Analysis
-
max time kernel
136s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 19:08
Static task
static1
Behavioral task
behavioral1
Sample
fff7c1f77588105fc5a76b841983253f_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
fff7c1f77588105fc5a76b841983253f_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
fff7c1f77588105fc5a76b841983253f
-
SHA1
c87d3d2cf8d649d9e0cd045f28d6972fc1ab9edb
-
SHA256
39ec80621b9b8fcefe89e543622c4263b7629a1207107bebd239a50124bb7fc7
-
SHA512
a23e67eb352dc383e56ad422708ea74165d294925d57b08d24d937d7bf90f6e49d5768d18f3de2cf479b57c6bd710c786e3ea4f6dc0b77851d73aab021dce6c7
-
SSDEEP
49152:xcBGvy10E+QMWcLctpCOOeWAbaW44EwJ84vLRaBtIl9mTRP+m+OJz:xb4MWcApaeW9FvCvLUBsKRPUkz
Malware Config
Extracted
nullmixer
http://wxkeww.xyz/
Signatures
-
Processes:
karotima_1.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" karotima_1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection karotima_1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" karotima_1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" karotima_1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" karotima_1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" karotima_1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" karotima_1.exe -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rUNdlL32.eXedescription pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 712 556 rUNdlL32.eXe 105 -
Processes:
resource yara_rule behavioral2/files/0x0007000000023491-18.dat aspack_v212_v242 behavioral2/files/0x000700000002348d-24.dat aspack_v212_v242 behavioral2/files/0x000700000002348c-32.dat aspack_v212_v242 behavioral2/files/0x000700000002348f-35.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fff7c1f77588105fc5a76b841983253f_JaffaCakes118.exekarotima_2.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation fff7c1f77588105fc5a76b841983253f_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation karotima_2.exe -
Executes dropped EXE 4 IoCs
Processes:
setup_install.exekarotima_1.exekarotima_2.exekarotima_2.exepid Process 2072 setup_install.exe 1140 karotima_1.exe 2256 karotima_2.exe 2672 karotima_2.exe -
Loads dropped DLL 8 IoCs
Processes:
setup_install.exerundll32.exepid Process 2072 setup_install.exe 2072 setup_install.exe 2072 setup_install.exe 2072 setup_install.exe 2072 setup_install.exe 2072 setup_install.exe 2072 setup_install.exe 1192 rundll32.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 ipinfo.io 7 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 3664 2072 WerFault.exe 89 2876 1192 WerFault.exe 107 -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
fff7c1f77588105fc5a76b841983253f_JaffaCakes118.exesetup_install.execmd.execmd.exekarotima_2.exerUNdlL32.eXedescription pid Process procid_target PID 4324 wrote to memory of 2072 4324 fff7c1f77588105fc5a76b841983253f_JaffaCakes118.exe 89 PID 4324 wrote to memory of 2072 4324 fff7c1f77588105fc5a76b841983253f_JaffaCakes118.exe 89 PID 4324 wrote to memory of 2072 4324 fff7c1f77588105fc5a76b841983253f_JaffaCakes118.exe 89 PID 2072 wrote to memory of 2156 2072 setup_install.exe 96 PID 2072 wrote to memory of 2156 2072 setup_install.exe 96 PID 2072 wrote to memory of 2156 2072 setup_install.exe 96 PID 2072 wrote to memory of 1132 2072 setup_install.exe 97 PID 2072 wrote to memory of 1132 2072 setup_install.exe 97 PID 2072 wrote to memory of 1132 2072 setup_install.exe 97 PID 2156 wrote to memory of 1140 2156 cmd.exe 100 PID 2156 wrote to memory of 1140 2156 cmd.exe 100 PID 2156 wrote to memory of 1140 2156 cmd.exe 100 PID 1132 wrote to memory of 2256 1132 cmd.exe 101 PID 1132 wrote to memory of 2256 1132 cmd.exe 101 PID 1132 wrote to memory of 2256 1132 cmd.exe 101 PID 2256 wrote to memory of 2672 2256 karotima_2.exe 103 PID 2256 wrote to memory of 2672 2256 karotima_2.exe 103 PID 2256 wrote to memory of 2672 2256 karotima_2.exe 103 PID 712 wrote to memory of 1192 712 rUNdlL32.eXe 107 PID 712 wrote to memory of 1192 712 rUNdlL32.eXe 107 PID 712 wrote to memory of 1192 712 rUNdlL32.eXe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\fff7c1f77588105fc5a76b841983253f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fff7c1f77588105fc5a76b841983253f_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\7zS4E005237\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS4E005237\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c karotima_1.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\7zS4E005237\karotima_1.exekarotima_1.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
PID:1140
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c karotima_2.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\7zS4E005237\karotima_2.exekarotima_2.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\7zS4E005237\karotima_2.exe"C:\Users\Admin\AppData\Local\Temp\7zS4E005237\karotima_2.exe" -a5⤵
- Executes dropped EXE
PID:2672
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 5003⤵
- Program crash
PID:3664
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2072 -ip 20721⤵PID:2452
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵
- Loads dropped DLL
PID:1192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 6003⤵
- Program crash
PID:2876
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1192 -ip 11921⤵PID:4684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1014KB
MD5953230955b0863d81f382d5163a4badc
SHA19c3fd08863f631a2e8aa921ff4d299105e085460
SHA256a1d82cc7d4af1c8584f909c36b8b2cc8bd5d68791a5c9af0940e36a9887538f6
SHA512fcc922272315876cfb71ce3b949c7838c45c3aa97860c75e55e82a2ac93ea65993cf5e0327c39cafd7a226d3fd2c72df77f9bb6c28a9dbb634c8650670b6d355
-
Filesize
712KB
MD58da953a71f7d9811e648b7644f39c445
SHA1c39fd05d024249bc8d63493026474e797fd1eeaf
SHA256ac6143d8ef00d3008388f0c4606bbcf9672eddde1cf76ad102ffb2db26fa6e71
SHA512d75c871c781344968676a2c47e8c2387624d9f9aef7652b7eb97a2aebf9d474fcfe8a6f811b79a76fa4be980ccdfa8646b911e40827324800e233d390f1bcad3
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
290KB
MD54cb1e9abef374ec0a5276b394d1162ba
SHA11c7f909d77a4adc1f5a0c6badcd06c2de2b07bba
SHA256ad427a15485ff30869db848aacceb35e49220ff21c5f894c2f775a06758bf2da
SHA51207d0763eabb90fdbd9f065f1ace27021d3ad82305aa55513575e07a0fff45a5849ce97ca05bc10ab1bd7b30dfb7f8e8b722f464cb0da4dba7850d98bf9268cb7
-
Filesize
552KB
MD5c5c411ddf0d0dd87bc6fdb84975fc292
SHA1e04d41c06a12d46c5ba8220509d89d2a66140892
SHA256dc16f2dadacfad74d074a70c060bafc95d49a7d08a1cbe24f35ddb1769fb56da
SHA5129ed2af8bef3a1873efefb048c3e2733e994bf6300bdfb06ea12939450e65abfa19b4753a1e0755a755a8aed10398982c737d33b9fa79f91ffa356ef4ce20109b
-
Filesize
73KB
MD51c7be730bdc4833afb7117d48c3fd513
SHA1dc7e38cfe2ae4a117922306aead5a7544af646b8
SHA2568206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
SHA5127936c862a06b7ecdb6710a1bb62cbea149f75504b580c2f100945674c987f3eec53e9aa5915e32b4f74bcf46f2df9468f68a454400faebd909f933e8072e0f2e