Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 18:29
Behavioral task
behavioral1
Sample
42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe
-
Size
95KB
-
MD5
42d715fcf1e4150a6e470a742de66f8e
-
SHA1
6f667f3b5d4e899f0784c4efe1e8ed9763dfc150
-
SHA256
fea2457bd9e2a1c5f5492e2e4f4d32b802a0bf7909202a8ed7f8c804753d094f
-
SHA512
4685fcf30438ed0fcdf02bc3d5d507f4d0fa0110beb797ee3f085cf8bbfb7ba9416d01eb3de3548af678116823c7e894f49a8108a4f0cde64a584347302dff02
-
SSDEEP
1536:rj9VU/R51ZIdJ2N5aMHHHFSRAKuOAp29HvCRMvYQpZjStnebRCAEF8sE46Yeojnv:MX4doFH4RABp29wqYoZuteNsB6lqndZ
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\°®ÉϸßÇåµçÓ°²¥·ÅÆ÷.lnk wscript.exe -
Executes dropped EXE 3 IoCs
pid Process 2524 Update.exe 2952 info2asp.exe 2440 iePlayer.exe -
Loads dropped DLL 11 IoCs
pid Process 2988 42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe 2988 42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe 2988 42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe 2900 wscript.exe 2900 wscript.exe 2900 wscript.exe 2228 regsvr32.exe 1972 WerFault.exe 1972 WerFault.exe 1972 WerFault.exe 1972 WerFault.exe -
resource yara_rule behavioral1/memory/2988-1-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2988-17-0x0000000000400000-0x0000000000452000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iePlayer.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B05CB5FE-1E22-43C7-93E2-4CF04C87B3CC}\ = "bhoRay2009 Class" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B05CB5FE-1E22-43C7-93E2-4CF04C87B3CC}\NoExplorer = "1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B05CB5FE-1E22-43C7-93E2-4CF04C87B3CC} regsvr32.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\ad405cn\info2asp.exe 42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe File created C:\Windows\ad405cn\iePlayer.exe 42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe File created C:\Windows\ad405cn\abc.js iePlayer.exe File created C:\Windows\ad405cn\ATLcom.dll 42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe File created C:\Windows\ad405cn\Update.exe 42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1972 2952 WerFault.exe 31 -
Modifies registry class 50 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4ADFB5F-F6D4-4D00-A88E-B785E2BD2391}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{64C80684-8B59-459F-BFCA-356E28D79688}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B05CB5FE-1E22-43C7-93E2-4CF04C87B3CC}\ = "bhoRay2009 Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ATLcom.bhoRay2009 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ATLcom.bhoRay2009\CLSID\ = "{B05CB5FE-1E22-43C7-93E2-4CF04C87B3CC}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4ADFB5F-F6D4-4D00-A88E-B785E2BD2391}\1.0\ = "ATLcom 1.0 ÀàÐÍ¿â" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4ADFB5F-F6D4-4D00-A88E-B785E2BD2391}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{DDD096FC-ADD6-4914-BCF7-4976E7BC66C9} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\ATLcom.DLL regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64C80684-8B59-459F-BFCA-356E28D79688}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4ADFB5F-F6D4-4D00-A88E-B785E2BD2391}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4ADFB5F-F6D4-4D00-A88E-B785E2BD2391}\1.0\HELPDIR\ = "C:\\Windows\\ad405cn" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64C80684-8B59-459F-BFCA-356E28D79688}\TypeLib\ = "{B4ADFB5F-F6D4-4D00-A88E-B785E2BD2391}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ATLcom.bhoRay2009\ = "bhoRay2009 Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B05CB5FE-1E22-43C7-93E2-4CF04C87B3CC}\InprocServer32\ = "C:\\Windows\\ad405cn\\ATLcom.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4ADFB5F-F6D4-4D00-A88E-B785E2BD2391}\1.0\0\win32\ = "C:\\Windows\\ad405cn\\ATLcom.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64C80684-8B59-459F-BFCA-356E28D79688}\ = "IbhoRay2009" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B05CB5FE-1E22-43C7-93E2-4CF04C87B3CC}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B05CB5FE-1E22-43C7-93E2-4CF04C87B3CC}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{64C80684-8B59-459F-BFCA-356E28D79688}\ = "IbhoRay2009" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{64C80684-8B59-459F-BFCA-356E28D79688}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{64C80684-8B59-459F-BFCA-356E28D79688}\TypeLib\ = "{B4ADFB5F-F6D4-4D00-A88E-B785E2BD2391}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B05CB5FE-1E22-43C7-93E2-4CF04C87B3CC}\TypeLib\ = "{B4ADFB5F-F6D4-4D00-A88E-B785E2BD2391}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64C80684-8B59-459F-BFCA-356E28D79688} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B05CB5FE-1E22-43C7-93E2-4CF04C87B3CC}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{64C80684-8B59-459F-BFCA-356E28D79688} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\ATLcom.DLL\AppID = "{DDD096FC-ADD6-4914-BCF7-4976E7BC66C9}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ATLcom.bhoRay2009\CurVer\ = "ATLcom.bhoRay2009.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B05CB5FE-1E22-43C7-93E2-4CF04C87B3CC}\ProgID\ = "ATLcom.bhoRay2009.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4ADFB5F-F6D4-4D00-A88E-B785E2BD2391} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B05CB5FE-1E22-43C7-93E2-4CF04C87B3CC}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ATLcom.bhoRay2009\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B05CB5FE-1E22-43C7-93E2-4CF04C87B3CC}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{DDD096FC-ADD6-4914-BCF7-4976E7BC66C9}\ = "ATLcom" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ATLcom.bhoRay2009\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4ADFB5F-F6D4-4D00-A88E-B785E2BD2391}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4ADFB5F-F6D4-4D00-A88E-B785E2BD2391}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4ADFB5F-F6D4-4D00-A88E-B785E2BD2391}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{64C80684-8B59-459F-BFCA-356E28D79688}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64C80684-8B59-459F-BFCA-356E28D79688}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64C80684-8B59-459F-BFCA-356E28D79688}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ATLcom.bhoRay2009.1\ = "bhoRay2009 Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ATLcom.bhoRay2009.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B05CB5FE-1E22-43C7-93E2-4CF04C87B3CC}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{64C80684-8B59-459F-BFCA-356E28D79688}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64C80684-8B59-459F-BFCA-356E28D79688}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ATLcom.bhoRay2009.1\CLSID\ = "{B05CB5FE-1E22-43C7-93E2-4CF04C87B3CC}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B05CB5FE-1E22-43C7-93E2-4CF04C87B3CC} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B05CB5FE-1E22-43C7-93E2-4CF04C87B3CC}\VersionIndependentProgID\ = "ATLcom.bhoRay2009" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ATLcom.bhoRay2009.1 regsvr32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2440 iePlayer.exe 2440 iePlayer.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2524 2988 42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe 30 PID 2988 wrote to memory of 2524 2988 42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe 30 PID 2988 wrote to memory of 2524 2988 42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe 30 PID 2988 wrote to memory of 2524 2988 42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe 30 PID 2988 wrote to memory of 2524 2988 42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe 30 PID 2988 wrote to memory of 2524 2988 42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe 30 PID 2988 wrote to memory of 2524 2988 42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe 30 PID 2988 wrote to memory of 2952 2988 42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe 31 PID 2988 wrote to memory of 2952 2988 42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe 31 PID 2988 wrote to memory of 2952 2988 42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe 31 PID 2988 wrote to memory of 2952 2988 42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe 31 PID 2988 wrote to memory of 2440 2988 42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe 32 PID 2988 wrote to memory of 2440 2988 42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe 32 PID 2988 wrote to memory of 2440 2988 42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe 32 PID 2988 wrote to memory of 2440 2988 42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe 32 PID 2440 wrote to memory of 2900 2440 iePlayer.exe 34 PID 2440 wrote to memory of 2900 2440 iePlayer.exe 34 PID 2440 wrote to memory of 2900 2440 iePlayer.exe 34 PID 2440 wrote to memory of 2900 2440 iePlayer.exe 34 PID 2900 wrote to memory of 2228 2900 wscript.exe 35 PID 2900 wrote to memory of 2228 2900 wscript.exe 35 PID 2900 wrote to memory of 2228 2900 wscript.exe 35 PID 2900 wrote to memory of 2228 2900 wscript.exe 35 PID 2900 wrote to memory of 2228 2900 wscript.exe 35 PID 2900 wrote to memory of 2228 2900 wscript.exe 35 PID 2900 wrote to memory of 2228 2900 wscript.exe 35 PID 2952 wrote to memory of 1972 2952 info2asp.exe 37 PID 2952 wrote to memory of 1972 2952 info2asp.exe 37 PID 2952 wrote to memory of 1972 2952 info2asp.exe 37 PID 2952 wrote to memory of 1972 2952 info2asp.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\42d715fcf1e4150a6e470a742de66f8e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\ad405cn\Update.exeC:\Windows\ad405cn\Update.exe 11C454014FFDA493E62DBFFAE914C42A578E3EFDE155E8D180AFAE28B8137F369681EE45A169D55C598714732⤵
- Executes dropped EXE
PID:2524
-
-
C:\Windows\ad405cn\info2asp.exeC:\Windows\ad405cn\info2asp.exe 11C454014FFDA493E62DBFFAE914C42A578E3EFDE155E8D180AFAE28B8137F369681EE45A169D55C598714732⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 4123⤵
- Loads dropped DLL
- Program crash
PID:1972
-
-
-
C:\Windows\ad405cn\iePlayer.exeC:\Windows\ad405cn\iePlayer.exe 11C454014FFDA493E62DBFFAE914C42A578E3EFDE155E8D180AFAE28B8137F369681EE45A169D55C598714732⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\wscript.exewscript.exe C:\Windows\ad405cn\abc.js //B3⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s C:\Windows\ad405cn\ATLcom.dll4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2228
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD5091e7dd2d69fdb89057f3f27c1f63a22
SHA1c33974665c98038699ee4498aa69ff3aedfa0913
SHA2563cdc7bc6dd5c3e43b9a70e4ca74776b1825056eb3d84ff19279c3c4edf7e1be0
SHA512db38b0dec47ec5aa7ef0de377e2b95087c2449af7fd9a7fab30d63f5f80ed6840f79c1b3794bed9e39d4c3e869e82f7c6417152a21fae9a48b83bfdb1e65dd50
-
Filesize
1KB
MD55ef5c6e471cd3c8e7ac5c8767d732f73
SHA12e70e28834e62e736455e74b3aab61ab747f3e7b
SHA25676b8f3d04c8910014cbdd35a62990d0781d4e2ebce3c3f58fd6480a1166504be
SHA5121a3fd6cb5a715ac4d50a3fe82df3068110c42c79d6e4dd83b478f29d99587c5ce30388f9a49b1214f5bcfcd90adf2a7c76cf3f4237918cf43e9fc879b9a89be6
-
Filesize
56KB
MD54012770c24355d473f3204da2c417294
SHA150f7da5120f0dd95dfa8c227cee0717aa135b03c
SHA256b4424e0a30e08f71504efc7359a8a2bfb489b307013337f2c6d9880f1695eda0
SHA512bb14469d97bda5fceee428ab965f2e571988a675ed0bfe57768cb6bedbc60a56dccae8594c8b6b44a9f16794eb7fc600b44923c28bca7b99989af9d77656d263
-
Filesize
66KB
MD5e4f5bdf0ed0c9d4a934138c63f4b25b5
SHA1c9a9c17a2563843d690155705d2818b14dbaf4da
SHA256dd0069710a395ef2e05dc5972db2881a1cd8d1ed4bae41bad1e538f939150b96
SHA512e3335ee44705e57dd1ac1d43c10d677b4412e2cdaa1c8f8cd438a0a6498f5596a86d1e1c5ef76db45678dc118f9b6bf6f9a90e04cc238554d0ace9f2b6f2c721
-
Filesize
41KB
MD5239cf0c432acfa6e2aa4c2a16a39bc0f
SHA126824ce5ee668dc16786341690566704486245ac
SHA256f81b69a0dd1b546c7b15d13eb47058c9156f7f98ceb936e05c7a7b0b7d847a6b
SHA512977454187a73e0dfba1fd6f95b6ea5c85bd9160d16dad6f607aad2ebbd44c12320147d593ce09ddcd95a60f809ca73564b7f831561a671050afda41b99e159e8