Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-04-2024 05:04
Static task
static1
Behavioral task
behavioral1
Sample
dbf66cf845c6af2445cb611215c84282_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
dbf66cf845c6af2445cb611215c84282_JaffaCakes118.dll
-
Size
905KB
-
MD5
dbf66cf845c6af2445cb611215c84282
-
SHA1
ae1c4b5d117e57bf8d541edab0e0bd100db07ea1
-
SHA256
7cd8216e129493641bbe7f573b13425bcf52923bad83ee532abd66fed293d9fc
-
SHA512
300c569c6221b7d24ecee114d9cee1a7f9f6873de2ba21cf41f115f2e456a81b7348b584c1d5c442b5bfa3624538f16e3f9e7f756158a302f12187f657c984b7
-
SSDEEP
12288:dU7AzcO18OcZtc98uEE8aPfR6xa7jg0Ii3pSGdSJbbIclZg5i0WBRLuMdgX2rbnj:GAzcO1T0yfR6lxcYIYZDqM9n7Bn
Malware Config
Extracted
qakbot
402.363
obama116
1634289383
41.228.22.180:443
188.55.249.239:995
120.150.218.241:995
37.117.191.19:2222
68.204.7.158:443
81.241.252.59:2078
196.207.140.40:995
174.54.193.186:443
63.143.92.99:995
197.89.144.200:443
86.220.112.26:2222
73.52.50.32:443
103.82.211.39:465
146.66.238.74:443
167.248.117.81:443
2.222.167.138:443
181.118.183.94:443
103.82.211.39:995
78.179.137.102:995
89.137.52.44:443
189.152.1.4:80
217.17.56.163:465
174.76.17.43:443
98.203.26.168:443
213.60.210.85:443
199.27.127.129:443
93.48.58.123:2222
81.250.153.227:2222
37.210.152.224:995
65.100.174.110:995
91.178.126.51:995
72.173.78.211:443
94.200.181.154:443
176.45.11.226:443
136.232.34.70:443
220.255.25.28:2222
27.223.92.142:995
208.78.220.143:443
76.25.142.196:443
213.205.242.210:995
65.100.174.110:443
140.82.49.12:443
216.201.162.158:443
39.49.32.238:995
24.231.209.2:2222
65.100.174.110:6881
69.30.186.190:443
41.86.42.158:995
187.75.66.160:995
68.186.192.69:443
73.151.236.31:443
71.74.12.34:443
122.60.71.201:995
75.188.35.168:443
173.22.178.66:443
189.135.16.92:443
173.21.10.71:2222
45.46.53.140:2222
187.156.169.68:443
105.198.236.99:443
65.100.174.110:8443
189.146.41.71:443
181.4.53.6:465
47.40.196.233:2222
72.252.201.69:995
67.165.206.193:993
189.147.159.42:443
50.194.160.233:32100
50.194.160.233:465
89.101.97.139:443
24.139.72.117:443
24.229.150.54:995
24.55.112.61:443
2.221.12.60:443
201.68.60.118:995
50.194.160.233:995
109.12.111.14:443
77.57.204.78:443
65.100.174.110:32103
123.201.44.86:6881
177.76.251.27:995
103.142.10.177:443
136.143.11.232:443
136.232.254.46:995
67.230.44.194:443
109.200.192.84:443
73.230.205.91:443
24.119.214.7:443
49.206.29.127:443
103.148.120.144:443
189.252.218.40:32101
136.232.254.46:443
95.159.33.115:995
115.96.62.113:443
96.37.113.36:993
85.60.147.26:2078
75.131.217.182:443
85.60.147.26:2222
39.52.209.173:995
129.35.116.77:990
68.117.229.117:443
83.110.201.195:443
80.6.192.58:443
103.250.38.115:443
117.198.158.234:443
185.250.148.74:443
82.43.184.158:443
111.125.245.116:443
124.123.42.115:2222
189.252.166.130:32101
103.82.211.39:993
82.178.55.68:443
187.149.255.245:443
72.252.32.47:443
24.231.209.2:8443
105.242.94.246:995
24.231.209.2:50000
24.231.209.2:1194
24.107.165.50:443
50.194.160.233:993
50.194.160.233:22
24.231.209.2:2083
24.231.209.2:2087
24.231.209.2:2078
24.231.209.2:6881
39.49.64.244:995
24.231.209.2:50001
24.231.209.2:32100
50.194.160.233:443
123.201.40.112:443
120.151.47.189:443
86.152.43.223:443
67.166.233.75:443
122.11.222.242:2222
187.250.159.104:443
75.66.88.33:443
73.77.87.137:443
66.216.193.114:443
96.57.188.174:2078
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Processes:
reg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Njfiu = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Baaag = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1216 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ufehbwxyucq\5845f23a = 990ea39d22aede96d9d223a043aa70cc321e53cd1b8286a444dc7aaf367f1238082d552b2c988f855ef109f925f9322906552572b904b85e3c explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ufehbwxyucq\6f9b0208 = ed62b735efd63335f128f6a7fcec86dd9d8d6949c001ae7253e5c41b559e explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ufehbwxyucq\d727656d = 7616d70be7bb7371e3e40cb69f6379c60ab0ce573766160a7f57a26a0b4f328e67046353f1b745d3ef1cb6dfe8258bf0ff394d931171c91581abe4cfa20aaf3baeb8ceaa906a8213329a31eabe35c80762d8 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ufehbwxyucq\aa2f2ae7 = f28953a469c55f3a6991884dcb63e2e3af explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ufehbwxyucq\270c9dcc = 45786bccc670f2e5a5d907979cbf72 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ufehbwxyucq\5845f23a = 990eb49d22aeeb5f3ecba9f4683039dd51a4849f3fa8558de1ff910ab706f2fe9af656818b1e130a20a2360f1e6760549cbe7a6b4af81aae916ca766d90db8e3d7a96a55a9decbb44b974b2c1fe4 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ufehbwxyucq explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ufehbwxyucq\6dda2274 = 303439e7e8f5f03589c8a22357efc4ab2e2b66b25604b19049bd3e36ff579a69a53051e8623823d6405de338e49b428f7b19c19fe8b1344bd05d6e003b190f253dafa35656db99a2755db46834987d3b826adb5ec00691d8ca0d92aa6dae24102ead05166f00a7ebf2cb0220cd08f30850771f0846db347790becfda29af61fca1c9b3a53380b0700e59269d238dfcd877900fa3c3cccb0aa4875533808802af514213ad9be0386a30 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ufehbwxyucq\12934d82 = f650f3e846a05ab50c7aeb387970e851c522abd801 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ufehbwxyucq\d5664511 = 01120f5177d0b2f96a323ee394ab1504365a8cb24efb66e5edbc32993f7426bb656788bdbaec explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exeregsvr32.exepid process 3460 rundll32.exe 3460 rundll32.exe 1216 regsvr32.exe 1216 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 3460 rundll32.exe 1216 regsvr32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 4564 wrote to memory of 3460 4564 rundll32.exe rundll32.exe PID 4564 wrote to memory of 3460 4564 rundll32.exe rundll32.exe PID 4564 wrote to memory of 3460 4564 rundll32.exe rundll32.exe PID 3460 wrote to memory of 3500 3460 rundll32.exe explorer.exe PID 3460 wrote to memory of 3500 3460 rundll32.exe explorer.exe PID 3460 wrote to memory of 3500 3460 rundll32.exe explorer.exe PID 3460 wrote to memory of 3500 3460 rundll32.exe explorer.exe PID 3460 wrote to memory of 3500 3460 rundll32.exe explorer.exe PID 3500 wrote to memory of 5096 3500 explorer.exe schtasks.exe PID 3500 wrote to memory of 5096 3500 explorer.exe schtasks.exe PID 3500 wrote to memory of 5096 3500 explorer.exe schtasks.exe PID 3312 wrote to memory of 1216 3312 regsvr32.exe regsvr32.exe PID 3312 wrote to memory of 1216 3312 regsvr32.exe regsvr32.exe PID 3312 wrote to memory of 1216 3312 regsvr32.exe regsvr32.exe PID 1216 wrote to memory of 264 1216 regsvr32.exe explorer.exe PID 1216 wrote to memory of 264 1216 regsvr32.exe explorer.exe PID 1216 wrote to memory of 264 1216 regsvr32.exe explorer.exe PID 1216 wrote to memory of 264 1216 regsvr32.exe explorer.exe PID 1216 wrote to memory of 264 1216 regsvr32.exe explorer.exe PID 264 wrote to memory of 3480 264 explorer.exe reg.exe PID 264 wrote to memory of 3480 264 explorer.exe reg.exe PID 264 wrote to memory of 4476 264 explorer.exe reg.exe PID 264 wrote to memory of 4476 264 explorer.exe reg.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dbf66cf845c6af2445cb611215c84282_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dbf66cf845c6af2445cb611215c84282_JaffaCakes118.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn glbgnlik /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\dbf66cf845c6af2445cb611215c84282_JaffaCakes118.dll\"" /SC ONCE /Z /ST 05:07 /ET 05:194⤵
- Creates scheduled task(s)
PID:5096
-
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\dbf66cf845c6af2445cb611215c84282_JaffaCakes118.dll"1⤵
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\dbf66cf845c6af2445cb611215c84282_JaffaCakes118.dll"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Njfiu" /d "0"4⤵
- Windows security bypass
PID:3480
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Baaag" /d "0"4⤵
- Windows security bypass
PID:4476
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
905KB
MD5dbf66cf845c6af2445cb611215c84282
SHA1ae1c4b5d117e57bf8d541edab0e0bd100db07ea1
SHA2567cd8216e129493641bbe7f573b13425bcf52923bad83ee532abd66fed293d9fc
SHA512300c569c6221b7d24ecee114d9cee1a7f9f6873de2ba21cf41f115f2e456a81b7348b584c1d5c442b5bfa3624538f16e3f9e7f756158a302f12187f657c984b7