Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 00:31
Static task
static1
Behavioral task
behavioral1
Sample
6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe
-
Size
3.1MB
-
MD5
6558e1cc16ed1f9d711527e15849b39e
-
SHA1
5bb21152c801c160776be64aeaf6845dd6c2e52f
-
SHA256
77f33920f68a8f4c4d3367084dbe52acca1fad135fc920f06bf3f116524ec426
-
SHA512
ee2ccb842a40cd0c74f3072898698321deb1ad72312bfd47ce706f40882f1ac50144021fac11b9a33411be6f959ec851d630acb04547c66adf7a13468be0cff0
-
SSDEEP
49152:5Yjv7iKLA8VKR4S2+OvvW76HJakPQE9kiUGTITe0TdQvtR:5YT7iz8ZskakPQE97UZdotR
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2384 upt.exe 472 upt.tmp -
Loads dropped DLL 3 IoCs
pid Process 1732 6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe 2384 upt.exe 472 upt.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\ 6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main 6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl 6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe = "11001" 6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\s7kbms 6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\s7kbms\shell 6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\s7kbms\shell\open\command 6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\s7kbms\ = "s7kbms URI" 6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\s7kbms\URL Protocol 6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\s7kbms\Content Type = "application/x-command" 6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\s7kbms\shell\ = "open" 6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\s7kbms\shell\open 6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\s7kbms\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe\" %1" 6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 472 upt.tmp -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1732 6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe 1732 6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2384 1732 6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe 29 PID 1732 wrote to memory of 2384 1732 6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe 29 PID 1732 wrote to memory of 2384 1732 6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe 29 PID 1732 wrote to memory of 2384 1732 6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe 29 PID 1732 wrote to memory of 2384 1732 6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe 29 PID 1732 wrote to memory of 2384 1732 6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe 29 PID 1732 wrote to memory of 2384 1732 6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe 29 PID 2384 wrote to memory of 472 2384 upt.exe 30 PID 2384 wrote to memory of 472 2384 upt.exe 30 PID 2384 wrote to memory of 472 2384 upt.exe 30 PID 2384 wrote to memory of 472 2384 upt.exe 30 PID 2384 wrote to memory of 472 2384 upt.exe 30 PID 2384 wrote to memory of 472 2384 upt.exe 30 PID 2384 wrote to memory of 472 2384 upt.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6558e1cc16ed1f9d711527e15849b39e_JaffaCakes118.exe"1⤵
- Checks whether UAC is enabled
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\upt.exe"C:\Users\Admin\AppData\Local\Temp\upt.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\is-NN8DE.tmp\upt.tmp"C:\Users\Admin\AppData\Local\Temp\is-NN8DE.tmp\upt.tmp" /SL5="$301C2,2437894,1146880,C:\Users\Admin\AppData\Local\Temp\upt.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:472
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d0b522938deb7e92cb99d929e3954c82
SHA109e169030eab146de4a9c6023a54b5df12c3ba2a
SHA25631344108c24298c96b70a9f4f9d236522aaeb31963a829a71eaad6c18f0c394e
SHA51215831689f0b9531c8d18d349dfa0631a0616915c627989f21e08a48fbed5bebe21ca5f9c00737371d25689d41df63e76aa49769e1e0066fc57c02aebb4c89044
-
Filesize
3.3MB
MD5be73f78ef2892f67c1d8237d06d42b41
SHA1f3a382a3e873e0b2554ab6cc7477ca3d89be96d1
SHA2568d6b387608344085608becc3ad4892f3fd0a439a13c55da6f95d30edc976e9ce
SHA512f52d721ae1eb2ccf2a6fb09cce5e0ef242a460d141047269854c02fdeb7ce7b970a8a7d13fd37ccc1dda4a0fcc7e69ac629d0a62ed9293d337ed22a567bbda2a
-
Filesize
3.3MB
MD5421b6cd4ade8e71d52d495fe9d5f42d2
SHA11a7df5cbc2d6a1fb6aa37d849e12ed04ef5727f9
SHA2568120aa0d01eac8b322cf7c822c3785d92c951e584cac93aaf95c7de87371ff7a
SHA512740a7c4099fc2fb8496c5ca8c558f7c891a72ed70d521be00fb8e2d43a52e839dbcc745fd0e9ef1630003aeb5c4b55337b278e00f0617a60ac41063dc2da0837
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63