Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 23:05
Static task
static1
Behavioral task
behavioral1
Sample
268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe
-
Size
707KB
-
MD5
268f897a9638f75983eb62c3e4a4cb4c
-
SHA1
e278adfc3fbc006dd0e3681c483f277dbfbd8e6a
-
SHA256
19f5174518ada9f63da9f361e799e76b7322a44a6995a440ab178e55d5b6eebe
-
SHA512
06a2e89b67d97ba9ddfecb72b86989e26bea6fb3ce57fb0b564628af8cbe9e504f27402fe6502ba5d8abfdace483a8d21fea99cde3b739e76c1164d02706476a
-
SSDEEP
12288:hCn4T+kq+9OZaDwWgksLH2tBsANtT1x2J2fr7L3NLsndBdJJA8m8+oP:hCnW+2Egx4HA68H77L3IBFb5pP
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2756 netsh.exe 1848 netsh.exe -
Executes dropped EXE 3 IoCs
pid Process 2616 xOcean.exe 2988 xOcean.exe 2532 xOcean.exe -
Loads dropped DLL 16 IoCs
pid Process 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 2616 xOcean.exe 2616 xOcean.exe 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 2988 xOcean.exe 2988 xOcean.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\xOcean\xOcean.exe 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Modifies data under HKEY_USERS 17 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-100 = "DHCP Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-102 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-100 = "EAP Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-103 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-102 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-1 = "IPsec Relying Party" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-100 = "RD Gateway Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-103 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-101 = "Provides Network Access Protection enforcement for EAP authenticated network connections, such as those used with 802.1X and VPN technologies." netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-101 = "Provides DHCP based enforcement for NAP" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-103 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-2 = "Provides IPsec based enforcement for Network Access Protection" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-4 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-3 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-101 = "Provides RD Gateway enforcement for NAP" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-102 = "1.0" netsh.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2756 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 28 PID 2968 wrote to memory of 2756 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 28 PID 2968 wrote to memory of 2756 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 28 PID 2968 wrote to memory of 2756 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 28 PID 2968 wrote to memory of 2756 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 28 PID 2968 wrote to memory of 2756 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 28 PID 2968 wrote to memory of 2756 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 28 PID 2968 wrote to memory of 2616 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 30 PID 2968 wrote to memory of 2616 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 30 PID 2968 wrote to memory of 2616 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 30 PID 2968 wrote to memory of 2616 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 30 PID 2968 wrote to memory of 2616 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 30 PID 2968 wrote to memory of 2616 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 30 PID 2968 wrote to memory of 2616 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 30 PID 2968 wrote to memory of 2988 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 32 PID 2968 wrote to memory of 2988 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 32 PID 2968 wrote to memory of 2988 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 32 PID 2968 wrote to memory of 2988 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 32 PID 2968 wrote to memory of 2988 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 32 PID 2968 wrote to memory of 2988 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 32 PID 2968 wrote to memory of 2988 2968 268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe 32 PID 2532 wrote to memory of 1848 2532 xOcean.exe 35 PID 2532 wrote to memory of 1848 2532 xOcean.exe 35 PID 2532 wrote to memory of 1848 2532 xOcean.exe 35 PID 2532 wrote to memory of 1848 2532 xOcean.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\268f897a9638f75983eb62c3e4a4cb4c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" firewall add allowedprogram "C:\Program Files (x86)\xOcean\xOcean.exe" "xOcean" ENABLE2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2756
-
-
C:\Program Files (x86)\xOcean\xOcean.exe"C:\Program Files (x86)\xOcean\xOcean.exe" install2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2616
-
-
C:\Program Files (x86)\xOcean\xOcean.exe"C:\Program Files (x86)\xOcean\xOcean.exe" start2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2988
-
-
C:\Program Files (x86)\xOcean\xOcean.exe"C:\Program Files (x86)\xOcean\xOcean.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Progra" "xOcean" ENABLE2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- Modifies data under HKEY_USERS
PID:1848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD50c8b4aab1e50593b3b3625eea912b948
SHA10237a4b5d0539ea024f7b54896bad5872094e5e4
SHA256d91ab5cb6fbdf81d86c429eb2916c6395ad91226979dab6e384ea7fdbc56ec6d
SHA5129c196bb8f4a62deda2911757a690b0fae5b1273de59da17e26baf0ab87e63dcbe58475b00fc028a2a1f517fbdb8396c0a4a604d4ba0f08521c7494b570cec59f
-
Filesize
14KB
MD52a2af69379ed269c61893e8146e18f52
SHA103264b45960d3f1fde4b031db47ab7a3f863713d
SHA256e323b74c36dc52c2a3fbda49d998744cf64cab102f0d72796472ab55d2c784d4
SHA51249388047397e33f1ed502bd0c5e61b98b33881f794fb52ca229db5b589af9ecb370e9043e2143dcb62cd9d00df6cacc89589734c83f9fda0ceb3f216c0bedeab
-
Filesize
35KB
MD52cfba79d485cf441c646dd40d82490fc
SHA183e51ac1115a50986ed456bd18729653018b9619
SHA25686b302fa9c85dfa0c1c03ba000864a928365dab571f3355347dba02da22949b7
SHA512cca186a7f9c5cff3f4eca410fbe8cc13dad2514a7e36aec9b1addfbcb239ace9b9b2d8427771858e3fd11783abce7e24d43c286f98da9f8b17562ca095a4c043
-
Filesize
53KB
MD57b53f817aacbb550126803d424ef74ef
SHA1a4c4da8416749008ab19526e267dbda72a909858
SHA256c6948fc04b72235c2832252d942ff8b144b196025b0ff535ca508dc4ab3f73a3
SHA5129cb254e086413b3a91f1e3ae254c465604742c584efe53f273ac85a7dea01386a9674f21fb46c4521936cb322fcd492506f593c90a63b55a44198d589101efe5
-
Filesize
10KB
MD582f7926fd7d12e3eb8ed7b5232bcf956
SHA16065fc921b742cc86c77ce2533fc1d17359eb45e
SHA256604b5e75f43ffae8f172018cdd8f136392d9c52ae0c100d27ef537bb2dfb3984
SHA512b31a63ebbda8f147c32d8336c5ecde8c5261ad5526b01926d7cd74b7a9a1348da56e180e53d20e1e300daca76f9511f24d6e695550b705b7650c239e5b6e76c7
-
Filesize
15KB
MD53ed8f71cc67857223cad786e0c7c578e
SHA1a4864b53ac8c0d0eaffc516f891644c935de942a
SHA25658200fbce500184e73d8cf63bc689c157763b8a63e3d1cd62165e334e8d1596d
SHA5127424517d42dea7a3121cc9c52d490d6d1c27df59e1e1d926cf97d3543908de78c1e384061ba76b3520cd5a7eecef83f3629b565add617193d09db09a5f882430