Analysis
-
max time kernel
84s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 18:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe
-
Size
150KB
-
MD5
53158a67f720dadfbea207ae50aaf9fe
-
SHA1
00d1e2b28f740016f1c8893f01c448afcb4f752d
-
SHA256
e44881402128927dbf7de2101600303b1f086d7f2e2a08940868cccdefe5fbf5
-
SHA512
d1aaffa4c5c8b71dd3a77c4b0ce15c76c1803d8a1acba706a6dfa707b3449448f227caefb6cc180e2b81cf9527881ebcb93c02a7639984112e476e0eebfb5f4a
-
SSDEEP
3072:QaPwiR0gEGSd9GAYnnRdHN7nvCRSc9n39ooTID7jsXTcLd2jr:QwwiRCLGpnDN7KRSQn39oyq7HgP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation inl5BF8.tmp -
Executes dropped EXE 2 IoCs
pid Process 4608 462C.tmp 4908 inl5BF8.tmp -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\LOGS\DPX\setuperr.log expand.exe File created C:\Windows\Installer\e585d61.msi msiexec.exe File created C:\Windows\Installer\e585d5d.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\e585d5d.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\SourceHash{0DBB7279-4674-4190-AD74-D9DD4DF5DAFD} msiexec.exe File opened for modification C:\Windows\Installer\MSI5F32.tmp msiexec.exe File opened for modification C:\Windows\LOGS\DPX\setupact.log expand.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3476 4608 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expand.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 462C.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inl5BF8.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2544 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 2544 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 1044 msiexec.exe 1044 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1088 msiexec.exe Token: SeIncreaseQuotaPrivilege 1088 msiexec.exe Token: SeSecurityPrivilege 1044 msiexec.exe Token: SeCreateTokenPrivilege 1088 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1088 msiexec.exe Token: SeLockMemoryPrivilege 1088 msiexec.exe Token: SeIncreaseQuotaPrivilege 1088 msiexec.exe Token: SeMachineAccountPrivilege 1088 msiexec.exe Token: SeTcbPrivilege 1088 msiexec.exe Token: SeSecurityPrivilege 1088 msiexec.exe Token: SeTakeOwnershipPrivilege 1088 msiexec.exe Token: SeLoadDriverPrivilege 1088 msiexec.exe Token: SeSystemProfilePrivilege 1088 msiexec.exe Token: SeSystemtimePrivilege 1088 msiexec.exe Token: SeProfSingleProcessPrivilege 1088 msiexec.exe Token: SeIncBasePriorityPrivilege 1088 msiexec.exe Token: SeCreatePagefilePrivilege 1088 msiexec.exe Token: SeCreatePermanentPrivilege 1088 msiexec.exe Token: SeBackupPrivilege 1088 msiexec.exe Token: SeRestorePrivilege 1088 msiexec.exe Token: SeShutdownPrivilege 1088 msiexec.exe Token: SeDebugPrivilege 1088 msiexec.exe Token: SeAuditPrivilege 1088 msiexec.exe Token: SeSystemEnvironmentPrivilege 1088 msiexec.exe Token: SeChangeNotifyPrivilege 1088 msiexec.exe Token: SeRemoteShutdownPrivilege 1088 msiexec.exe Token: SeUndockPrivilege 1088 msiexec.exe Token: SeSyncAgentPrivilege 1088 msiexec.exe Token: SeEnableDelegationPrivilege 1088 msiexec.exe Token: SeManageVolumePrivilege 1088 msiexec.exe Token: SeImpersonatePrivilege 1088 msiexec.exe Token: SeCreateGlobalPrivilege 1088 msiexec.exe Token: SeRestorePrivilege 1044 msiexec.exe Token: SeTakeOwnershipPrivilege 1044 msiexec.exe Token: SeIncBasePriorityPrivilege 2544 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe Token: SeRestorePrivilege 1044 msiexec.exe Token: SeTakeOwnershipPrivilege 1044 msiexec.exe Token: SeRestorePrivilege 1044 msiexec.exe Token: SeTakeOwnershipPrivilege 1044 msiexec.exe Token: SeRestorePrivilege 1044 msiexec.exe Token: SeTakeOwnershipPrivilege 1044 msiexec.exe Token: SeRestorePrivilege 1044 msiexec.exe Token: SeTakeOwnershipPrivilege 1044 msiexec.exe Token: SeRestorePrivilege 1044 msiexec.exe Token: SeTakeOwnershipPrivilege 1044 msiexec.exe Token: SeRestorePrivilege 1044 msiexec.exe Token: SeTakeOwnershipPrivilege 1044 msiexec.exe Token: SeRestorePrivilege 1044 msiexec.exe Token: SeTakeOwnershipPrivilege 1044 msiexec.exe Token: SeRestorePrivilege 1044 msiexec.exe Token: SeTakeOwnershipPrivilege 1044 msiexec.exe Token: SeRestorePrivilege 1044 msiexec.exe Token: SeTakeOwnershipPrivilege 1044 msiexec.exe Token: SeRestorePrivilege 1044 msiexec.exe Token: SeTakeOwnershipPrivilege 1044 msiexec.exe Token: SeRestorePrivilege 1044 msiexec.exe Token: SeTakeOwnershipPrivilege 1044 msiexec.exe Token: SeRestorePrivilege 1044 msiexec.exe Token: SeTakeOwnershipPrivilege 1044 msiexec.exe Token: SeRestorePrivilege 1044 msiexec.exe Token: SeTakeOwnershipPrivilege 1044 msiexec.exe Token: SeRestorePrivilege 1044 msiexec.exe Token: SeTakeOwnershipPrivilege 1044 msiexec.exe Token: SeRestorePrivilege 1044 msiexec.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2544 wrote to memory of 4608 2544 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 89 PID 2544 wrote to memory of 4608 2544 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 89 PID 2544 wrote to memory of 4608 2544 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 89 PID 2544 wrote to memory of 1088 2544 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 97 PID 2544 wrote to memory of 1088 2544 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 97 PID 2544 wrote to memory of 1088 2544 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 97 PID 2544 wrote to memory of 4704 2544 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 100 PID 2544 wrote to memory of 4704 2544 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 100 PID 2544 wrote to memory of 4704 2544 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 100 PID 2544 wrote to memory of 4380 2544 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 102 PID 2544 wrote to memory of 4380 2544 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 102 PID 2544 wrote to memory of 4380 2544 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 102 PID 2544 wrote to memory of 2660 2544 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 104 PID 2544 wrote to memory of 2660 2544 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 104 PID 2544 wrote to memory of 2660 2544 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 104 PID 4380 wrote to memory of 1660 4380 cmd.exe 106 PID 4380 wrote to memory of 1660 4380 cmd.exe 106 PID 4380 wrote to memory of 1660 4380 cmd.exe 106 PID 4704 wrote to memory of 4908 4704 cmd.exe 107 PID 4704 wrote to memory of 4908 4704 cmd.exe 107 PID 4704 wrote to memory of 4908 4704 cmd.exe 107 PID 1044 wrote to memory of 4080 1044 msiexec.exe 108 PID 1044 wrote to memory of 4080 1044 msiexec.exe 108 PID 1044 wrote to memory of 4080 1044 msiexec.exe 108 PID 4908 wrote to memory of 4316 4908 inl5BF8.tmp 123 PID 4908 wrote to memory of 4316 4908 inl5BF8.tmp 123 PID 4908 wrote to memory of 4316 4908 inl5BF8.tmp 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Roaming\462C.tmpC:\Users\Admin\AppData\Roaming\462C.tmp2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 2643⤵
- Program crash
PID:3476
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i C:\Users\Admin\AppData\Local\Temp\INS57F~1.INI /quiet2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\run_dws_file.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\inl5BF8.tmpC:\Users\Admin\AppData\Local\Temp\inl5BF8.tmp cdf1912.tmp3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inl5BF8.tmp > nul4⤵
- System Location Discovery: System Language Discovery
PID:4316
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext_favurl_cab.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\expand.exeexpand.exe "C:\Users\Admin\AppData\Local\Temp\favorites_url.cab" -F:*.* "C:\Users\Admin\Favorites"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1660
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4608 -ip 46081⤵PID:4128
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 39BFA48E9D2C8556763526B3B4CB4FC22⤵
- System Location Discovery: System Language Discovery
PID:4080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD536cd85e14475ca3024291cce6e03a11e
SHA1fba0ac1901a5ec71b1bbcc45683fc5c483558006
SHA256a3f72713fd9e0b2b2d324e4c383a990cb1882fc05523f2f7f31d4133366d4c1c
SHA5123717ec490bb2699a59ea3b36e7187dce14ad24de75fa88859b8c4423a2704eeb28ac35a37485cee89e5a081dfba8de173c1478bfaad308bf985a7b6d36d953b4
-
Filesize
66KB
MD5a4b6ed84b623ec3122e6111e6db5609f
SHA1cc23df3d81685206e9d5dd72ea52381bcdf380a5
SHA256dd77b9e53bbd709ef38bfbcc1df216a0018e153811d2b5418017e1cda3357d6f
SHA51225286486412ee6ac77a725a7e41921d0cda6d668e19fbb1ead77c6f0af6715518a888c0a34dacb1bda9f30e7c244c68a1d60b0e5ab30594d7497145c2d83b4f0
-
Filesize
766B
MD5b69d002455f1a5a100e717a6a84ff991
SHA13a99b22845afb2132300095d84534e65823e678d
SHA256c05465e73465c2d6addc7514ad50b517675ce26bfb1a4cad3d3b64b617940934
SHA5121f2e36f1e8c6f66ba746a3450a9f5c07f300bff4682e32344541596b0bdae7e3f443f3e25deaa7936195c48642f9268e3a626a4018772417ce48d26e4f9d1505
-
Filesize
57B
MD5ffcb24e6231a30c9fd4d5f6fe021bdd9
SHA1497daf9294917ac294a752627d4c3ea677e34d3b
SHA2560291ede203370586725633fdea5325d4c8a78b4ef0bae4689a7d5453937e0193
SHA5127f8817040f111d55f33d3a9df28417c3c0af62c4fd86166c7773cd31a95782c2a631f810c35df31063b13e3ae15de885d56303382ffcc41c7ec4fc24b88453de
-
Filesize
98B
MD58663de6fce9208b795dc913d1a6a3f5b
SHA1882193f208cf012eaf22eeaa4fef3b67e7c67c15
SHA2562909ea8555f2fc19097c1070a1da8fcfd6dc6886aa1d99d7e0c05e53feeb5b61
SHA5129381063e0f85e874be54ae22675393b82c6ab54b223090148e4acbeff6f22393c96c90b83d6538461b695528af01d1f1231cf5dc719f07d6168386974b490688
-
Filesize
425B
MD5da68bc3b7c3525670a04366bc55629f5
SHA115fda47ecfead7db8f7aee6ca7570138ba7f1b71
SHA25673f3605192b676c92649034768378909a19d13883a7ea6f8ba1b096c78ffadb5
SHA5126fee416affcb6a74621479697bca6f14f5429b00de3aa595abe3c60c6b2e094877b59f8783bbe7bdd567fa565d0630bb02def5603f8f0ea92fe8f2c3ac5383c0