Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 05:33
Behavioral task
behavioral1
Sample
2f25cbad07c3fe02e572a21514bb25ce_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2f25cbad07c3fe02e572a21514bb25ce_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2f25cbad07c3fe02e572a21514bb25ce_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
2f25cbad07c3fe02e572a21514bb25ce
-
SHA1
e7fd2180e6a7da20b5ee9b0c5071f0e82d241bf6
-
SHA256
8063ca1dc808a1cee7c276d7ac4c883a5b13387f9ddeeceea5edf930575fe007
-
SHA512
d4250de5c6793205af299a890632f8f471f3cb2ed9894fa42442339b24eec2e1a0fd867a632217d59f14593226d51e003ff931e58f9068b188a1ae1950e3a99b
-
SSDEEP
24576:WmYnXv5aoGJ5ZbXfn8Qg4O5ZMxp3JESywkjBDlj9vEqq1:8XvURZb/1jp3PywkFlj9vi
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\Control Panel\International\Geo\Nation 2f25cbad07c3fe02e572a21514bb25ce_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 4748 Restorator 2006.exe 4000 Restorator.exe -
Modifies system executable filetype association 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shellex\ContextMenuHandlers Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shellex Restorator.exe -
resource yara_rule behavioral2/memory/4708-0-0x0000000000400000-0x000000000053F000-memory.dmp upx behavioral2/memory/4708-35-0x0000000000400000-0x000000000053F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.ax\shellex\ContextMenuHandlers Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dllfile Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.rc\shellex\ContextMenuHandlers Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.wpc\shellex\ContextMenuHandlers Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.ax\shellex Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.res Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.wpc Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.res\shellex Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sysfile\shellex Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.tsp Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.bpl\shellex Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cplfile\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ocxfile\shellex\ContextMenuHandlers Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.rc\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{762F86D0-B3EA-11d2-84D3-0080AD160D07}\ = "Restorator context menu shell extension" Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile Restorator.exe Key created \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000_Classes\.dcr Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.flt\shellex\ContextMenuHandlers Restorator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{762F86D0-B3EA-11d2-84D3-0080AD160D07}\InProcServer32\ = "RestoratorContextMenu.dll" Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.tlb\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.bpl Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dllfile\shellex\ContextMenuHandlers Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.flt\shellex Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ocx Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.acm Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.res Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.ax\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sys Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.tlb\shellex Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\drvfile\shellex Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.scr Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.res\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sysfile\shellex\ContextMenuHandlers Restorator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wpc\ = "BomeRst.wpc" Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.wpc\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.res\shellex\ContextMenuHandlers Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.bpl\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cnv\ = "BomeRst.cnv" Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.cnv Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.dpl Restorator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.res\ = "BomeRst.res" Restorator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.acm\ = "BomeRst.acm" Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.com Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shellex Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.dcr\shellex Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cpl Restorator.exe Set value (str) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000_Classes\.dcr\ = "BomeRst.dcr" Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dllfile\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\drvfile Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rc Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dllfile\shellex Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.tsp\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ax Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.bpl\shellex\ContextMenuHandlers Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.cnv\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shellex\ContextMenuHandlers Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.dpl Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ocxfile Restorator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rc\ = "BomeRst.rc" Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.tsp\shellex Restorator.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1244 regedit.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4708 wrote to memory of 4748 4708 2f25cbad07c3fe02e572a21514bb25ce_JaffaCakes118.exe 84 PID 4708 wrote to memory of 4748 4708 2f25cbad07c3fe02e572a21514bb25ce_JaffaCakes118.exe 84 PID 4708 wrote to memory of 4748 4708 2f25cbad07c3fe02e572a21514bb25ce_JaffaCakes118.exe 84 PID 4748 wrote to memory of 3456 4748 Restorator 2006.exe 86 PID 4748 wrote to memory of 3456 4748 Restorator 2006.exe 86 PID 4748 wrote to memory of 3456 4748 Restorator 2006.exe 86 PID 3456 wrote to memory of 1244 3456 cmd.exe 88 PID 3456 wrote to memory of 1244 3456 cmd.exe 88 PID 3456 wrote to memory of 1244 3456 cmd.exe 88 PID 3456 wrote to memory of 4000 3456 cmd.exe 89 PID 3456 wrote to memory of 4000 3456 cmd.exe 89 PID 3456 wrote to memory of 4000 3456 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f25cbad07c3fe02e572a21514bb25ce_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2f25cbad07c3fe02e572a21514bb25ce_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\Restorator 2006.exe"C:\Users\Admin\AppData\Local\Temp\Restorator 2006.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\bt4801.bat "C:\Users\Admin\AppData\Local\Temp\Restorator 2006.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\regedit.exeregedit /s setup.reg4⤵
- Runs .reg file with regedit
PID:1244
-
-
C:\Users\Admin\AppData\Local\Temp\Restorator.exeRestorator.exe4⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
PID:4000
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD59708121c091ac1c06f677c5531836fac
SHA1aa0099b4fe219981917d63314723246b5fb51505
SHA2562f448f1a0303d94e87c5f4c87764b3cc909fff3e06b0c39b8a4f69e1f8baffd9
SHA512ed38c9aa05f534105eb45e9348d113b10d54af26d71a2655ef3ad69def29c076b3b2b536147f52a29246fcd1a0c7757f4f0263e9aacb180344485b532a9b90fc
-
Filesize
147KB
MD5ff7eb09ee68bb57bcf4e562d2b4e7ee0
SHA1f9349040d7672beaf9fb097a016f2fe692cf3b36
SHA25686f5c07780ea7352c21e62df310dfb9bfee0b0fbf49c7c57ba49f02610df50eb
SHA512ed6b87d373ecc90efe36456c45e82b60ce2b53a0b8f51fbdd404f5ca2770e7df2e55fbc245ef6f16a161e6d26ed88f0ead121b27ca436663565c28188c4dd66c
-
Filesize
2.1MB
MD5ece34ddce9bb177476de69bcd6dee912
SHA175af55a55a6f79bed39ca8ece4426224faeebfc3
SHA256c397cac86f72529ac747c72024800f44a1f605b10e7f96468e1aa909beb5153b
SHA512f16fac4c7b93e3a7d5f3742f78e13477cb6c5c8fbace369a9435b1ea037ba726cf69d93a9456719abade3e7e94366031c958768a0190747c10c8c8b9dbc70bff
-
Filesize
80B
MD5e90d06192a965ec1ecb1cb48f74ded3e
SHA15c697156894d71e84bd79bf67afcf57971f1e7d2
SHA2567231872a6028bbeca738c5158219b2100fb24871278598c51b15f81e9f8ba3ac
SHA5126a73f677607653ceb893e55129f31125eb5f28c40e9c16dfc4dee8777009837ef1886594c8a86bc8ec837bb4bac0f3ae03996f38bc4d14f0966639f6ecf4dff7
-
Filesize
656B
MD586e88695bd1e76522761c853fe4ada0a
SHA172ffb5f6ac99de7fe0820d95b01e4f33bab09d82
SHA25689f2897c27615606f4e7fe75297c75c118b04c6445eef461ea162742e93cf0fa
SHA512c52f0726ea29d2d1b0b541320ef78ab50822213832ab4ce3557d9327f69d13a833b49098ca71fc5e96ef3888391bc234e096381f343fb462c636759f184b1b8c