Analysis
-
max time kernel
140s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 12:56
Behavioral task
behavioral1
Sample
1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe
Resource
win7-20240508-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe
Resource
win10v2004-20240508-en
5 signatures
150 seconds
General
-
Target
1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
1b61e5f570ef369c4418c26211ace9cf
-
SHA1
8fdfb122b032fe1a8b8126e467794e6159096764
-
SHA256
c4ecc1169c2ada1cbd8d21a073664cf3357294556f6bc8c5793a529b2c140530
-
SHA512
30e2f7a32a954ab7657e3112a3436686e35f2c77152fd952d580fe25d5590612764c9666005ee3076e37ae5381fe3a2aa2f9a7c531c412e4b9cc4ae3c589d295
-
SSDEEP
49152:Gp8nE6NJOpyOho61xMeLeswgcI5ekU2wWB:XVJOpP31ResNH5ekUNU
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3216-0-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral2/memory/3216-2-0x0000000000400000-0x00000000004CD000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\IESettingSync 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe -
Modifies registry class 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9C453F21-396D-11D5-9734-70E252C10127}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe" 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.ExternalNSHandler\Clsid\ = "{D173E10A-001D-4318-9822-8C97A8418482}" 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9C453F21-396D-11D5-9734-70E252C10127}\LocalServer32 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D173E10A-001D-4318-9822-8C97A8418482}\ProgID 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D173E10A-001D-4318-9822-8C97A8418482}\ProgID\ = "1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.ExternalNSHandler" 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9C453F21-396D-11D5-9734-70E252C10127}\ProgID 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9C453F21-396D-11D5-9734-70E252C10127}\ProgID\ = "1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.eBookNSHandler" 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D173E10A-001D-4318-9822-8C97A8418482}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe" 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.ExternalNSHandler 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.eBookNSHandler 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.ExternalNSHandler\ = "ExternalNSHandler" 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9C453F21-396D-11D5-9734-70E252C10127}\ = "eBookNSHandler" 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D173E10A-001D-4318-9822-8C97A8418482}\LocalServer32 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.ExternalNSHandler\Clsid 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9C453F21-396D-11D5-9734-70E252C10127} 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.eBookNSHandler\ = "eBookNSHandler" 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.eBookNSHandler\Clsid 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.eBookNSHandler\Clsid\ = "{9C453F21-396D-11D5-9734-70E252C10127}" 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D173E10A-001D-4318-9822-8C97A8418482} 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D173E10A-001D-4318-9822-8C97A8418482}\ = "ExternalNSHandler" 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3216 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe 3216 1b61e5f570ef369c4418c26211ace9cf_JaffaCakes118.exe