Analysis
-
max time kernel
142s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 20:23
Static task
static1
Behavioral task
behavioral1
Sample
363e70adb4859ad7ccae401ff51732f0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
363e70adb4859ad7ccae401ff51732f0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
363e70adb4859ad7ccae401ff51732f0_JaffaCakes118.exe
-
Size
665KB
-
MD5
363e70adb4859ad7ccae401ff51732f0
-
SHA1
e138379affd1db6a72b3407f765bf24d23afbaba
-
SHA256
4ab202ee5785f18a7ebf805b06ea3cdf4f1967850c719da7f161bc154b0f4f36
-
SHA512
c60f2ae4797a5c7ce389fff685e19f8f6583931f5b5128240ec958211f082f4edaff16c580d1a0412582a3b19660ba0cb5f28fc82d007bc10ab331f3161648ec
-
SSDEEP
12288:k7aoyjY0GJAfw1ENyld1yM3hJf++YU9lZ1c2obY7TeqjIwcIx6dH:k7a7Y7A4+yleUpJ1oc3eqjovdH
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4060 4.exe 1972 Hacker.com.cn.ini -
Loads dropped DLL 4 IoCs
pid Process 1972 Hacker.com.cn.ini 1972 Hacker.com.cn.ini 1972 Hacker.com.cn.ini 1972 Hacker.com.cn.ini -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 363e70adb4859ad7ccae401ff51732f0_JaffaCakes118.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Hacker.com.cn.ini 4.exe File created C:\Windows\uninstal.bat 4.exe File created C:\Windows\NYYUUM.DAT 4.exe File created C:\Windows\MWCDVO.DAT 4.exe File created C:\Windows\Hacker.com.cn.ini 4.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" Hacker.com.cn.ini Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Hacker.com.cn.ini Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" Hacker.com.cn.ini Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" Hacker.com.cn.ini Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" Hacker.com.cn.ini -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4060 4.exe Token: SeDebugPrivilege 1972 Hacker.com.cn.ini -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1972 Hacker.com.cn.ini -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1972 Hacker.com.cn.ini 1972 Hacker.com.cn.ini 1972 Hacker.com.cn.ini -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3076 wrote to memory of 4060 3076 363e70adb4859ad7ccae401ff51732f0_JaffaCakes118.exe 83 PID 3076 wrote to memory of 4060 3076 363e70adb4859ad7ccae401ff51732f0_JaffaCakes118.exe 83 PID 3076 wrote to memory of 4060 3076 363e70adb4859ad7ccae401ff51732f0_JaffaCakes118.exe 83 PID 1972 wrote to memory of 1924 1972 Hacker.com.cn.ini 87 PID 1972 wrote to memory of 1924 1972 Hacker.com.cn.ini 87 PID 4060 wrote to memory of 1984 4060 4.exe 88 PID 4060 wrote to memory of 1984 4060 4.exe 88 PID 4060 wrote to memory of 1984 4060 4.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\363e70adb4859ad7ccae401ff51732f0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\363e70adb4859ad7ccae401ff51732f0_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat3⤵PID:1984
-
-
-
C:\Windows\Hacker.com.cn.iniC:\Windows\Hacker.com.cn.ini1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:1924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
896KB
MD54ed2e1ed5cb7de379e2cd5a60a860efa
SHA1d543c58b57149f31f9413841e32fa4d1ef8029f9
SHA256d217fde06d652866dfce91c13b2443edf8999e46dc6ea8c3a688f389d59819fc
SHA512358c064629d8abbe3ae41e48502675b3792c1ac0f5695d0e2cc53b2bb4b4745641a95d9d93ef9293d233af3dad6afc172c388b039524e64a5ae7815d232e2ae4
-
Filesize
51KB
MD5d58f992c53515c9f1fb9394a46f4cb48
SHA11f9909d227b93be10328e0abc64052da984657ba
SHA25650c6b8848b0a9cf6a6b579928dc6e5c75cf7564c19bb7b40d86ba9d360ebb040
SHA5123a87c279fbbbaff2bfe791c523716ad092c41099b8914ba369565014502d408084259d4efe6896d785c024935b181ca34cf49e3b79f3f1a89ee1c9d775635d94
-
Filesize
55KB
MD56853cba3ccc11699c2d840f41c10393f
SHA180a430dcc2cb34b05d433f0f63b8ef8a6a09bbe3
SHA2560bcf3f4ff7862cd885003b8ecc4d424a2fd418fd64412ffe95a9c4221cc3de59
SHA512a02fef8b7c721459fa6f081a1208bf8dd84d957663b4d711b9f6f1731deedf977e5a391ec7481797da7a594c3dd133e84865133855dcdbe6da2128887270114c
-
Filesize
150B
MD55edd682a8b1f2bf873300774f954ab03
SHA12cca4e743d02dbccf31b784ea26a60c03dcc9637
SHA256a34c51ec5d2ac66ef75719e7dee61b6e89e74d054712438da2585ec92ce0865a
SHA512916f0e846a38f63aae996e2a3957fa24fed3bcaa6add68c529e3cc0aa063dca49b98d42c92317bfc2f43d745c492e1e1e6f5db0c986b9682f4b9b0cf0afd7bd2