Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 09:53
Static task
static1
Behavioral task
behavioral1
Sample
91592126d817694239ae18528aa1c349_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
91592126d817694239ae18528aa1c349_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
91592126d817694239ae18528aa1c349_JaffaCakes118.exe
-
Size
769KB
-
MD5
91592126d817694239ae18528aa1c349
-
SHA1
68a39ce122f3ea425598d961f27012e98379803d
-
SHA256
9a4b0207d7aec705a376b29a7334bd780069f7d10ee0ab8dc69950817d81de2d
-
SHA512
4f279122d8769fd140dbf79f098dc5085320a0dac6a77e5d94437dfbec9df324187ea40c22efebb2d7b8fbb958f80afa9a9299ba165ec261757e91a58978e3ff
-
SSDEEP
12288:CSQqalk9lLWwiIjJR+/pCB6CSEavf9uq0HzsYVWxY7Ow6j33b6K/W:pQqfjLWwiIjJUsW98z57z6bp/W
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\internat = "c:\\windows\\internat.exe" servicew.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run servicew.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\userun32 = "c:\\windows\\userun32.exe" servicew.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run servicew.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\internat\ImagePath = "c:\\windows\\internat.exe" servicew.exe -
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000b0000000122ec-60.dat acprotect behavioral1/files/0x003400000001562a-61.dat acprotect -
Executes dropped EXE 2 IoCs
pid Process 2356 servicew.exe 2736 smart_scan.exe -
resource yara_rule behavioral1/files/0x000b0000000122ec-60.dat upx behavioral1/files/0x003400000001562a-61.dat upx behavioral1/memory/2356-64-0x0000000000420000-0x000000000043D000-memory.dmp upx behavioral1/memory/2356-63-0x0000000000220000-0x000000000022D000-memory.dmp upx behavioral1/memory/2736-67-0x00000000021F0000-0x000000000220D000-memory.dmp upx behavioral1/memory/2736-66-0x00000000003F0000-0x00000000003FD000-memory.dmp upx behavioral1/memory/2736-92-0x00000000021F0000-0x000000000220D000-memory.dmp upx behavioral1/memory/2736-91-0x00000000003F0000-0x00000000003FD000-memory.dmp upx behavioral1/memory/2356-89-0x0000000000420000-0x000000000043D000-memory.dmp upx behavioral1/memory/2356-88-0x0000000000220000-0x000000000022D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\internat = "c:\\windows\\internat.exe" servicew.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\internat = "c:\\windows\\internat.exe" servicew.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsass32 = "c:\\windows\\lsass32.exe" servicew.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\w: servicew.exe File opened (read-only) \??\r: servicew.exe File opened (read-only) \??\m: servicew.exe File opened (read-only) \??\l: servicew.exe File opened (read-only) \??\t: servicew.exe File opened (read-only) \??\q: servicew.exe File opened (read-only) \??\k: servicew.exe File opened (read-only) \??\j: servicew.exe File opened (read-only) \??\e: servicew.exe File opened (read-only) \??\z: servicew.exe File opened (read-only) \??\y: servicew.exe File opened (read-only) \??\u: servicew.exe File opened (read-only) \??\i: servicew.exe File opened (read-only) \??\n: servicew.exe File opened (read-only) \??\h: servicew.exe File opened (read-only) \??\g: servicew.exe File opened (read-only) \??\x: servicew.exe File opened (read-only) \??\v: servicew.exe File opened (read-only) \??\s: servicew.exe File opened (read-only) \??\o: servicew.exe File opened (read-only) \??\p: servicew.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\regedit.exe servicew.exe -
Drops file in Windows directory 25 IoCs
description ioc Process File created \??\c:\windows\pool32.dll servicew.exe File created \??\c:\windows\unrar.dll 91592126d817694239ae18528aa1c349_JaffaCakes118.exe File created \??\c:\windows\internat.exe servicew.exe File opened for modification \??\c:\windows\lsass32.exe servicew.exe File created \??\c:\windows\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\msoffice.scr servicew.exe File opened for modification \??\c:\windows\mod\leger.sys servicew.exe File created \??\c:\windows\lsass32.exe servicew.exe File created \??\c:\windows\Start Menu\Programs\Startup\msoffice.scr servicew.exe File created \??\c:\windows\smart_scan.exe 91592126d817694239ae18528aa1c349_JaffaCakes118.exe File opened for modification \??\c:\windows\calc.exe servicew.exe File opened for modification \??\c:\windows\setupiwz.dll 91592126d817694239ae18528aa1c349_JaffaCakes118.exe File created \??\c:\windows\mod\leger.sys servicew.exe File created \??\c:\windows\ole32.dll servicew.exe File created \??\c:\windows\viaud.dll 91592126d817694239ae18528aa1c349_JaffaCakes118.exe File created \??\c:\windows\setupiwz.dll 91592126d817694239ae18528aa1c349_JaffaCakes118.exe File opened for modification \??\c:\windows\userun32.exe servicew.exe File created \??\c:\windows\iecomn32.dll 91592126d817694239ae18528aa1c349_JaffaCakes118.exe File opened for modification \??\c:\windows\internat.exe servicew.exe File created \??\c:\windows\userun32.exe servicew.exe File created \??\c:\windows\calc.exe servicew.exe File created \??\c:\windows\regedit2.exe servicew.exe File created \??\c:\windows\servicew.exe 91592126d817694239ae18528aa1c349_JaffaCakes118.exe File opened for modification \??\c:\windows\pool32.dll servicew.exe File opened for modification \??\c:\windows\regedit2.exe servicew.exe File opened for modification \??\c:\windows\ole32.dll servicew.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F6ABE4A8-C73A-305A-BFEF-E4FA2BC9D8A9} servicew.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F6ABE4A8-C73A-305A-BFEF-E4FA2BC9D8A9}\ThisEXE = "c:\\windows\\servicew.exe" servicew.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F6ABE4A8-C73A-305A-BFEF-E4FA2BC9D8A9}\VerProg = "112" servicew.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2356 servicew.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe 2736 smart_scan.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2736 smart_scan.exe 2736 smart_scan.exe 2356 servicew.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1368 wrote to memory of 2356 1368 91592126d817694239ae18528aa1c349_JaffaCakes118.exe 28 PID 1368 wrote to memory of 2356 1368 91592126d817694239ae18528aa1c349_JaffaCakes118.exe 28 PID 1368 wrote to memory of 2356 1368 91592126d817694239ae18528aa1c349_JaffaCakes118.exe 28 PID 1368 wrote to memory of 2356 1368 91592126d817694239ae18528aa1c349_JaffaCakes118.exe 28 PID 1368 wrote to memory of 2736 1368 91592126d817694239ae18528aa1c349_JaffaCakes118.exe 29 PID 1368 wrote to memory of 2736 1368 91592126d817694239ae18528aa1c349_JaffaCakes118.exe 29 PID 1368 wrote to memory of 2736 1368 91592126d817694239ae18528aa1c349_JaffaCakes118.exe 29 PID 1368 wrote to memory of 2736 1368 91592126d817694239ae18528aa1c349_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\91592126d817694239ae18528aa1c349_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\91592126d817694239ae18528aa1c349_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\windows\servicew.exe"C:\windows\servicew.exe"2⤵
- Adds policy Run key to start application
- Sets service image path in registry
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2356
-
-
C:\windows\smart_scan.exe"C:\windows\smart_scan.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5b7b03a96bf6e5b27a5db2eba4e477669
SHA1b94f5e2f20ae580d6d330bfe12087903aaaf8e22
SHA256a11459fa470bdcc41d2f94bc385a2db0117c09051a9d4567f2643dfab62f6c4d
SHA5120395e778ea53eba904ceb24d10bb0d9bd842ef1839ea9d1e6d3dfc37d107c944e3ab461264fcc1c00ce151e6d54343bffca2b4db2ff8d8d0ef1ae30c4e6c5a9f
-
Filesize
329KB
MD5ee8df1de63938957fe5d251d810c96ff
SHA1ee10ee943ccad05266b7a7c6477a48daa3ef1073
SHA2567ee91e95f21c574a39d9e62248fffab315d5b39c05f45d64ac90a6f38469c739
SHA5125a1ce6706d7118aa0cf0795a4df834c415f1ece53ada780d6a25c842f17cfeb26e9d77fc303144a71220b92d62d208ea354320d4a6138e5a996c88c10925a4da
-
Filesize
342KB
MD5819189a8d40c2b9ed024551bc60341e6
SHA1e43038cac48d113ec172e684ed7a965b6781f558
SHA25654726968ada012c4695dfff5fc4bf8d44194720c34d091fbcd253fe09102d777
SHA512c5e8768d5b4783f9eedfcc21b264f4ad78a278dd817c6dc65ada758ba313ada3b2fb4dc5ecc6e27461f05d15ef5866523eadd17d8d528a05ecc11f67b3ca738c
-
Filesize
33KB
MD572e3469553ee707aef3dcfb13b44e16c
SHA166e3933b710e417ed28c6df721818e6fa3f06490
SHA2561efafb0082e6bd2cd3f82c6d1b9492acc04e026de9bb6ab875c8a2520fcb5dd1
SHA5122f5692339735220d218707a648002d04603acc376107a24f9f5736fcf340d47c383f22a168318c59a9eaed49fc6c1d11e8141660dfa98de41ceb74ffdbe6d833
-
Filesize
10KB
MD587b1332687d631003e9d8c8c6f5bcf19
SHA1451ab3a3d30d679c64c679cbb424901bcea6a088
SHA256e91ad3f2c385c9e1244f93e5d6e8b2992fffa926f6e262ca4b97bb3a4c1605a6
SHA51221994b52974460f91e2e9b536efdece4bbdd47bd2a8330ed24fad4175db2f1439412eb66af14807e3b526258dd66e66feb804b18abd549ddd63d29009cb8b8b2