Analysis
-
max time kernel
92s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 02:45
Static task
static1
Behavioral task
behavioral1
Sample
f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe
-
Size
109KB
-
MD5
f01e962abcc35b0b96aea14ba111cdec
-
SHA1
b48fc68d24b109d2ac1e3a80149d76ca6f546953
-
SHA256
32d016276fa303c886e36d9239e6f602a7d699f134632b7308ebd3a556b0e979
-
SHA512
e4e088fc0f4201a3b47afdf39754a6fb29ccbd4d6d49b20e5948a2884b08097a22ccbb236fc98e1f629c61f721f79c0c7bcd8319e5a126d391b7a6b1129d15e0
-
SSDEEP
1536:unMqIyDyIwLhCyod+8pY/QOXArp7x0MJKn8rgiHPyKkk:unMv3LhCPoQOXArltr5vvz
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4564 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\LockX.ocx f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe File created C:\Windows\SysWOW64\LockX.ocx f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4564 set thread context of 4444 4564 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe 85 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A2FCE7AA-98F5-4EAB-9E48-19C554C69D5F}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\LockX.ocx" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A2FCE7AA-98F5-4EAB-9E48-19C554C69D5F}\1.0\HELPDIR f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A2FCE7AA-98F5-4EAB-9E48-19C554C69D5F}\1.0\HELPDIR\ = "C:\\Windows\\system32" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6D1998DB-81DC-4D39-A56A-85528841A141}\TypeLib\ = "{A2FCE7AA-98F5-4EAB-9E48-19C554C69D5F}" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C0733BEF-425C-4E28-8A5A-8CCA4E589748}\MiscStatus f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C0733BEF-425C-4E28-8A5A-8CCA4E589748}\VERSION\ = "1.0" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\LockX.Lock\ = "LockX.Lock" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{33F2DC0A-B786-4C8C-BF2F-F7B4AC86395B}\ = "_Lock" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{33F2DC0A-B786-4C8C-BF2F-F7B4AC86395B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6D1998DB-81DC-4D39-A56A-85528841A141} f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6D1998DB-81DC-4D39-A56A-85528841A141}\TypeLib\Version = "1.0" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C0733BEF-425C-4E28-8A5A-8CCA4E589748} f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{33F2DC0A-B786-4C8C-BF2F-F7B4AC86395B}\TypeLib\Version = "1.0" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C0733BEF-425C-4E28-8A5A-8CCA4E589748}\ = "LockX.Lock" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C0733BEF-425C-4E28-8A5A-8CCA4E589748}\Control f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C0733BEF-425C-4E28-8A5A-8CCA4E589748}\MiscStatus\ = "0" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C0733BEF-425C-4E28-8A5A-8CCA4E589748}\VERSION f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6D1998DB-81DC-4D39-A56A-85528841A141}\TypeLib f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{33F2DC0A-B786-4C8C-BF2F-F7B4AC86395B} f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C0733BEF-425C-4E28-8A5A-8CCA4E589748}\TypeLib\ = "{A2FCE7AA-98F5-4EAB-9E48-19C554C69D5F}" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A2FCE7AA-98F5-4EAB-9E48-19C554C69D5F}\1.0 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A2FCE7AA-98F5-4EAB-9E48-19C554C69D5F}\1.0\0\win32 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{33F2DC0A-B786-4C8C-BF2F-F7B4AC86395B} f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C0733BEF-425C-4E28-8A5A-8CCA4E589748}\MiscStatus\1\ = "148881" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{33F2DC0A-B786-4C8C-BF2F-F7B4AC86395B}\ProxyStubClsid f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{33F2DC0A-B786-4C8C-BF2F-F7B4AC86395B}\ = "_Lock" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{33F2DC0A-B786-4C8C-BF2F-F7B4AC86395B}\TypeLib f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A2FCE7AA-98F5-4EAB-9E48-19C554C69D5F}\1.0\ = "LockX" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{33F2DC0A-B786-4C8C-BF2F-F7B4AC86395B}\TypeLib\Version = "1.0" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6D1998DB-81DC-4D39-A56A-85528841A141}\ProxyStubClsid32 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C0733BEF-425C-4E28-8A5A-8CCA4E589748}\ProgID f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\LockX.Lock\Clsid\ = "{C0733BEF-425C-4E28-8A5A-8CCA4E589748}" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{33F2DC0A-B786-4C8C-BF2F-F7B4AC86395B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6D1998DB-81DC-4D39-A56A-85528841A141}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C0733BEF-425C-4E28-8A5A-8CCA4E589748}\Control\ f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C0733BEF-425C-4E28-8A5A-8CCA4E589748}\ToolboxBitmap32\ = "C:\\Windows\\SysWow64\\LockX.ocx, 30000" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A2FCE7AA-98F5-4EAB-9E48-19C554C69D5F}\1.0\FLAGS f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{33F2DC0A-B786-4C8C-BF2F-F7B4AC86395B}\TypeLib f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{33F2DC0A-B786-4C8C-BF2F-F7B4AC86395B}\TypeLib\ = "{A2FCE7AA-98F5-4EAB-9E48-19C554C69D5F}" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C0733BEF-425C-4E28-8A5A-8CCA4E589748}\InprocServer32\ThreadingModel = "Apartment" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6D1998DB-81DC-4D39-A56A-85528841A141}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A2FCE7AA-98F5-4EAB-9E48-19C554C69D5F}\1.0\FLAGS\ = "2" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A2FCE7AA-98F5-4EAB-9E48-19C554C69D5F}\1.0\0 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{33F2DC0A-B786-4C8C-BF2F-F7B4AC86395B}\ProxyStubClsid32 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{33F2DC0A-B786-4C8C-BF2F-F7B4AC86395B}\TypeLib\ = "{A2FCE7AA-98F5-4EAB-9E48-19C554C69D5F}" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6D1998DB-81DC-4D39-A56A-85528841A141}\ = "__Lock" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{33F2DC0A-B786-4C8C-BF2F-F7B4AC86395B}\ProxyStubClsid32 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6D1998DB-81DC-4D39-A56A-85528841A141}\ProxyStubClsid32 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6D1998DB-81DC-4D39-A56A-85528841A141}\TypeLib f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C0733BEF-425C-4E28-8A5A-8CCA4E589748}\MiscStatus\1 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{33F2DC0A-B786-4C8C-BF2F-F7B4AC86395B}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6D1998DB-81DC-4D39-A56A-85528841A141}\ProxyStubClsid f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6D1998DB-81DC-4D39-A56A-85528841A141} f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C0733BEF-425C-4E28-8A5A-8CCA4E589748}\InprocServer32 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C0733BEF-425C-4E28-8A5A-8CCA4E589748}\TypeLib f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6D1998DB-81DC-4D39-A56A-85528841A141}\TypeLib\Version = "1.0" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C0733BEF-425C-4E28-8A5A-8CCA4E589748}\ProgID\ = "LockX.Lock" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C0733BEF-425C-4E28-8A5A-8CCA4E589748}\InprocServer32\ = "C:\\Windows\\SysWow64\\LockX.ocx" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C0733BEF-425C-4E28-8A5A-8CCA4E589748}\ToolboxBitmap32 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\LockX.Lock f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6D1998DB-81DC-4D39-A56A-85528841A141}\ = "Lock" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6D1998DB-81DC-4D39-A56A-85528841A141}\ProxyStubClsid\ = "{00020420-0000-0000-C000-000000000046}" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A2FCE7AA-98F5-4EAB-9E48-19C554C69D5F} f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6D1998DB-81DC-4D39-A56A-85528841A141}\ = "__Lock" f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4444 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe 4444 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe 4444 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe 4444 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4564 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4564 wrote to memory of 4444 4564 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe 85 PID 4564 wrote to memory of 4444 4564 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe 85 PID 4564 wrote to memory of 4444 4564 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe 85 PID 4564 wrote to memory of 4444 4564 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe 85 PID 4564 wrote to memory of 4444 4564 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe 85 PID 4564 wrote to memory of 4444 4564 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe 85 PID 4564 wrote to memory of 4444 4564 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe 85 PID 4444 wrote to memory of 3464 4444 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe 56 PID 4444 wrote to memory of 3464 4444 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe 56 PID 4444 wrote to memory of 3464 4444 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe 56 PID 4444 wrote to memory of 3464 4444 f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f01e962abcc35b0b96aea14ba111cdec_JaffaCakes118.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4444
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD588bda3c2469728757bf5c6660c9f2ea1
SHA1b344e646fbc4c2fa11a4bdda67b93135fa22994d
SHA256ff6197564b7094e7184de7e6dba6982ad66e11772d6198e58465ec1e83be77f2
SHA5120cecd4abb8e8116ff332df50ba6318fa62948faea5230beaf7850aed1c963a5b8158d6a43b9d108d75d26ae1f3474eac033c80adea9da83af38e2e169923ca87