Overview
overview
7Static
static
369b9435033...18.exe
windows7-x64
769b9435033...18.exe
windows10-2004-x64
7$1/QipInst...ff.exe
windows7-x64
1$1/QipInst...ff.exe
windows10-2004-x64
1$3/$APPDAT...er.exe
windows7-x64
7$3/$APPDAT...er.exe
windows10-2004-x64
7$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$3/QIPApp.exe
windows7-x64
1$3/QIPApp.exe
windows10-2004-x64
1$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$R1/Plugin...ng.dll
windows7-x64
1$R1/Plugin...ng.dll
windows10-2004-x64
1$R1/qip 8.0.exe
windows7-x64
1$R1/qip 8.0.exe
windows10-2004-x64
1$R1/unins000.exe
windows7-x64
7$R1/unins000.exe
windows10-2004-x64
7Analysis
-
max time kernel
141s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 04:28
Static task
static1
Behavioral task
behavioral1
Sample
69b94350338b13014b0f6c4f51f70b6f_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
69b94350338b13014b0f6c4f51f70b6f_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$1/QipInstallerStuff.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$1/QipInstallerStuff.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$3/$APPDATA/QIPApp/uninstaller.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$3/$APPDATA/QIPApp/uninstaller.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$3/QIPApp.exe
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
$3/QIPApp.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
$R1/Plugins/docking.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$R1/Plugins/docking.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
$R1/qip 8.0.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
$R1/qip 8.0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
$R1/unins000.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$R1/unins000.exe
Resource
win10v2004-20240508-en
General
-
Target
69b94350338b13014b0f6c4f51f70b6f_JaffaCakes118.exe
-
Size
2.4MB
-
MD5
69b94350338b13014b0f6c4f51f70b6f
-
SHA1
9590d21cb92ff8f4eaa4977dfa7d805d15421835
-
SHA256
23d18b987ed4162ab5fc624da3416a637b0f4c7451ccb4224be449e27b316c71
-
SHA512
71f80445403709e88e73a05f6981ec0ded669baa0059e0590023e7ef163de8d8218c7d5453c5f6c10e0d7dab1081f3b86bc939df5c1a5ad578d6990230732dc3
-
SSDEEP
49152:nSRWYWPag7CEInZDeB4ZrsRX9DrscltmiyRcVTz33k9zNglsYQP:nSRWYWPVmy7RtrscltksTzkElgP
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
QipInstallerStuff.exeQIPApp.exepid process 984 QipInstallerStuff.exe 3588 QIPApp.exe -
Loads dropped DLL 1 IoCs
Processes:
69b94350338b13014b0f6c4f51f70b6f_JaffaCakes118.exepid process 3248 69b94350338b13014b0f6c4f51f70b6f_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
QIPApp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\QIPApp = "\"C:\\Users\\Admin\\AppData\\Roaming\\QIPApp\\QIPApp.exe\"" QIPApp.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
69b94350338b13014b0f6c4f51f70b6f_JaffaCakes118.exepid process 3248 69b94350338b13014b0f6c4f51f70b6f_JaffaCakes118.exe 3248 69b94350338b13014b0f6c4f51f70b6f_JaffaCakes118.exe 3248 69b94350338b13014b0f6c4f51f70b6f_JaffaCakes118.exe 3248 69b94350338b13014b0f6c4f51f70b6f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
69b94350338b13014b0f6c4f51f70b6f_JaffaCakes118.exedescription pid process target process PID 3248 wrote to memory of 984 3248 69b94350338b13014b0f6c4f51f70b6f_JaffaCakes118.exe QipInstallerStuff.exe PID 3248 wrote to memory of 984 3248 69b94350338b13014b0f6c4f51f70b6f_JaffaCakes118.exe QipInstallerStuff.exe PID 3248 wrote to memory of 984 3248 69b94350338b13014b0f6c4f51f70b6f_JaffaCakes118.exe QipInstallerStuff.exe PID 3248 wrote to memory of 3588 3248 69b94350338b13014b0f6c4f51f70b6f_JaffaCakes118.exe QIPApp.exe PID 3248 wrote to memory of 3588 3248 69b94350338b13014b0f6c4f51f70b6f_JaffaCakes118.exe QIPApp.exe PID 3248 wrote to memory of 3588 3248 69b94350338b13014b0f6c4f51f70b6f_JaffaCakes118.exe QIPApp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\69b94350338b13014b0f6c4f51f70b6f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\69b94350338b13014b0f6c4f51f70b6f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\nsm245D.tmp\QipInstallerStuff.exe"C:\Users\Admin\AppData\Local\Temp\nsm245D.tmp\QipInstallerStuff.exe" "write_patch_str_to_reg" "C:\Users\Admin\AppData\Local\Temp\69b94350338b13014b0f6c4f51f70b6f_JaffaCakes118.exe" "HKCU" "Software\QIPApp" "saqred"2⤵
- Executes dropped EXE
PID:984
-
-
C:\Users\Admin\AppData\Roaming\QIPApp\QIPApp.exeC:\Users\Admin\AppData\Roaming\QIPApp\QIPApp.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:81⤵PID:3908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158KB
MD593097a86a7cbc02dc080fc1871ef7367
SHA121eee8f427f268e52500eb8ddb0748b514dec2af
SHA256d2f17d052819082b55cc2a54947f9acd6756c0ef0427182fdc65b049cdd7bdbe
SHA5122b96822c8a14dbcf2582c4ac0e0b87f7d769afd37730808baf2e74c96d18786794ffe3ecc13ff73d0c3f805609c886de5bd8d1e5ed7625f1d6dd104dc632c3ce
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
Filesize
329KB
MD5590e4a65a861ddaa20c091c256ee15a8
SHA1a9737174dfd1ae37399cdcae587f1bf63a7005a7
SHA2569f061df6a2cb2f488ecd844344e6ef5f4a7d2aec65368dd1871388babb38e906
SHA512ea2ef57c7d951e0d5d6e0e59002638823cae0614b16c7dff6ef25044ca643170277e28a3a1f7993e5e5785028c14b77bc02013733d969e12e1dfb29bb699d79d