Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 07:54
Static task
static1
Behavioral task
behavioral1
Sample
89cde7fa5c181f10cc9a21fb961f8de5_JaffaCakes118.vbs
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
89cde7fa5c181f10cc9a21fb961f8de5_JaffaCakes118.vbs
Resource
win10v2004-20240426-en
General
-
Target
89cde7fa5c181f10cc9a21fb961f8de5_JaffaCakes118.vbs
-
Size
1.9MB
-
MD5
89cde7fa5c181f10cc9a21fb961f8de5
-
SHA1
a1449eef635ae525e6ba3167f4978bbfde9c73fc
-
SHA256
3a1ec5cfa213479f5f7fc25d46672b489ab64d50e687253f6f388991b0c50b43
-
SHA512
a44b5af5c92fdeebd25de21a08b1ff8138d3092a6131f750f1ba01717c80d729da020e5778419835d1014b29c29951cca4d69eaf0456640c759727a4f495e7d0
-
SSDEEP
49152:j6rXNinXYXKRat360hlkGHkUxyHUfCllJ04MGo2GriKPgOU1eODlB:F
Malware Config
Extracted
qakbot
323.79
spx02
1567678709
50.78.93.74:995
50.46.131.145:443
98.236.87.243:443
72.179.13.59:443
73.226.220.56:443
75.177.172.209:6881
192.24.181.185:443
206.51.202.106:50002
108.184.57.213:443
67.10.18.112:993
162.244.225.30:443
47.23.101.26:993
47.136.226.219:443
96.20.238.2:2083
68.238.56.27:443
75.131.239.76:443
172.78.85.20:443
96.22.239.27:2222
76.71.76.131:32101
60.254.82.182:2078
203.161.179.185:2222
173.22.120.11:2222
76.85.30.25:995
70.183.177.71:443
181.143.141.226:995
76.116.128.81:443
96.20.238.2:2078
67.10.18.112:995
12.5.37.3:995
75.71.201.170:443
50.100.214.10:2222
105.246.79.4:995
68.174.15.223:443
99.228.242.183:995
70.188.98.97:443
148.163.2.101:443
166.62.180.194:2078
47.146.173.204:443
184.180.157.203:2222
72.29.181.77:2222
104.34.122.18:443
181.126.80.118:443
90.252.105.90:2222
24.184.6.58:2222
68.83.59.107:443
86.97.43.189:443
199.126.92.231:995
2.50.171.216:443
98.186.90.192:995
76.93.179.66:443
67.246.16.250:995
173.163.24.169:443
70.183.154.250:80
76.6.64.52:443
67.77.162.13:443
76.64.15.78:2222
12.5.37.3:443
116.58.100.130:995
173.178.129.3:443
67.41.197.173:2078
65.116.179.83:443
67.183.144.204:443
184.74.101.234:995
189.160.191.239:443
174.48.72.160:443
12.176.32.146:443
70.166.97.7:465
70.164.39.91:443
75.131.72.82:443
98.224.57.108:443
47.214.144.253:443
209.182.122.217:443
206.51.202.106:50003
174.19.109.195:993
98.236.87.243:995
186.48.152.170:443
107.12.140.181:443
75.56.175.129:995
71.30.56.170:443
217.162.149.212:443
24.27.82.216:2222
181.197.195.138:995
47.153.115.154:443
50.247.230.33:443
216.221.88.160:443
190.120.196.18:443
67.214.8.102:443
186.47.208.238:50000
166.62.129.86:443
159.118.173.115:443
23.240.185.215:443
98.165.206.64:443
162.244.224.166:443
207.179.194.91:443
75.157.194.173:995
68.238.144.55:443
24.111.196.195:443
47.54.254.139:2222
74.15.32.205:2222
47.33.217.253:1194
70.50.221.166:2222
72.16.212.107:995
108.160.123.244:443
47.49.7.42:443
65.30.12.240:443
104.50.135.193:443
80.121.136.202:995
73.202.121.222:443
47.153.115.154:995
72.29.181.77:2083
104.3.91.20:995
73.104.218.229:0
190.144.81.158:995
64.19.74.29:995
65.94.90.23:1194
173.172.205.216:443
70.183.3.199:443
201.188.107.81:443
73.232.165.200:995
24.180.7.155:443
99.241.22.53:443
173.233.182.249:443
137.25.72.175:443
184.191.62.78:443
47.180.66.10:995
73.137.187.150:443
75.113.104.27:443
47.153.179.222:995
67.200.146.98:2222
71.197.126.250:443
47.148.133.120:443
83.76.50.72:2222
73.179.178.78:443
201.152.159.159:995
76.174.122.204:443
186.7.117.189:443
98.142.44.78:443
74.197.206.71:443
24.42.250.18:443
67.186.150.213:443
35.136.74.103:443
190.120.196.18:995
1.172.91.225:443
98.181.182.13:2078
71.182.142.63:443
73.37.61.237:443
173.172.56.79:443
172.251.125.166:8443
189.236.138.168:443
24.67.37.137:443
Signatures
-
Turns off Windows Defender SpyNet reporting 2 TTPs
-
Processes:
reg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Eohteaye = "0" reg.exe -
Executes dropped EXE 7 IoCs
Processes:
xgIWRvnF.exexgIWRvnF.exerumxswye.exerumxswye.exexgIWRvnF.exerumxswye.exerumxswye.exepid process 2920 xgIWRvnF.exe 2032 xgIWRvnF.exe 2460 rumxswye.exe 2468 rumxswye.exe 1984 xgIWRvnF.exe 1512 rumxswye.exe 1144 rumxswye.exe -
Loads dropped DLL 2 IoCs
Processes:
xgIWRvnF.exepid process 2920 xgIWRvnF.exe 2920 xgIWRvnF.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\uqbjndly = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Eohteaye\\rumxswye.exe\"" explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
xgIWRvnF.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ xgIWRvnF.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" xgIWRvnF.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" xgIWRvnF.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
xgIWRvnF.exexgIWRvnF.exerumxswye.exerumxswye.exeexplorer.exexgIWRvnF.exerumxswye.exerumxswye.exepid process 2920 xgIWRvnF.exe 2032 xgIWRvnF.exe 2032 xgIWRvnF.exe 2460 rumxswye.exe 2468 rumxswye.exe 2468 rumxswye.exe 3008 explorer.exe 3008 explorer.exe 1984 xgIWRvnF.exe 1512 rumxswye.exe 1144 rumxswye.exe 1144 rumxswye.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
rumxswye.exepid process 2460 rumxswye.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
xgIWRvnF.exerumxswye.exetaskeng.exexgIWRvnF.exedescription pid process target process PID 2920 wrote to memory of 2032 2920 xgIWRvnF.exe xgIWRvnF.exe PID 2920 wrote to memory of 2032 2920 xgIWRvnF.exe xgIWRvnF.exe PID 2920 wrote to memory of 2032 2920 xgIWRvnF.exe xgIWRvnF.exe PID 2920 wrote to memory of 2032 2920 xgIWRvnF.exe xgIWRvnF.exe PID 2920 wrote to memory of 2460 2920 xgIWRvnF.exe rumxswye.exe PID 2920 wrote to memory of 2460 2920 xgIWRvnF.exe rumxswye.exe PID 2920 wrote to memory of 2460 2920 xgIWRvnF.exe rumxswye.exe PID 2920 wrote to memory of 2460 2920 xgIWRvnF.exe rumxswye.exe PID 2920 wrote to memory of 2724 2920 xgIWRvnF.exe schtasks.exe PID 2920 wrote to memory of 2724 2920 xgIWRvnF.exe schtasks.exe PID 2920 wrote to memory of 2724 2920 xgIWRvnF.exe schtasks.exe PID 2920 wrote to memory of 2724 2920 xgIWRvnF.exe schtasks.exe PID 2460 wrote to memory of 2468 2460 rumxswye.exe rumxswye.exe PID 2460 wrote to memory of 2468 2460 rumxswye.exe rumxswye.exe PID 2460 wrote to memory of 2468 2460 rumxswye.exe rumxswye.exe PID 2460 wrote to memory of 2468 2460 rumxswye.exe rumxswye.exe PID 2460 wrote to memory of 3008 2460 rumxswye.exe explorer.exe PID 2460 wrote to memory of 3008 2460 rumxswye.exe explorer.exe PID 2460 wrote to memory of 3008 2460 rumxswye.exe explorer.exe PID 2460 wrote to memory of 3008 2460 rumxswye.exe explorer.exe PID 2460 wrote to memory of 3008 2460 rumxswye.exe explorer.exe PID 1212 wrote to memory of 1984 1212 taskeng.exe xgIWRvnF.exe PID 1212 wrote to memory of 1984 1212 taskeng.exe xgIWRvnF.exe PID 1212 wrote to memory of 1984 1212 taskeng.exe xgIWRvnF.exe PID 1212 wrote to memory of 1984 1212 taskeng.exe xgIWRvnF.exe PID 1984 wrote to memory of 1728 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 1728 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 1728 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 1728 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 2940 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 2940 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 2940 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 2940 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 2076 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 2076 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 2076 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 2076 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 1964 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 1964 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 1964 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 1964 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 2368 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 2368 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 2368 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 2368 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 1300 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 1300 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 1300 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 1300 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 600 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 600 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 600 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 600 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 808 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 808 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 808 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 808 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 1096 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 1096 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 1096 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 1096 1984 xgIWRvnF.exe reg.exe PID 1984 wrote to memory of 1512 1984 xgIWRvnF.exe rumxswye.exe PID 1984 wrote to memory of 1512 1984 xgIWRvnF.exe rumxswye.exe PID 1984 wrote to memory of 1512 1984 xgIWRvnF.exe rumxswye.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\89cde7fa5c181f10cc9a21fb961f8de5_JaffaCakes118.vbs"1⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\xgIWRvnF.exeC:\Users\Admin\AppData\Local\Temp\xgIWRvnF.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\xgIWRvnF.exeC:\Users\Admin\AppData\Local\Temp\xgIWRvnF.exe /C2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2032
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Eohteaye\rumxswye.exeC:\Users\Admin\AppData\Roaming\Microsoft\Eohteaye\rumxswye.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Roaming\Microsoft\Eohteaye\rumxswye.exeC:\Users\Admin\AppData\Roaming\Microsoft\Eohteaye\rumxswye.exe /C3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:3008
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn nouukmstmr /tr "\"C:\Users\Admin\AppData\Local\Temp\xgIWRvnF.exe\" /I nouukmstmr" /SC ONCE /Z /ST 07:56 /ET 08:082⤵
- Creates scheduled task(s)
PID:2724
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {46565815-66F6-44A0-9FA6-E465E39A6E80} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\xgIWRvnF.exeC:\Users\Admin\AppData\Local\Temp\xgIWRvnF.exe /I nouukmstmr2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"3⤵PID:1728
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"3⤵PID:2940
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"3⤵PID:2076
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"3⤵PID:1964
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"3⤵PID:2368
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"3⤵PID:1300
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"3⤵PID:600
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"3⤵PID:808
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Eohteaye" /d "0"3⤵
- Windows security bypass
PID:1096
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Eohteaye\rumxswye.exeC:\Users\Admin\AppData\Roaming\Microsoft\Eohteaye\rumxswye.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1512 -
C:\Users\Admin\AppData\Roaming\Microsoft\Eohteaye\rumxswye.exeC:\Users\Admin\AppData\Roaming\Microsoft\Eohteaye\rumxswye.exe /C4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1144
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\xgIWRvnF.exe"3⤵PID:2228
-
C:\Windows\system32\PING.EXEping.exe -n 6 127.0.0.14⤵
- Runs ping.exe
PID:1076
-
-
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /DELETE /F /TN nouukmstmr3⤵PID:1236
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
656KB
MD5ee012e5a6dedbad726af12e7ba9374df
SHA11429e28e9c78294b6d1e96b9cb40da73ae51c23a
SHA256259e8c4576444287f43218b2f6754da1d50339fdb4c4d8c9634ff72e6e2521f5
SHA5125a82377e13242a7ab5d257a7f7f0c0856904591e5b583089999772742046b3d2857bb43f0937b4ad63cdc8e65e8519f0e6fd831b7c598b1ce13587934f9275d2
-
Filesize
63B
MD5d91c6ddebbc18d5078e61aeb6e902e7b
SHA10398f498361cbb0ee1f0a5ff818ac6ef3ceeb6cf
SHA25610e1b307af7341c799b27e4630ae5ca00639293d33cb92e69da291bdcb470fc6
SHA512b3a126cd9e99dab80e78ceb205f1f10d6cc38b90a05003efeaa4fca13cc6d237c41ae4a598737c57327a8b2d131eab2c3fc59afe281bbafe0d0ad447a4f853e5