Analysis
-
max time kernel
140s -
max time network
57s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 01:26
Static task
static1
Behavioral task
behavioral1
Sample
0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
0bc845420dfe863b6a0d1531005d9bc3
-
SHA1
636b063526aa2b17d226ae2e16e8e32c68261efa
-
SHA256
836590dcc235eae9e349d66fed9db1b6efe8a1795e779176e904e23bcda575a8
-
SHA512
01a2fd98bad0aa3ae060e266e998538fc9fdabc25776fb008ecc8bf06970ff5bf5de6002106c36979f2f39a4efc2b6a20e1d607a49fca282405942fbc7b8da67
-
SSDEEP
24576:0SU65gZxLNjajuoLjf0Zf0T+uiYQn9PWKJ5vZUTBlQoajr6vr9:pPgDLICo/f0Zf0tiYQnkM5vOfMK9
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 3156 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe 3156 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\tyecepn.dll 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe File opened for modification C:\Windows\tyecepn.dll 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0E59F1D5-1FBE-11D0-8FF2-00A0D10038BC} 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine.1\ = "QMRoutine Class" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80} 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0\FLAGS\ = "0" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D} 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMFunction 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMFunction\ = "QMDispatch.QMFunction" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\InprocHandler32\ = "ole32.dll" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\InprocServer32\ = "C:\\Windows\\tyecepn.dll" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\InprocServer32\ThreadingModel = "Apartment" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0BC845~1.EXE" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\InprocHandler32 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine\CLSID\ = "{C07DB6A3-34FC-4084-BE2E-76BB9203B049}" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049} 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\TypeLib\ = "{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\LocalServer32 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine\CLSID 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\Programmable 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0\0 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0\0\win32 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\TypeLib\Version = "1.0" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B} 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine.1\CLSID\ = "{C07DB6A3-34FC-4084-BE2E-76BB9203B049}" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0\HELPDIR 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D} 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine\CurVer\ = "QMDispatch.QMRoutine.1" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0\FLAGS 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\ = "IQMRoutine" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\ProxyStubClsid32 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\ProgID 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B} 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\ = "QMRoutine Class" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\TypeLib\ = "{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\ = "IQMRoutine" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\TypeLib\Version = "1.0" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMFunction\CLSID 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\ProgID 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\VersionIndependentProgID 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0\ = "QMDispatch 1.0 Type Library" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\ProgID\ = "QMDispatch.QMRoutine.1" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\TypeLib 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\ = "QMDispatch.QMFunction" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\InprocHandler32 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine.1 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\VersionIndependentProgID\ = "QMDispatch.QMRoutine" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\TypeLib 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\ProgID\ = "QMDispatch.QMFunction" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine\ = "QMRoutine Class" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0\0\win32\ = "C:\\Windows\\tyecepn.dll" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\TypeLib 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\ProxyStubClsid32 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMFunction\CLSID\ = "{EBEB87A4-E151-4054-AB45-A6E094C5334B}" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\InprocServer32 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\TypeLib\ = "{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\ProgID 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine.1\CLSID 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine\CurVer 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0\HELPDIR\ = "C:\\Windows\\" 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3156 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3156 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3156 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe 3156 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe 3156 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe 3156 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe 3156 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe 3156 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe 3156 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe 3156 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe 3156 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe 3156 0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0bc845420dfe863b6a0d1531005d9bc3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3156
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
378B
MD5f3dd7684f7c28a32bdd4e5a8dfcdacf4
SHA12b79d99852c31c8ad4e4f92be641691cfc4e287d
SHA25654f3a8745e705f5d1fc00e67db97b912c745ee47089b5f95ba99d8b8bd61947a
SHA51246db4c553d3688902bc0e1f4b9204a080989e4c0e98befd14151bbb7844a9bd709fcbc08fd0b0efecc17150bd054ca64f81ca0d6f680b8c3625910edde7b77ac
-
Filesize
40KB
MD5e0d350836bfdb31322210f5823dcb9de
SHA1b3e0ac9ac16a1a3b3a66c47509218c2e98fccd1a
SHA2568dea6a462fdf0a6127e646151c4c1e51b649e6b50abe5ac1ffb5ca65fca0a50c
SHA5128c7adf84c9c338d5d1d84ceed10847076ba908a2a466e7cf0781349b1a5916e17001725b3e1aab68ecf4f279db2de2cd3e3b0172cc042d21392bac668195a8d8
-
Filesize
48KB
MD53f2532ea6180626395b2006ffedf7fca
SHA16634801e48a16c1c40cde9ce4cf4080984251f21
SHA2560175158308879005dbb4db2bcccd4459bfbbe8a7669a6485754eeaec637ea930
SHA51285fa904de2bb73b04daed671b5d58aad683600ed3e41494aeee5bdf9243408031d32628a741caff4df855e39c72d4cc9d8440e79dd69139b1cf9e3ea59676502