7294ffda38671e8c950175d46a
SHA5121d3a015605037d343579e47bdc96764be3ac64e1180021e7c5ea694a03099ecb1f2c9475cee8651d0102bc78eb5352f4f8f41fefb1747093baaa7d1a92be9205