Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 22:14
Static task
static1
Behavioral task
behavioral1
Sample
484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
484757fa1e1b5714d28c0104043b0c17
-
SHA1
6efbb316ed1f8255e7d38c6c346c12c527e0a88f
-
SHA256
c09ebeaea56c35dc596063f94f77cd9b0ad56634e433194f0700017baea6be13
-
SHA512
85cb08395f15bb657c17f529b42eca0ccf107d86bfe3f4e46130de7f4aaa835c0eee7c78d6374504e62da9c8ebfb3ae8591dccd8c4fc739240e1d595dcbfc25b
-
SSDEEP
24576:7Cdxte/80jYLT3U1jfsWaXxhBrVSYgLQ6:Sw80cTsjkWahhBrIw6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe -
Modifies registry class 35 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 7800310000000000a858bc531100557365727300640009000400efbe874f7748af58ddb12e000000c70500000000010000000000000000003a0000000000070de60055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 5600310000000000a858bc5312004170704461746100400009000400efbea858bc53af58ddb12e00000081e10100000001000000000000000000000000000000fa20da004100700070004400610074006100000016000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 5000310000000000a8580460100041646d696e003c0009000400efbea858bc53af58ddb12e00000076e101000000010000000000000000000000000000005f5e6a00410064006d0069006e00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 5000310000000000a858f65510004c6f63616c003c0009000400efbea858bc53af58ddb12e00000094e101000000010000000000000000000000000000008c519f004c006f00630061006c00000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4e00310000000000af58ddb1100054656d7000003a0009000400efbea858bc53af58ddb12e00000095e1010000000100000000000000000000000000000065641d01540065006d007000000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
explorer.exepid process 4412 explorer.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
Processes:
484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exepid process 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
explorer.exepid process 4412 explorer.exe 4412 explorer.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.execmd.exedescription pid process target process PID 1192 wrote to memory of 4092 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe explorer.exe PID 1192 wrote to memory of 4092 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe explorer.exe PID 1192 wrote to memory of 4092 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe explorer.exe PID 1192 wrote to memory of 2652 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe cmd.exe PID 1192 wrote to memory of 2652 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe cmd.exe PID 1192 wrote to memory of 2652 1192 484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe cmd.exe PID 2652 wrote to memory of 4400 2652 cmd.exe PING.EXE PID 2652 wrote to memory of 4400 2652 cmd.exe PING.EXE PID 2652 wrote to memory of 4400 2652 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe C:\Users\Admin\AppData\Local\Temp2⤵PID:4092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 localhost > nul & del /f /q "C:\Users\Admin\AppData\Local\Temp\484757fa1e1b5714d28c0104043b0c17_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\PING.EXEping -n 2 localhost3⤵
- Runs ping.exe
PID:4400
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4412
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3992