Analysis
-
max time kernel
141s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
30a54689944b5d90541a6c82d84e9715_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
30a54689944b5d90541a6c82d84e9715_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
30a54689944b5d90541a6c82d84e9715_JaffaCakes118.exe
-
Size
662KB
-
MD5
30a54689944b5d90541a6c82d84e9715
-
SHA1
6e4f8cf54e070c8fb5835cac6bf6bd3a958022b6
-
SHA256
deac2e4adb04727098c7ff6c906155cf0129c1954f4812d0d9f5931b6bad1249
-
SHA512
e44da03cd82cc500b911bd1aa8e0e554bafca3e477728ee1c41d67a719487137c157c014a0f19dd1b22237d24b2007907a73408ed8effc540d8942ae48863c2e
-
SSDEEP
12288:uHTAX0i7fsqO8Qhl4Aw/IeaWZF3Z4mxx6Q4AMmlo9QNLnn31:uHT1i7fs1D6A8aWZQmX6Q4AMb9i31
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2364 ¸´¼þÐÞ~2.EXE 2584 cmdonl.exe -
Loads dropped DLL 2 IoCs
pid Process 844 30a54689944b5d90541a6c82d84e9715_JaffaCakes118.exe 844 30a54689944b5d90541a6c82d84e9715_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 30a54689944b5d90541a6c82d84e9715_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat cmdonl.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\MVJYDT.DAT ¸´¼þÐÞ~2.EXE File created C:\Windows\cmdonl.exe ¸´¼þÐÞ~2.EXE File opened for modification C:\Windows\cmdonl.exe ¸´¼þÐÞ~2.EXE File created C:\Windows\uninstal.bat ¸´¼þÐÞ~2.EXE -
Modifies data under HKEY_USERS 28 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44406B02-05E5-45BB-9536-AC3CBCA58F7F}\WpadDecisionTime = 40a9d49610d2da01 cmdonl.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44406B02-05E5-45BB-9536-AC3CBCA58F7F}\ba-e5-e0-eb-ea-dc cmdonl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections cmdonl.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cmdonl.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0088000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cmdonl.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" cmdonl.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" cmdonl.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44406B02-05E5-45BB-9536-AC3CBCA58F7F}\WpadDecision = "0" cmdonl.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0088000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cmdonl.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44406B02-05E5-45BB-9536-AC3CBCA58F7F}\WpadDecisionReason = "1" cmdonl.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" cmdonl.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44406B02-05E5-45BB-9536-AC3CBCA58F7F}\WpadDecisionTime = 80d65ecc10d2da01 cmdonl.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ba-e5-e0-eb-ea-dc\WpadDecisionTime = 80d65ecc10d2da01 cmdonl.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings cmdonl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad cmdonl.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cmdonl.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44406B02-05E5-45BB-9536-AC3CBCA58F7F}\WpadNetworkName = "Network 3" cmdonl.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ba-e5-e0-eb-ea-dc cmdonl.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ba-e5-e0-eb-ea-dc\WpadDecision = "0" cmdonl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ cmdonl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings cmdonl.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" cmdonl.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ba-e5-e0-eb-ea-dc\WpadDecisionTime = 40a9d49610d2da01 cmdonl.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" cmdonl.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix cmdonl.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ba-e5-e0-eb-ea-dc\WpadDetectedUrl cmdonl.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44406B02-05E5-45BB-9536-AC3CBCA58F7F} cmdonl.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ba-e5-e0-eb-ea-dc\WpadDecisionReason = "1" cmdonl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2364 ¸´¼þÐÞ~2.EXE Token: SeDebugPrivilege 2584 cmdonl.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2584 cmdonl.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2584 cmdonl.exe 2584 cmdonl.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 844 wrote to memory of 2364 844 30a54689944b5d90541a6c82d84e9715_JaffaCakes118.exe 30 PID 844 wrote to memory of 2364 844 30a54689944b5d90541a6c82d84e9715_JaffaCakes118.exe 30 PID 844 wrote to memory of 2364 844 30a54689944b5d90541a6c82d84e9715_JaffaCakes118.exe 30 PID 844 wrote to memory of 2364 844 30a54689944b5d90541a6c82d84e9715_JaffaCakes118.exe 30 PID 2364 wrote to memory of 2792 2364 ¸´¼þÐÞ~2.EXE 32 PID 2364 wrote to memory of 2792 2364 ¸´¼þÐÞ~2.EXE 32 PID 2364 wrote to memory of 2792 2364 ¸´¼þÐÞ~2.EXE 32 PID 2364 wrote to memory of 2792 2364 ¸´¼þÐÞ~2.EXE 32 PID 2364 wrote to memory of 2792 2364 ¸´¼þÐÞ~2.EXE 32 PID 2364 wrote to memory of 2792 2364 ¸´¼þÐÞ~2.EXE 32 PID 2364 wrote to memory of 2792 2364 ¸´¼þÐÞ~2.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\30a54689944b5d90541a6c82d84e9715_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\30a54689944b5d90541a6c82d84e9715_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¸´¼þÐÞ~2.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¸´¼þÐÞ~2.EXE2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat3⤵PID:2792
-
-
-
C:\Windows\cmdonl.exeC:\Windows\cmdonl.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
290KB
MD58a6746f8423966dcbffcf2637b0ae009
SHA1b17f552dc9cd0f63993ac6d61ad218e87422ece3
SHA256df64a389c6fd6d6328e4a4d02d9d0987f4788a306969265e4aec6eadba253c0e
SHA512255f87f536f97771e0bf394bafb91debb6753682311ea640a52aa62eaec21c6fa0afabdfb78968a824e92a958976ee29a325563d44f517c0defb40b3cb1479ed
-
Filesize
51KB
MD5c569a17ff175dd1b9d398410c8409139
SHA1f4a00ddb96783ac3deb556d0d97b09bd30872ba1
SHA2568c2063f15c1d5102869c98a210c77c34897f01cf583a3b061a1bb46e8d59525e
SHA512f6b54d20de495712cdd42d821e8f515140c60a699bd06e0127240004e955a608adb4e44dd4c52efb2df7fa4cd314c054fb728ead6a356caa82249ff7a02e643f
-
Filesize
164B
MD595d1be338ea6598321eb8d97c4cddb8d
SHA1c2e1d66371c5abcec0487bf1a8882cd9c582d7d6
SHA2566f2ca3b00e15662a08f7eec7ab83192804342905938f662f62512f39a617e1a2
SHA512db2fff6f881321983dec8542daed2ef3eab4d4f6d106e457fabee251732cad951c9c09c4491021f0b0d045b8c42eb95fbddccbce88e801df88e549026132c9b1