Overview
overview
7Static
static
30f562ef020...18.exe
windows7-x64
70f562ef020...18.exe
windows10-2004-x64
7$APPDATA/�...÷.lnk
windows7-x64
3$APPDATA/�...÷.lnk
windows10-2004-x64
7$FAVORITES...÷.url
windows7-x64
6$FAVORITES...÷.url
windows10-2004-x64
3$FAVORITES...÷.url
windows7-x64
6$FAVORITES...÷.url
windows10-2004-x64
3$FAVORITES...Ø.url
windows7-x64
6$FAVORITES...Ø.url
windows10-2004-x64
3$FAVORITES...½.url
windows7-x64
6$FAVORITES...½.url
windows10-2004-x64
3$TEMP/A±�...HJ.dll
windows7-x64
1$TEMP/A±�...HJ.dll
windows10-2004-x64
1$TEMP/A±�...Io.dll
windows7-x64
1$TEMP/A±�...Io.dll
windows10-2004-x64
1$TEMP/A±�...Io.sys
windows7-x64
1$TEMP/A±�...Io.sys
windows10-2004-x64
1$TEMP/A±�...er.exe
windows7-x64
1$TEMP/A±�...er.exe
windows10-2004-x64
1$TEMP/A±�...ll.exe
windows7-x64
7$TEMP/A±�...ll.exe
windows10-2004-x64
7C:/Documen...��.lnk
windows7-x64
1C:/Documen...��.lnk
windows10-2004-x64
1C:/Documen...÷.url
windows7-x64
1C:/Documen...÷.url
windows10-2004-x64
1C:/Documen...÷.url
windows7-x64
1C:/Documen...÷.url
windows10-2004-x64
1C:/Documen...Ø.url
windows7-x64
1C:/Documen...Ø.url
windows10-2004-x64
1C:/Documen...½.url
windows7-x64
1C:/Documen...½.url
windows10-2004-x64
1Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 19:57
Static task
static1
Behavioral task
behavioral1
Sample
0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$APPDATA/Æô¶¯ Internet Explorer ä¯ÀÀÆ÷.lnk
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$APPDATA/Æô¶¯ Internet Explorer ä¯ÀÀÆ÷.lnk
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$FAVORITES/GoogleËÑË÷.url
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$FAVORITES/GoogleËÑË÷.url
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$FAVORITES/°Ù¶ÈËÑË÷.url
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
$FAVORITES/°Ù¶ÈËÑË÷.url
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
$FAVORITES/ÍêÃÀϵͳÏÂÔØ.url
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
$FAVORITES/ÍêÃÀϵͳÏÂÔØ.url
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$FAVORITES/ÍøÖ·µ¼º½.url
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
$FAVORITES/ÍøÖ·µ¼º½.url
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
$TEMP/A±äËÙÆ÷/JSHJ.dll
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
$TEMP/A±äËÙÆ÷/JSHJ.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
$TEMP/A±äËÙÆ÷/WinIo.dll
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
$TEMP/A±äËÙÆ÷/WinIo.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
$TEMP/A±äËÙÆ÷/WinIo.sys
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$TEMP/A±äËÙÆ÷/WinIo.sys
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
$TEMP/A±äËÙÆ÷/aspeeder.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
$TEMP/A±äËÙÆ÷/aspeeder.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
$TEMP/A±äËÙÆ÷/uninstall.exe
Resource
win7-20240611-en
Behavioral task
behavioral22
Sample
$TEMP/A±äËÙÆ÷/uninstall.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
C:/Documents and Settings/Default User/Application Data/Microsoft/Internet Explorer/Quick Launch/�.lnk
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
C:/Documents and Settings/Default User/Application Data/Microsoft/Internet Explorer/Quick Launch/�.lnk
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
C:/Documents and Settings/Default User/Favorites/GoogleËÑË÷.url
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
C:/Documents and Settings/Default User/Favorites/GoogleËÑË÷.url
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
C:/Documents and Settings/Default User/Favorites/°Ù¶ÈËÑË÷.url
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
C:/Documents and Settings/Default User/Favorites/°Ù¶ÈËÑË÷.url
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
C:/Documents and Settings/Default User/Favorites/ÍêÃÀϵͳÏÂÔØ.url
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
C:/Documents and Settings/Default User/Favorites/ÍêÃÀϵͳÏÂÔØ.url
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
C:/Documents and Settings/Default User/Favorites/ÍøÖ·µ¼º½.url
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
C:/Documents and Settings/Default User/Favorites/ÍøÖ·µ¼º½.url
Resource
win10v2004-20240611-en
General
-
Target
0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe
-
Size
542KB
-
MD5
0f562ef0200664bc779e2e2569337a14
-
SHA1
b545b0ff555c09326d27adbd3cf8e5964e230baf
-
SHA256
b860f598a2550bb42b2aa77aed81e106cd36c50975a71b8288871ae61482e7a0
-
SHA512
17c357bc7c54a09806dcbb1903e9c61bcd2a13ebd6e56901054b7db2d462e951e8dee35aad04aa2366f78402edd09fe7d5465d4b6ff64d1f4f1444334d736a75
-
SSDEEP
12288:wI5AA6NtlKQOeJVU9E3wleUeRYm8sz+OQK4JQ8uhWsSL:HApTOeTU9E3wsUeFznQJhue
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2652 aspeeder.exe -
Loads dropped DLL 3 IoCs
pid Process 2652 aspeeder.exe 2652 aspeeder.exe 2652 aspeeder.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Microsoft\Internet Explorer\TypedURLs 0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\TypedURLs\url1 = "http://www.dh234.com/" 0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\TypedURLs\url3 = "http://www.dh234.com/ghost.html" 0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\TypedURLs\url4 = "ÍøÖ·µ¼º½" 0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\TypedURLs\url5 = "°Ù¶ÈËÑË÷" 0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.dh234.com/" 0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\TypedURLs\url2 = "http://www.baidu.com/index.php?tn=dh234_pg" 0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\TypedURLs\url6 = "ÍêÃÀϵͳÏÂÔØ" 0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Microsoft\Internet Explorer\Main 0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.dh234.com/" 0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command 0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} 0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell 0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage 0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 32 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2652 aspeeder.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2652 aspeeder.exe 2652 aspeeder.exe 2652 aspeeder.exe 2652 aspeeder.exe 2652 aspeeder.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 2652 aspeeder.exe 2652 aspeeder.exe 2652 aspeeder.exe 2652 aspeeder.exe 2652 aspeeder.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2652 aspeeder.exe 2652 aspeeder.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1556 wrote to memory of 2652 1556 0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe 82 PID 1556 wrote to memory of 2652 1556 0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe 82 PID 1556 wrote to memory of 2652 1556 0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0f562ef0200664bc779e2e2569337a14_JaffaCakes118.exe"1⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\A±äËÙÆ÷\aspeeder.exeC:\Users\Admin\AppData\Local\Temp\A±äËÙÆ÷\aspeeder.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5543df5cc612f10d753b823a893c5b636
SHA160d8df3b1cd3d1cd8316a8ec3c4fb1a98ec13139
SHA25635fa8c59e3480e5b26e7334ec91e8318130f68583fc2e3ae04f824357271ea63
SHA512cb9b22c493f8e9a3188b35570a3bb091508fc2e41e4852eeaf17f0e9eeddeb0e68c717a9f3eaacd2c935aba9c6366e5f2d9258b38cacf9a5a5a5e02abf8d494d
-
Filesize
48KB
MD56d113aa35a8c79b236751e4ccf2b7751
SHA1b4ac97768512acd31e4a824b6595ec2163db7972
SHA256d2eb2a40174b9adb3abc768af7fa80882cd1e2ad22303fe4448db89509ac392b
SHA512f83209d9e98395ae6127f247b7f68167708c1af789a332695feed0f7879d8a83405eed3c3e860e482cebc704a613563bcadfaa8a2986e348d85e50a2e0b3fb68
-
Filesize
1.0MB
MD50b99f927d85b0d20e548183a860afaa0
SHA15fff765df471ef83b370c92a12f56789dda2cb1f
SHA256c6eb445c422dda11d1094d927cc0f45446a7e954e72be6e3bfce81ef24f23c0f
SHA512f3290b60c149a70bf54786a2b447dbd0e94f9a16c901047a7109d4562410104dc54d6a9f7ef9a1ccc2bdd80e5b5094b8a098bb304cc2a068015e9472fb15b91c