Analysis
-
max time kernel
93s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 01:23
Behavioral task
behavioral1
Sample
3b7af0aff8c13401954fb6641f43d95e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3b7af0aff8c13401954fb6641f43d95e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3b7af0aff8c13401954fb6641f43d95e_JaffaCakes118.exe
-
Size
378KB
-
MD5
3b7af0aff8c13401954fb6641f43d95e
-
SHA1
e66b7d41e95c3421f2146bc0304ccbdce56a32a9
-
SHA256
57dce55ba7f7cdb894d6253c50c7134a2351d725b96a36a9f0907737b3595662
-
SHA512
d1657ff39f1457eded7192644c7f6eef4b2012293c5cd4b886e2e0dcb6e97d3d5dded52cb9ed93a21dc639842698aa0aff5f34e537273c50b98ac91723d5212b
-
SSDEEP
6144:cRccJz+MsvuzhvMKE4TQ5sU5bGy9BqqDLuTipHrpXY8rk5CUUDr4Aun38CwzqqDu:c9SKhvMKU5V5bGy98qnuwpI8rk5CUUw5
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\svchost32.dll 3b7af0aff8c13401954fb6641f43d95e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\svchost32.dll 3b7af0aff8c13401954fb6641f43d95e_JaffaCakes118.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0008000000023477-10.dat acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation 3b7af0aff8c13401954fb6641f43d95e_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2740 rundll32.exe -
resource yara_rule behavioral2/memory/3996-0-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/files/0x0008000000023477-10.dat upx behavioral2/memory/2740-12-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/3996-64-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/2740-63-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\svchost = "rundll32.exe C:\\Windows\\system32\\drivers\\svchost32.dll svchost" 3b7af0aff8c13401954fb6641f43d95e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\svchost = "rundll32.exe C:\\Windows\\system32\\drivers\\svchost32.dll svchost" 3b7af0aff8c13401954fb6641f43d95e_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\MDOS.sys 3b7af0aff8c13401954fb6641f43d95e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MDOS.sys 3b7af0aff8c13401954fb6641f43d95e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MDOS.SYS rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "773596094" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "773596094" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "788283529" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31118330" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427512386" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31118330" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31118330" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{59BC21CB-3FED-11EF-BE68-EE1473AF0696} = "0" iexplore.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000_Classes\Local Settings 3b7af0aff8c13401954fb6641f43d95e_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1508 vssvc.exe Token: SeRestorePrivilege 1508 vssvc.exe Token: SeAuditPrivilege 1508 vssvc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3512 iexplore.exe 3512 iexplore.exe 3564 IEXPLORE.EXE 3564 IEXPLORE.EXE 3564 IEXPLORE.EXE 3564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3996 wrote to memory of 1748 3996 3b7af0aff8c13401954fb6641f43d95e_JaffaCakes118.exe 86 PID 3996 wrote to memory of 1748 3996 3b7af0aff8c13401954fb6641f43d95e_JaffaCakes118.exe 86 PID 3996 wrote to memory of 1748 3996 3b7af0aff8c13401954fb6641f43d95e_JaffaCakes118.exe 86 PID 3996 wrote to memory of 2740 3996 3b7af0aff8c13401954fb6641f43d95e_JaffaCakes118.exe 91 PID 3996 wrote to memory of 2740 3996 3b7af0aff8c13401954fb6641f43d95e_JaffaCakes118.exe 91 PID 3996 wrote to memory of 2740 3996 3b7af0aff8c13401954fb6641f43d95e_JaffaCakes118.exe 91 PID 2740 wrote to memory of 3512 2740 rundll32.exe 92 PID 2740 wrote to memory of 3512 2740 rundll32.exe 92 PID 3512 wrote to memory of 3564 3512 iexplore.exe 93 PID 3512 wrote to memory of 3564 3512 iexplore.exe 93 PID 3512 wrote to memory of 3564 3512 iexplore.exe 93 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b7af0aff8c13401954fb6641f43d95e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3b7af0aff8c13401954fb6641f43d95e_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\reset.vbs"2⤵PID:1748
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\drivers\svchost32.dll svchost2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\program files\internet explorer\iexplore.exe"c:\program files\internet explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3512 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3564
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
214B
MD51d845c764862dd0c111e312d9cf8614f
SHA1a48190c06dafcb54e6aabc9afb745b55012b8613
SHA256ba61b1cbcc413986d7d51ab16570755ccfe931b8e101cd0bc5d260048527fa01
SHA51229f649e1fc98a8e3d57b40d932c58ee92f00e6d79bc9d9f01fa526549b813ac8be368cb8ddbc1d80befec7fb1bec92d57bfbe293fccb4850beab719fccfb17cc
-
Filesize
144KB
MD581055cdf18804c2474c73f4f3686c494
SHA1df9970070bc40f251171343c05dc7ff4eed915ca
SHA2560ecd4a13975cae9907ff7d89dd199a3be2f10692732c85c2b12b568d26e3eb64
SHA512c41b13fc57ca077df15cd8645d3cbd8a90398243b2256b18345da0b1e37571fb41741b11dfb889c4e4b8ed66cb7ec1346066e91df74de13f6569fd90bb00e504
-
Filesize
12KB
MD55b455410c9ea7a5dce23739b62c0abdc
SHA1b536a974fcfd0880e923a17e3168dca8dccb9dfd
SHA2562904c3ad3a27cdb200d5365a4979e6a693c8964c59c1d1bdef71ed836604a25b
SHA512a5fa7995f51f7026b922010dff6197653ed3543ef51fd0485bd2d3b3e2bfb9f4767b690a51a8147810a56e05c2f1439ad882cb12bf60f2e0b4d519f66e6786ec