Analysis Overview
SHA256
c4b744bc109c8d0330442c880cbbd78f4845a3bb72e3f1bf377331230d47ff85
Threat Level: Shows suspicious behavior
The file 0666dc953174e2532fc7e2c6a619ed29_JaffaCakes118 was found to be: Shows suspicious behavior.
Malicious Activity Summary
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Writes to the Master Boot Record (MBR)
Drops file in Windows directory
Drops file in Program Files directory
Unsigned PE
Enumerates physical storage devices
Modifies registry class
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-20 13:25
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-20 13:25
Reported
2024-06-20 13:28
Platform
win7-20240611-en
Max time kernel
117s
Max time network
118s
Command Line
Signatures
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Master Of The Voice1.7.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\loader.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\0666dc953174e2532fc7e2c6a619ed29_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\0666dc953174e2532fc7e2c6a619ed29_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\0666dc953174e2532fc7e2c6a619ed29_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\0666dc953174e2532fc7e2c6a619ed29_JaffaCakes118.exe | N/A |
Writes to the Master Boot Record (MBR)
| Description | Indicator | Process | Target |
| File opened for modification | \??\PhysicalDrive0 | C:\Users\Admin\AppData\Local\Temp\Master Of The Voice1.7.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Program Files\Outlook Express\SYSTEM.EXE | C:\Users\Admin\AppData\Local\Temp\loader.exe | N/A |
| File created | C:\Program Files\Outlook Express\SYSTEM.EXE | C:\Users\Admin\AppData\Local\Temp\loader.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\Mole.Mol | C:\Users\Admin\AppData\Local\Temp\loader.exe | N/A |
| File opened for modification | C:\Windows\Mole.Mol | C:\Users\Admin\AppData\Local\Temp\loader.exe | N/A |
| File created | C:\Windows\Mole.dll | C:\Users\Admin\AppData\Local\Temp\loader.exe | N/A |
Enumerates physical storage devices
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\.key | C:\Users\Admin\AppData\Local\Temp\Master Of The Voice1.7.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ | C:\Users\Admin\AppData\Local\Temp\Master Of The Voice1.7.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" | C:\Users\Admin\AppData\Local\Temp\Master Of The Voice1.7.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Master Of The Voice1.7.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Master Of The Voice1.7.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\0666dc953174e2532fc7e2c6a619ed29_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\0666dc953174e2532fc7e2c6a619ed29_JaffaCakes118.exe"
C:\Users\Admin\AppData\Local\Temp\Master Of The Voice1.7.exe
"C:\Users\Admin\AppData\Local\Temp\Master Of The Voice1.7.exe"
C:\Users\Admin\AppData\Local\Temp\loader.exe
"C:\Users\Admin\AppData\Local\Temp\loader.exe"
C:\Windows\SysWOW64\cmd.exe
cmd /c Deleteme.bat
Network
Files
\Users\Admin\AppData\Local\Temp\Master Of The Voice1.7.exe
| MD5 | de5b0dd3a16c1ec9cf307f13525b6657 |
| SHA1 | 5be01b92fa813f51306e08d472b42e8c62c3637c |
| SHA256 | 69ba7530c540c915a71c444af52104351f00aaddd779d95891f2dacc0f30a3a8 |
| SHA512 | f6498838cf97f77fb180964e8a26221dbf96df68415053a2a3edc550db94f01bdae37f9e6e368be3ee423184984b585d8fb8eb90a2d547185a1fc269264b11ac |
memory/2452-10-0x0000000002940000-0x0000000002A0C000-memory.dmp
memory/1884-14-0x0000000000270000-0x00000000002A0000-memory.dmp
memory/1884-13-0x0000000000400000-0x00000000004CC000-memory.dmp
memory/2452-8-0x0000000002940000-0x0000000002A0C000-memory.dmp
memory/2452-22-0x0000000000400000-0x0000000000421000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\loader.exe
| MD5 | 5564293354d9d684d6a2bfbc9be54e5b |
| SHA1 | 72b56c9ec3ac1c7c9011f7d02bf9c5a7517f3b19 |
| SHA256 | c9291e111b15370a6546ce5e0848018b4ce15a1a277197e3b5a73389508f06cd |
| SHA512 | f5cd649482ff56babe138350efbc31b18e7270fb32ee286eb9bf60d3025099ad059dbfb85347a6a60fc87eb07339605e53e5c93af1784baa5f4c4617cd9aeb2c |
memory/1884-26-0x00000000001D0000-0x00000000001D1000-memory.dmp
memory/1884-25-0x00000000003B0000-0x00000000003C9000-memory.dmp
memory/1884-29-0x0000000000540000-0x0000000000541000-memory.dmp
memory/1884-28-0x00000000003F0000-0x00000000003F1000-memory.dmp
memory/2288-23-0x0000000000400000-0x00000000004FF000-memory.dmp
memory/2288-31-0x0000000000400000-0x00000000004FF000-memory.dmp
memory/2288-36-0x0000000000260000-0x0000000000261000-memory.dmp
memory/1884-42-0x00000000002A0000-0x00000000002A1000-memory.dmp
memory/1884-41-0x00000000003D0000-0x00000000003D1000-memory.dmp
memory/1884-40-0x00000000003E0000-0x00000000003E1000-memory.dmp
memory/1884-39-0x00000000001C0000-0x00000000001C1000-memory.dmp
memory/1884-38-0x00000000001B0000-0x00000000001B1000-memory.dmp
memory/1884-37-0x00000000001E0000-0x00000000001E1000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Deleteme.bat
| MD5 | 86b553fba6309de0e4ad6dd0b6b7361d |
| SHA1 | 4a26abf7ab216bed7ebbe5b6562a88b19f3e73b7 |
| SHA256 | 39c3919c39670fda6ddfefa7323260e1609339aacc97fe51b1578b5ea7148e75 |
| SHA512 | ec1310a515b591157ec152e23f93dd591419d74df5655e49a26346102664c3ff17efa8eeb617d311bb29dd76c4c5972f4f0d74e7b33ef90f23959dcf48ea99ab |
memory/2288-50-0x0000000000400000-0x00000000004FF000-memory.dmp
memory/1884-52-0x0000000000400000-0x00000000004CC000-memory.dmp
memory/1884-54-0x0000000000270000-0x00000000002A0000-memory.dmp
memory/1884-53-0x0000000000400000-0x00000000004CC000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-20 13:25
Reported
2024-06-20 13:28
Platform
win10v2004-20240611-en
Max time kernel
140s
Max time network
125s
Command Line
Signatures
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\0666dc953174e2532fc7e2c6a619ed29_JaffaCakes118.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Master Of The Voice1.7.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\loader.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | C:\Program Files\Outlook Express\SYSTEM.EXE | C:\Users\Admin\AppData\Local\Temp\loader.exe | N/A |
| File opened for modification | C:\Program Files\Outlook Express\SYSTEM.EXE | C:\Users\Admin\AppData\Local\Temp\loader.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\Mole.Mol | C:\Users\Admin\AppData\Local\Temp\loader.exe | N/A |
| File created | C:\Windows\Mole.dll | C:\Users\Admin\AppData\Local\Temp\loader.exe | N/A |
| File created | C:\Windows\Mole.Mol | C:\Users\Admin\AppData\Local\Temp\loader.exe | N/A |
Enumerates physical storage devices
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\.key | C:\Users\Admin\AppData\Local\Temp\Master Of The Voice1.7.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ | C:\Users\Admin\AppData\Local\Temp\Master Of The Voice1.7.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" | C:\Users\Admin\AppData\Local\Temp\Master Of The Voice1.7.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Master Of The Voice1.7.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Master Of The Voice1.7.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\0666dc953174e2532fc7e2c6a619ed29_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\0666dc953174e2532fc7e2c6a619ed29_JaffaCakes118.exe"
C:\Users\Admin\AppData\Local\Temp\Master Of The Voice1.7.exe
"C:\Users\Admin\AppData\Local\Temp\Master Of The Voice1.7.exe"
C:\Users\Admin\AppData\Local\Temp\loader.exe
"C:\Users\Admin\AppData\Local\Temp\loader.exe"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c Deleteme.bat
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 64.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| NL | 23.62.61.89:443 | www.bing.com | tcp |
| NL | 23.62.61.89:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 89.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 107.12.20.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.90.14.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 10.28.171.150.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Temp\Master Of The Voice1.7.exe
| MD5 | de5b0dd3a16c1ec9cf307f13525b6657 |
| SHA1 | 5be01b92fa813f51306e08d472b42e8c62c3637c |
| SHA256 | 69ba7530c540c915a71c444af52104351f00aaddd779d95891f2dacc0f30a3a8 |
| SHA512 | f6498838cf97f77fb180964e8a26221dbf96df68415053a2a3edc550db94f01bdae37f9e6e368be3ee423184984b585d8fb8eb90a2d547185a1fc269264b11ac |
memory/4200-14-0x0000000000400000-0x00000000004CC000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\loader.exe
| MD5 | 5564293354d9d684d6a2bfbc9be54e5b |
| SHA1 | 72b56c9ec3ac1c7c9011f7d02bf9c5a7517f3b19 |
| SHA256 | c9291e111b15370a6546ce5e0848018b4ce15a1a277197e3b5a73389508f06cd |
| SHA512 | f5cd649482ff56babe138350efbc31b18e7270fb32ee286eb9bf60d3025099ad059dbfb85347a6a60fc87eb07339605e53e5c93af1784baa5f4c4617cd9aeb2c |
memory/3712-23-0x0000000000780000-0x0000000000781000-memory.dmp
memory/4200-26-0x0000000000660000-0x0000000000661000-memory.dmp
memory/4200-25-0x0000000002150000-0x0000000002169000-memory.dmp
memory/3712-24-0x0000000000400000-0x00000000004FF000-memory.dmp
memory/4200-22-0x0000000002120000-0x0000000002150000-memory.dmp
memory/3712-21-0x0000000000400000-0x00000000004FF000-memory.dmp
memory/2976-20-0x0000000000400000-0x0000000000421000-memory.dmp
memory/4200-40-0x0000000002170000-0x0000000002171000-memory.dmp
memory/4200-39-0x0000000002180000-0x0000000002181000-memory.dmp
memory/4200-38-0x0000000002190000-0x0000000002191000-memory.dmp
memory/4200-37-0x0000000000650000-0x0000000000651000-memory.dmp
memory/4200-36-0x0000000000640000-0x0000000000641000-memory.dmp
memory/4200-35-0x0000000000670000-0x0000000000671000-memory.dmp
memory/3712-34-0x0000000002170000-0x0000000002171000-memory.dmp
memory/4200-33-0x00000000021B0000-0x00000000021B1000-memory.dmp
memory/4200-32-0x00000000021A0000-0x00000000021A1000-memory.dmp
memory/3712-43-0x0000000000400000-0x00000000004FF000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Deleteme.bat
| MD5 | 86b553fba6309de0e4ad6dd0b6b7361d |
| SHA1 | 4a26abf7ab216bed7ebbe5b6562a88b19f3e73b7 |
| SHA256 | 39c3919c39670fda6ddfefa7323260e1609339aacc97fe51b1578b5ea7148e75 |
| SHA512 | ec1310a515b591157ec152e23f93dd591419d74df5655e49a26346102664c3ff17efa8eeb617d311bb29dd76c4c5972f4f0d74e7b33ef90f23959dcf48ea99ab |
memory/4200-45-0x0000000000400000-0x00000000004CC000-memory.dmp
memory/4200-46-0x0000000002120000-0x0000000002150000-memory.dmp