Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 02:46
Static task
static1
Behavioral task
behavioral1
Sample
f4de3d851eb7dd7c361282901a5fa088_JaffaCakes118.dll
Resource
win7-20240220-en
General
-
Target
f4de3d851eb7dd7c361282901a5fa088_JaffaCakes118.dll
-
Size
358KB
-
MD5
f4de3d851eb7dd7c361282901a5fa088
-
SHA1
9d8905df11662f6c1b4f39af47c1c8bb391f81c7
-
SHA256
ce2b4e250ac3c32f7a265f1a444386a07ec96cbcbb43510734c37b0b9da011e9
-
SHA512
7c55f49c9a5f2cc0b7dfcf56cb7af1d4a9ba9186cbe34e3a2d43cd2013247500e043e8f13e28a0a42b40fa89c8f81c52546db9b6ef5b164e0f24b89c6996b2dd
-
SSDEEP
6144:mm8HFmf2Ee5apzeJ4DSY7Dh6LUr+nxQNBO0fS:GjEuuDC1o
Malware Config
Extracted
qakbot
402.343
tr
1632730751
95.77.223.148:443
47.22.148.6:443
89.101.97.139:443
27.223.92.142:995
120.151.47.189:443
136.232.34.70:443
120.150.218.241:995
185.250.148.74:443
181.118.183.94:443
140.82.49.12:443
67.165.206.193:993
103.148.120.144:443
71.74.12.34:443
76.25.142.196:443
73.151.236.31:443
173.21.10.71:2222
75.188.35.168:443
2.178.88.145:61202
71.80.168.245:443
45.46.53.140:2222
109.12.111.14:443
105.198.236.99:443
73.77.87.137:443
41.248.239.221:995
182.176.112.182:443
96.37.113.36:993
75.66.88.33:443
162.244.227.34:443
24.229.150.54:995
216.201.162.158:443
92.59.35.196:2222
196.218.227.241:995
24.139.72.117:443
68.207.102.78:443
72.252.201.69:443
2.188.27.77:443
177.130.82.197:2222
68.204.7.158:443
189.210.115.207:443
181.163.96.53:443
24.55.112.61:443
75.107.26.196:465
185.250.148.74:2222
68.186.192.69:443
24.152.219.253:995
50.29.166.232:995
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Eiyxfojwouov = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Gtfgwyg = "0" reg.exe -
Loads dropped DLL 1 IoCs
pid Process 1444 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1640 schtasks.exe -
Modifies data under HKEY_USERS 10 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Amaajlugeos\3e05d07d = 11fc9ce5dea82bd848c30ecdc57e481e803d64168ba59f27d68bb225215ea039c8e2587ada7ad0054b1b9ed047383ac203cc370f35a6490d8884d91c58c06f02ad749e79a5fd38f941a5ada1d4b2424f252e12e106d9ac4fb2ac14fe01b42b8433cb9d2905b50c90e6ea5ed200a9fdef090f9cef9d1542645811457ab0951b45474d6daca2ecef0396655fda548834a2e2e09a30a85ffb7b9aabf929b31b6b3cd208e8027d explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Amaajlugeos\3c44f001 = bf21c75dde5d02998c06f32775c8251454155e6c50998fc75de51e46307aa9ea9906750a864c2743a42a1957a5cb4870c2ec55934cbbf6f8f13ebfc9f4702ebe04f408045785f8d443079266a7f80dd96ef75cbce751beee63854b31cc3ea7a3abb14c8a explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Amaajlugeos\414cbf8b = 2200c89958940214052e09845669c86881da2633af9c4e6f10fc0118220c explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Amaajlugeos\86b9b718 = 73bf8f9f040d1febbe3340a06e98113c62f8b08b4760cc6356c5d274c25c6de44ce51e742d7020744635e4ee2e04151d7424985b146aca77fafd5a86924db0ed857583333f9f996ece6a explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Amaajlugeos\b9a0033 = 52290b1b75a62e81400456eccd1a7c072100418e31ebfe5df9927389986484f1c86895b638625255bfd61ffffec7491314c107c07a9c0c4dd4c90c7e4aeef810e7d8b108 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Amaajlugeos explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Amaajlugeos\b9a0033 = 52291c1b75a61bf523f5eddd9ac5b92d043df99a3b331ddcb029077dfc2db1a58ffa018ad82c516b4070c1d93b87b3 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Amaajlugeos\74d36fc5 = 0a5f911875abdb39ef8694309d2b04588b6ac4a961ec explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Amaajlugeos\84f89764 = 18cefd13bea93a99cc6e7166d8efdb6593c9c7f682bc89a4a737911ff437a44fcdc7343819959f1f7f1da88d01488fabe54f1a528cd0 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Amaajlugeos\f9f0d8ee = a6fdfc201471c10cbee93bc7f51a9e5347a38a5a6e09ff2296cafbaeac835d81b851fb8d8d3243ae123dc150651e4d8f71dc9c046ba4da65 explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3560 rundll32.exe 3560 rundll32.exe 1444 regsvr32.exe 1444 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3560 rundll32.exe 1444 regsvr32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4660 wrote to memory of 3560 4660 rundll32.exe 89 PID 4660 wrote to memory of 3560 4660 rundll32.exe 89 PID 4660 wrote to memory of 3560 4660 rundll32.exe 89 PID 3560 wrote to memory of 3620 3560 rundll32.exe 90 PID 3560 wrote to memory of 3620 3560 rundll32.exe 90 PID 3560 wrote to memory of 3620 3560 rundll32.exe 90 PID 3560 wrote to memory of 3620 3560 rundll32.exe 90 PID 3560 wrote to memory of 3620 3560 rundll32.exe 90 PID 3620 wrote to memory of 1640 3620 explorer.exe 91 PID 3620 wrote to memory of 1640 3620 explorer.exe 91 PID 3620 wrote to memory of 1640 3620 explorer.exe 91 PID 2076 wrote to memory of 1444 2076 regsvr32.exe 103 PID 2076 wrote to memory of 1444 2076 regsvr32.exe 103 PID 2076 wrote to memory of 1444 2076 regsvr32.exe 103 PID 1444 wrote to memory of 4472 1444 regsvr32.exe 104 PID 1444 wrote to memory of 4472 1444 regsvr32.exe 104 PID 1444 wrote to memory of 4472 1444 regsvr32.exe 104 PID 1444 wrote to memory of 4472 1444 regsvr32.exe 104 PID 1444 wrote to memory of 4472 1444 regsvr32.exe 104 PID 4472 wrote to memory of 4524 4472 explorer.exe 105 PID 4472 wrote to memory of 4524 4472 explorer.exe 105 PID 4472 wrote to memory of 4396 4472 explorer.exe 107 PID 4472 wrote to memory of 4396 4472 explorer.exe 107
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f4de3d851eb7dd7c361282901a5fa088_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f4de3d851eb7dd7c361282901a5fa088_JaffaCakes118.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn muzjirfov /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\f4de3d851eb7dd7c361282901a5fa088_JaffaCakes118.dll\"" /SC ONCE /Z /ST 02:48 /ET 03:004⤵
- Creates scheduled task(s)
PID:1640
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4240 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵PID:3128
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\f4de3d851eb7dd7c361282901a5fa088_JaffaCakes118.dll"1⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\f4de3d851eb7dd7c361282901a5fa088_JaffaCakes118.dll"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Eiyxfojwouov" /d "0"4⤵
- Windows security bypass
PID:4524
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Gtfgwyg" /d "0"4⤵
- Windows security bypass
PID:4396
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
358KB
MD5f4de3d851eb7dd7c361282901a5fa088
SHA19d8905df11662f6c1b4f39af47c1c8bb391f81c7
SHA256ce2b4e250ac3c32f7a265f1a444386a07ec96cbcbb43510734c37b0b9da011e9
SHA5127c55f49c9a5f2cc0b7dfcf56cb7af1d4a9ba9186cbe34e3a2d43cd2013247500e043e8f13e28a0a42b40fa89c8f81c52546db9b6ef5b164e0f24b89c6996b2dd