Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 08:53
Static task
static1
Behavioral task
behavioral1
Sample
a8d385367ec6e7c892816e137900ff79_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
a8d385367ec6e7c892816e137900ff79_JaffaCakes118.exe
-
Size
806KB
-
MD5
a8d385367ec6e7c892816e137900ff79
-
SHA1
8d6b34a726c8206d3c76c0b2e418ae064e5eaac0
-
SHA256
bcfbf1fd4641c8b686c9dabd458b4db3efdcf03157fa7b09515a00e980e889ce
-
SHA512
2f9f0f27fa3ff7db5f4afa46826ee0e85e30e918dbd58ae0162b3cbc7aeaafc647e88263758f2fb2e00d9d0bd5f4584b808ee0dbe1eaf15f6a05b123a48d4f43
-
SSDEEP
24576:rmoO8itEqfZm27QKJ44ZErvgjUn2wTF/2W:qvZpQKPErvWKF/9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a8d385367ec6e7c892816e137900ff79_JaffaCakes118.exeoutlook.sfx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation a8d385367ec6e7c892816e137900ff79_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation outlook.sfx.exe -
Executes dropped EXE 2 IoCs
Processes:
outlook.sfx.exeoutlook.exepid process 4780 outlook.sfx.exe 3692 outlook.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
outlook.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PCI Service = "C:\\Program Files\\PCI Service\\pcisv.exe" outlook.exe -
Processes:
outlook.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA outlook.exe -
Drops file in Program Files directory 2 IoCs
Processes:
outlook.exedescription ioc process File created C:\Program Files\PCI Service\pcisv.exe outlook.exe File opened for modification C:\Program Files\PCI Service\pcisv.exe outlook.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
outlook.exepid process 3692 outlook.exe 3692 outlook.exe 3692 outlook.exe 3692 outlook.exe 3692 outlook.exe 3692 outlook.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
outlook.exepid process 3692 outlook.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
outlook.exedescription pid process Token: SeDebugPrivilege 3692 outlook.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
a8d385367ec6e7c892816e137900ff79_JaffaCakes118.execmd.exeoutlook.sfx.exedescription pid process target process PID 2084 wrote to memory of 732 2084 a8d385367ec6e7c892816e137900ff79_JaffaCakes118.exe cmd.exe PID 2084 wrote to memory of 732 2084 a8d385367ec6e7c892816e137900ff79_JaffaCakes118.exe cmd.exe PID 2084 wrote to memory of 732 2084 a8d385367ec6e7c892816e137900ff79_JaffaCakes118.exe cmd.exe PID 732 wrote to memory of 4780 732 cmd.exe outlook.sfx.exe PID 732 wrote to memory of 4780 732 cmd.exe outlook.sfx.exe PID 732 wrote to memory of 4780 732 cmd.exe outlook.sfx.exe PID 4780 wrote to memory of 3692 4780 outlook.sfx.exe outlook.exe PID 4780 wrote to memory of 3692 4780 outlook.sfx.exe outlook.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8d385367ec6e7c892816e137900ff79_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a8d385367ec6e7c892816e137900ff79_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\frg.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\outlook.sfx.exeoutlook.sfx.exe -p126 -dC:\Users\Admin\AppData\Local\Temp3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\outlook.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\outlook.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\frg.batFilesize
30B
MD5ffa5e8316d6624bc4988a91fc24107f2
SHA1087399a1d78f1fee901ec77f7bfd011027003c37
SHA256858e2cd0a37f82e72708bc15d0ed615746335027431b25ad7e4d8019e7fdc0f6
SHA5127a0766d6c743ffff886adf9a680c774bb65cc99dd257f14016d6cd1240a0d7db1c0e4e4a65dacc00c2a1d97bb28d58af0b8ab790fe0b9ef1af3ba834b4634c38
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\outlook.sfx.exeFilesize
679KB
MD5089936829e638abf2b4cf0287727ee51
SHA1985e4dea3285f69dbdb631975db8beb988f703ad
SHA2568152d18936f593cfddeeac2b9e5bfc5ffe2318b2a5f3a03f0436f4f5ee650da6
SHA51275d4e19582008947a88458de2503dcefe16719b524b4219f9f29c68737855ff8421b0e6f72f84504d0e80f5e7b3689cf22de401ca2495065f4dded17fc85dc79
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\outlook.exeFilesize
474KB
MD5d2493c220e2349658da794a9fc2b8218
SHA1f71d7f8943b5aea24df5a846e7c875c0baae6446
SHA2561a102d9004be63a3b0921dce05c5f18ffbf81d8dbc2c8584f9b19cc38f6dee35
SHA512eb878ca785198d682e685cc845c402d4038b6f786beecc726f1e72185755b8edb6ee794f48d221d57db57d122efa3dd6e1d336f141aab1f806f8a27453c1a2fd
-
memory/3692-19-0x0000000000BA0000-0x0000000000BB0000-memory.dmpFilesize
64KB
-
memory/3692-20-0x000000001B820000-0x000000001BCEE000-memory.dmpFilesize
4.8MB
-
memory/3692-21-0x000000001BCF0000-0x000000001BD8C000-memory.dmpFilesize
624KB
-
memory/3692-22-0x000000001BF40000-0x000000001BFE6000-memory.dmpFilesize
664KB
-
memory/3692-23-0x0000000000B50000-0x0000000000B58000-memory.dmpFilesize
32KB
-
memory/3692-26-0x000000001C4C0000-0x000000001C4CA000-memory.dmpFilesize
40KB
-
memory/3692-27-0x000000001C1F0000-0x000000001C202000-memory.dmpFilesize
72KB
-
memory/3692-28-0x000000001C6D0000-0x000000001C6EA000-memory.dmpFilesize
104KB
-
memory/3692-29-0x0000000000EC0000-0x0000000000ED4000-memory.dmpFilesize
80KB
-
memory/3692-31-0x000000001C6F0000-0x000000001C70E000-memory.dmpFilesize
120KB
-
memory/3692-30-0x000000001C020000-0x000000001C02E000-memory.dmpFilesize
56KB
-
memory/3692-32-0x0000000000B70000-0x0000000000B7A000-memory.dmpFilesize
40KB
-
memory/3692-33-0x000000001C980000-0x000000001C9AE000-memory.dmpFilesize
184KB
-
memory/3692-34-0x000000001C820000-0x000000001C834000-memory.dmpFilesize
80KB
-
memory/3692-35-0x0000000000BA0000-0x0000000000BB0000-memory.dmpFilesize
64KB