Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/04/2024, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
e7a73fc4540a3bd2b6bcf9b68d0bb155_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e7a73fc4540a3bd2b6bcf9b68d0bb155_JaffaCakes118.exe
Resource
win10v2004-20240319-en
General
-
Target
e7a73fc4540a3bd2b6bcf9b68d0bb155_JaffaCakes118.exe
-
Size
13KB
-
MD5
e7a73fc4540a3bd2b6bcf9b68d0bb155
-
SHA1
3e99867b8c3b73d0f71f22edd7dd98ba512d599d
-
SHA256
fdaba67a048ee2759a66a4b10b120f90fc713c57f15653d4edb1274617064ad8
-
SHA512
2e22d9bb1c4b9fc58fd23c5be072fcde1df632dd6efa2ce0c02b7a8a29020df5358288b62a5d5150d56b2b8003bb455262c86f2b445f3fb279efd310ff516e49
-
SSDEEP
192:r0J+nk4xxK9qAtPwCmljXQs34W9br32H2Bbf6LZ3LyUQDyG0R6ptZo9aKz9SsGmm:s4xxytPtmqSr2HMby13LWgas9smxY
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\issearch.exe = "issearch.exe" issearch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer\run issearch.exe -
Deletes itself 1 IoCs
pid Process 2588 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2284 issearch.exe -
Loads dropped DLL 3 IoCs
pid Process 2868 e7a73fc4540a3bd2b6bcf9b68d0bb155_JaffaCakes118.exe 2868 e7a73fc4540a3bd2b6bcf9b68d0bb155_JaffaCakes118.exe 2284 issearch.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects issearch.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c3703265-4671-4858-92a4-cba6a7b3bb45} issearch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{c3703265-4671-4858-92a4-cba6a7b3bb45}\ issearch.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\issearch.exe e7a73fc4540a3bd2b6bcf9b68d0bb155_JaffaCakes118.exe File created C:\Windows\SysWOW64\ixt0.dll issearch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Search issearch.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main issearch.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchUrl issearch.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{c3703265-4671-4858-92a4-cba6a7b3bb45} issearch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{c3703265-4671-4858-92a4-cba6a7b3bb45}\ issearch.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{c3703265-4671-4858-92a4-cba6a7b3bb45}\InprocServer32 issearch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{c3703265-4671-4858-92a4-cba6a7b3bb45}\InprocServer32\ = "C:\\Windows\\SysWow64\\ixt0.dll" issearch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{c3703265-4671-4858-92a4-cba6a7b3bb45}\InprocServer32\ThreadingModel = "Apartment" issearch.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID issearch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2868 e7a73fc4540a3bd2b6bcf9b68d0bb155_JaffaCakes118.exe 2868 e7a73fc4540a3bd2b6bcf9b68d0bb155_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2868 e7a73fc4540a3bd2b6bcf9b68d0bb155_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2868 e7a73fc4540a3bd2b6bcf9b68d0bb155_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2284 2868 e7a73fc4540a3bd2b6bcf9b68d0bb155_JaffaCakes118.exe 28 PID 2868 wrote to memory of 2284 2868 e7a73fc4540a3bd2b6bcf9b68d0bb155_JaffaCakes118.exe 28 PID 2868 wrote to memory of 2284 2868 e7a73fc4540a3bd2b6bcf9b68d0bb155_JaffaCakes118.exe 28 PID 2868 wrote to memory of 2284 2868 e7a73fc4540a3bd2b6bcf9b68d0bb155_JaffaCakes118.exe 28 PID 2868 wrote to memory of 2588 2868 e7a73fc4540a3bd2b6bcf9b68d0bb155_JaffaCakes118.exe 29 PID 2868 wrote to memory of 2588 2868 e7a73fc4540a3bd2b6bcf9b68d0bb155_JaffaCakes118.exe 29 PID 2868 wrote to memory of 2588 2868 e7a73fc4540a3bd2b6bcf9b68d0bb155_JaffaCakes118.exe 29 PID 2868 wrote to memory of 2588 2868 e7a73fc4540a3bd2b6bcf9b68d0bb155_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7a73fc4540a3bd2b6bcf9b68d0bb155_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e7a73fc4540a3bd2b6bcf9b68d0bb155_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\issearch.exeC:\Windows\system32\issearch.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
PID:2284
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\E7A73F~1.EXE > nul2⤵
- Deletes itself
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD51d49f8cb231ac795c69632136b33f911
SHA12b0d1f7e118dc998681e212a9f24677f55097198
SHA256241c76e0c727077f260d0fed863782d4f7a13956271cb24fe06ea22be3a31783
SHA51210c94093b216122548596b86874e349573a6881a03fa404e6cb642870e9805f6dfd8dc1c512313b78f6b39a4e2cc4600d9f4ccd0b00ec9035480fe6d92d7652e
-
Filesize
17KB
MD5682d18ff995a1c9f019d9a43e884af14
SHA14f81b2f0266f69ace1978528e1cf59064be7da26
SHA2566646987e2456cc8e0d45d9c2331a7cd586a36b66b3ecfd39929f73a9d096f38c
SHA5120639b32fa98fe0dd941063ee2282bcfde40cc973fc8f18df529b095fbcf7122b53aef6bf218af67bebda53321f25e10e382e70504b6991355187cc9b9b6cc63d