Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 05:14
Static task
static1
Behavioral task
behavioral1
Sample
275de77e775d74628c509790e53c2f28_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
275de77e775d74628c509790e53c2f28_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
275de77e775d74628c509790e53c2f28_JaffaCakes118.exe
-
Size
13KB
-
MD5
275de77e775d74628c509790e53c2f28
-
SHA1
c1b819ff49de90824d3c5b0d54f47393a9e87b69
-
SHA256
ff98b5fd92258ed3bf230a51ae303419d361107caecf0847531ee1590525b6d2
-
SHA512
c0be2ebecc79ff9a4078466999ec9292adf256200d7a89ee18c2634361275809f151a7860b654c2465796ea265effafb654e85021fdc59af63fb55417d4d08fe
-
SSDEEP
384:G0qlkNtNd4c882esiApbJiERcILx4W7bTuY:dqlYNdn5svVkuxz7bSY
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer\run issearch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\issearch.exe = "issearch.exe" issearch.exe -
Deletes itself 1 IoCs
pid Process 2404 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2412 issearch.exe -
Loads dropped DLL 3 IoCs
pid Process 2272 275de77e775d74628c509790e53c2f28_JaffaCakes118.exe 2272 275de77e775d74628c509790e53c2f28_JaffaCakes118.exe 2412 issearch.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{f4d74aaa-a178-4463-846b-b4bc87a024e0} issearch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{f4d74aaa-a178-4463-846b-b4bc87a024e0}\ issearch.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects issearch.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\issearch.exe 275de77e775d74628c509790e53c2f28_JaffaCakes118.exe File created C:\Windows\SysWOW64\ixt0.dll issearch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchUrl issearch.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Search issearch.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main issearch.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{f4d74aaa-a178-4463-846b-b4bc87a024e0} issearch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f4d74aaa-a178-4463-846b-b4bc87a024e0}\ issearch.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{f4d74aaa-a178-4463-846b-b4bc87a024e0}\InprocServer32 issearch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f4d74aaa-a178-4463-846b-b4bc87a024e0}\InprocServer32\ = "C:\\Windows\\SysWow64\\ixt0.dll" issearch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f4d74aaa-a178-4463-846b-b4bc87a024e0}\InprocServer32\ThreadingModel = "Apartment" issearch.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID issearch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2272 275de77e775d74628c509790e53c2f28_JaffaCakes118.exe 2272 275de77e775d74628c509790e53c2f28_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2272 275de77e775d74628c509790e53c2f28_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2412 2272 275de77e775d74628c509790e53c2f28_JaffaCakes118.exe 31 PID 2272 wrote to memory of 2412 2272 275de77e775d74628c509790e53c2f28_JaffaCakes118.exe 31 PID 2272 wrote to memory of 2412 2272 275de77e775d74628c509790e53c2f28_JaffaCakes118.exe 31 PID 2272 wrote to memory of 2412 2272 275de77e775d74628c509790e53c2f28_JaffaCakes118.exe 31 PID 2272 wrote to memory of 2404 2272 275de77e775d74628c509790e53c2f28_JaffaCakes118.exe 32 PID 2272 wrote to memory of 2404 2272 275de77e775d74628c509790e53c2f28_JaffaCakes118.exe 32 PID 2272 wrote to memory of 2404 2272 275de77e775d74628c509790e53c2f28_JaffaCakes118.exe 32 PID 2272 wrote to memory of 2404 2272 275de77e775d74628c509790e53c2f28_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\275de77e775d74628c509790e53c2f28_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\275de77e775d74628c509790e53c2f28_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\issearch.exeC:\Windows\system32\issearch.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
PID:2412
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\275DE7~1.EXE > nul2⤵
- Deletes itself
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD58f205da19f16b5c8660f5b75b0b6caba
SHA113dfc8e42d10ede826afe107a8c63793d88431bb
SHA25645450ef7eb540a38aecfac29af20e5decda91d768604cbe0762936350b5e1036
SHA5123a2779e67d03a6ef88a7c1a4ef578e9d7a91458e47ab74dca5ed03337b9fb864774e0ce10e665aa4cad628b49501220adaf11a493fc7e5d9225ef422187aea95
-
Filesize
19KB
MD52e92e1de13c7c535a819ce22b62c969c
SHA18b49bc492f04f1c79a5b9f90fff208c7de711266
SHA256f36eba15d7d9b60206dc0a1a1492c1d79b6aa5a408ee493ad9b5392667454ed2
SHA512b1fddf04ff8eb12004747a027ddeb00435ff7c6af7e5604166b512ca9c94bf8b2f0844fcbdcf8f0ed2121715a1833e8c31a9fce35de695b07925ebf809516491