Analysis
-
max time kernel
139s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 13:38
Static task
static1
Behavioral task
behavioral1
Sample
fce20c78174b38ef7491e97461efce9e_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
fce20c78174b38ef7491e97461efce9e_JaffaCakes118.dll
-
Size
689KB
-
MD5
fce20c78174b38ef7491e97461efce9e
-
SHA1
594a74c8197228ac25eafd058ade9ec40533aad7
-
SHA256
0def0284732d41ec83ce66364d566b6aa3d914d5e0d7c4dff68eae15df5d557b
-
SHA512
84a1bcfad2fbac58d733cb43945309921e89272ea47030d9e9cc9b17813279e26e0410e65296065e3f825de3a47b7486cf65e07e62dfd1ccd63cede744b83833
-
SSDEEP
12288:BrI0bPKn8p/S0jXgfFWVkMXl2xAgwFX2ddG83tNzZ0XssC82H6/vLyWMAy:pI0bP1XWMXsAZX6JcTLdMN
Malware Config
Extracted
qakbot
402.363
obama117
1634545803
176.45.53.222:443
220.255.25.28:2222
91.178.126.51:995
2.222.167.138:443
65.100.174.110:995
105.198.236.99:995
115.96.64.9:995
196.207.140.40:995
24.231.209.2:2222
146.66.238.74:443
103.82.211.39:995
65.100.174.110:443
103.142.10.177:443
140.82.49.12:443
78.105.213.151:995
41.86.42.158:995
89.101.97.139:443
120.150.218.241:995
24.119.214.7:443
103.143.8.71:443
81.241.252.59:2078
81.250.153.227:2222
174.54.193.186:443
73.52.50.32:443
39.49.122.240:995
86.220.112.26:2222
103.82.211.39:465
78.191.38.33:995
216.201.162.158:443
181.118.183.94:443
143.131.13.193:0
208.78.220.143:443
94.200.181.154:443
136.232.34.70:443
136.143.11.232:443
81.213.59.22:443
103.82.211.39:990
38.70.253.226:2222
98.203.26.168:443
199.27.127.129:443
31.167.109.100:443
93.48.58.123:2222
111.91.87.187:995
37.210.155.239:995
117.215.228.151:443
188.50.26.190:995
76.25.142.196:443
71.74.12.34:443
174.76.17.43:443
96.37.113.36:993
173.25.162.221:443
89.137.52.44:443
189.135.16.92:443
67.165.206.193:993
86.8.177.143:443
73.151.236.31:443
213.60.210.85:443
173.21.10.71:2222
45.46.53.140:2222
75.188.35.168:443
109.12.111.14:443
187.75.66.160:995
86.152.43.219:443
39.33.163.183:995
47.40.196.233:2222
187.149.227.40:443
167.248.117.81:443
197.89.144.102:443
41.228.22.180:443
116.193.136.10:443
122.179.158.212:443
103.148.120.144:443
77.57.204.78:443
182.176.180.73:443
103.82.211.39:993
63.143.92.99:995
117.202.161.73:2222
72.173.78.211:443
187.156.169.68:443
65.100.174.110:8443
189.146.41.71:443
68.204.7.158:443
65.100.174.110:6881
69.30.186.190:443
189.147.159.42:443
190.117.91.214:443
181.4.53.6:465
201.172.31.95:80
72.252.201.69:995
174.206.106.137:443
39.40.37.70:32100
187.172.199.200:443
24.139.72.117:443
24.229.150.54:995
37.117.191.19:2222
39.52.206.119:995
80.6.192.58:443
27.223.92.142:995
68.186.192.69:443
122.60.71.201:995
173.22.178.66:443
50.194.160.233:32100
50.194.160.233:465
24.55.112.61:443
2.221.12.60:443
201.68.60.118:995
50.194.160.233:995
65.100.174.110:32103
123.201.44.86:6881
177.76.251.27:995
67.230.44.194:443
109.200.192.84:443
73.230.205.91:443
27.59.32.229:443
189.252.137.204:32101
136.232.254.46:443
95.159.33.115:995
115.96.62.113:443
85.60.147.26:2078
75.131.217.182:443
85.60.147.26:2222
129.35.116.77:990
68.117.229.117:443
83.110.201.195:443
103.250.38.115:443
117.198.158.234:443
185.250.148.74:443
82.43.184.158:443
111.125.245.116:443
124.123.42.115:2222
189.252.166.130:32101
82.178.55.68:443
187.149.255.245:443
72.252.32.47:443
24.231.209.2:8443
105.242.94.246:995
24.231.209.2:50000
24.231.209.2:1194
24.107.165.50:443
50.194.160.233:993
50.194.160.233:22
24.231.209.2:2083
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Vuljoglc = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Agaulahcmh = "0" reg.exe -
Loads dropped DLL 1 IoCs
pid Process 2704 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2636 schtasks.exe -
Modifies data under HKEY_USERS 10 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Rxivnfy\8884d2b3 = be75d63f37e39792b53247ab6c363a9c834a9c7b604425a8b7d3fa4d541e079fd3ea3bcd69b2cf7769af2015a4d564d34c04fff5fd3e295eebbd46bc5518bfaf40cf49fea85ab1939d459956aed93e3562b8524779f54756cf90faf4 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Rxivnfy\bd1b02fd = 623eac83354c8f724df1c9670b47358decd925abeb38114e3c9ecea17b73dc7c625b961a96e8e259177051b538d6815bc049f4410ed519038ffd14cfac1b3236ead9c670eef4a8130513d83bb22bb10cfa27797b3f398c9db19e3768dcdccc5edc7e0ba3faf65396d738cb83ad10ff31e4ba804191b26c5c9ed135b163b458d108a23392 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Rxivnfy\7e645e4 = 1d518f99252bb7173170d68b0ddfcb900013b4531b2082c3ead94c9689f4dfc8b29630f47618238a explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Rxivnfy\8884d2b3 = be75c13f37e3a2feb5835a0497d60435e04230c5ca63516c6752d366cbafc70df77c0d9453c256d637db6de110a771cb934a3a0619841b4c0d3e893ec32de7b2ff46e23251206e18e43fd34da8309fd8a9585fa62b85c0f1110b227e13622c1ef671e04050fe00be12e7bc48608b51db30 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Rxivnfy\5a76598 = 3d14465162081c9fa47b5e65e67db299bd979607d77012d55e43606a0155c01dee298a4c0efcc552fc68f05640167cea9d90d4b9d3c317763978e949afef7be7848bec08856596e777ab47a6a95053297484465d explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Rxivnfy\f7cdbd45 = 2397d85dc77fd26d0dbd8f448637c6daad42c926972cabfb133d798950e40f83b1296edb2fbd04e19d6985619a87553cf6f64c166101be9647cdbc3361ec2a3611ad418a5295 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Rxivnfy explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Rxivnfy\bf5a2281 = f4ccc1f0017b89a3d1a87646a14ce5c6840627e1d5 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Rxivnfy\7aee0a6e = 28c31fd57f3300bc2592ce39a41cc1bda5822348968cbf96 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Rxivnfy\c2526d0b = 17ff5348b64b77dd86ac5f59813fc5f6b4eeb543c0090f1b8fe1c8c1851df6c9894d5f569d59e78925 explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2220 rundll32.exe 2704 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2220 rundll32.exe 2704 regsvr32.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2220 2236 rundll32.exe 28 PID 2236 wrote to memory of 2220 2236 rundll32.exe 28 PID 2236 wrote to memory of 2220 2236 rundll32.exe 28 PID 2236 wrote to memory of 2220 2236 rundll32.exe 28 PID 2236 wrote to memory of 2220 2236 rundll32.exe 28 PID 2236 wrote to memory of 2220 2236 rundll32.exe 28 PID 2236 wrote to memory of 2220 2236 rundll32.exe 28 PID 2220 wrote to memory of 2144 2220 rundll32.exe 29 PID 2220 wrote to memory of 2144 2220 rundll32.exe 29 PID 2220 wrote to memory of 2144 2220 rundll32.exe 29 PID 2220 wrote to memory of 2144 2220 rundll32.exe 29 PID 2220 wrote to memory of 2144 2220 rundll32.exe 29 PID 2220 wrote to memory of 2144 2220 rundll32.exe 29 PID 2144 wrote to memory of 2636 2144 explorer.exe 30 PID 2144 wrote to memory of 2636 2144 explorer.exe 30 PID 2144 wrote to memory of 2636 2144 explorer.exe 30 PID 2144 wrote to memory of 2636 2144 explorer.exe 30 PID 2976 wrote to memory of 2060 2976 taskeng.exe 35 PID 2976 wrote to memory of 2060 2976 taskeng.exe 35 PID 2976 wrote to memory of 2060 2976 taskeng.exe 35 PID 2976 wrote to memory of 2060 2976 taskeng.exe 35 PID 2976 wrote to memory of 2060 2976 taskeng.exe 35 PID 2060 wrote to memory of 2704 2060 regsvr32.exe 36 PID 2060 wrote to memory of 2704 2060 regsvr32.exe 36 PID 2060 wrote to memory of 2704 2060 regsvr32.exe 36 PID 2060 wrote to memory of 2704 2060 regsvr32.exe 36 PID 2060 wrote to memory of 2704 2060 regsvr32.exe 36 PID 2060 wrote to memory of 2704 2060 regsvr32.exe 36 PID 2060 wrote to memory of 2704 2060 regsvr32.exe 36 PID 2704 wrote to memory of 1548 2704 regsvr32.exe 37 PID 2704 wrote to memory of 1548 2704 regsvr32.exe 37 PID 2704 wrote to memory of 1548 2704 regsvr32.exe 37 PID 2704 wrote to memory of 1548 2704 regsvr32.exe 37 PID 2704 wrote to memory of 1548 2704 regsvr32.exe 37 PID 2704 wrote to memory of 1548 2704 regsvr32.exe 37 PID 1548 wrote to memory of 2496 1548 explorer.exe 38 PID 1548 wrote to memory of 2496 1548 explorer.exe 38 PID 1548 wrote to memory of 2496 1548 explorer.exe 38 PID 1548 wrote to memory of 2496 1548 explorer.exe 38 PID 1548 wrote to memory of 392 1548 explorer.exe 40 PID 1548 wrote to memory of 392 1548 explorer.exe 40 PID 1548 wrote to memory of 392 1548 explorer.exe 40 PID 1548 wrote to memory of 392 1548 explorer.exe 40
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fce20c78174b38ef7491e97461efce9e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fce20c78174b38ef7491e97461efce9e_JaffaCakes118.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn jzxsfhslp /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\fce20c78174b38ef7491e97461efce9e_JaffaCakes118.dll\"" /SC ONCE /Z /ST 13:40 /ET 13:524⤵
- Creates scheduled task(s)
PID:2636
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {1FD8446E-CD79-4EB2-ABC9-851A0D200C92} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\fce20c78174b38ef7491e97461efce9e_JaffaCakes118.dll"2⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\fce20c78174b38ef7491e97461efce9e_JaffaCakes118.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Vuljoglc" /d "0"5⤵
- Windows security bypass
PID:2496
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Agaulahcmh" /d "0"5⤵
- Windows security bypass
PID:392
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
689KB
MD5fce20c78174b38ef7491e97461efce9e
SHA1594a74c8197228ac25eafd058ade9ec40533aad7
SHA2560def0284732d41ec83ce66364d566b6aa3d914d5e0d7c4dff68eae15df5d557b
SHA51284a1bcfad2fbac58d733cb43945309921e89272ea47030d9e9cc9b17813279e26e0410e65296065e3f825de3a47b7486cf65e07e62dfd1ccd63cede744b83833