Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 03:14
Behavioral task
behavioral1
Sample
440f9131d1a3615aa10836424b4d3134_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
440f9131d1a3615aa10836424b4d3134_JaffaCakes118.exe
-
Size
249KB
-
MD5
440f9131d1a3615aa10836424b4d3134
-
SHA1
0f1353fd4ac77e4c98903b710870bb2067835c0d
-
SHA256
d40f089fa61aedc4658f041eb95d91d404f52b432b96b696e91854c7a970e86e
-
SHA512
45ec3693537f10c13c3f1037334041be4adffc54332837f7a41f4e744bdcd15b3bfa54dd9c1b156346cdd2fcb73dc244f3ec7b9818fbc165426191ea9bce5da6
-
SSDEEP
6144:pPi2fsaw6DaWVrDK04HPHylBRgINp0Vgj:Upwm4K9PHUQEp08
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SVCH0ST.EXE -
resource yara_rule behavioral1/files/0x0006000000018bbf-6.dat aspack_v212_v242 behavioral1/files/0x0008000000018d48-21.dat aspack_v212_v242 -
Executes dropped EXE 2 IoCs
pid Process 1988 system.exe 2656 SVCH0ST.EXE -
Loads dropped DLL 5 IoCs
pid Process 2316 440f9131d1a3615aa10836424b4d3134_JaffaCakes118.exe 2316 440f9131d1a3615aa10836424b4d3134_JaffaCakes118.exe 1988 system.exe 1988 system.exe 1988 system.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files\Common Files\System\Default64.SFX 440f9131d1a3615aa10836424b4d3134_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\System\Default64.SFX 440f9131d1a3615aa10836424b4d3134_JaffaCakes118.exe File created C:\Program Files\NetMeeting\system.exe 440f9131d1a3615aa10836424b4d3134_JaffaCakes118.exe File created C:\Program Files\NetMeeting\nmasu.dll system.exe File created C:\Program Files\Messenger\SVCH0ST.EXE system.exe File created C:\Program Files (x86)\Common Files\system\taobao.ico SVCH0ST.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TBFILES\shell SVCH0ST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\117FIle\DefaultIcon\ = "%SystemRoot%\\SysWow64\\shell32.dll,28" SVCH0ST.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\117FIle\shell\open\command SVCH0ST.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\117FIle\shell SVCH0ST.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1 SVCH0ST.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TBFILES\shell\open\command SVCH0ST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\117FIle\ = "FILEINFO" SVCH0ST.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\117FIle\shell\open SVCH0ST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\117FIle\shell\open\command\ = "C:\\Program Files\\NetMeeting\\system.exe" SVCH0ST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\ = "TBFILES" SVCH0ST.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEFILES SVCH0ST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEFILES\ = "Internet Explorer" SVCH0ST.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEFILES\shell\open\command SVCH0ST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.117\ = "117FIle" SVCH0ST.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TBFILES SVCH0ST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TBFILES\ = "Internet Explorer" SVCH0ST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TBFILES\DefaultIcon\ = "C:\\Program Files (x86)\\Common Files\\system\\taobao.ico" SVCH0ST.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ie SVCH0ST.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\117FIle\DefaultIcon SVCH0ST.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TBFILES\DefaultIcon SVCH0ST.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEFILES\shell SVCH0ST.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\117FIle SVCH0ST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEFILES\DefaultIcon\ = "C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe" SVCH0ST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEFILES\shell\open\command\ = "C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe http://%w%w%w.22%qi.%com" SVCH0ST.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.117 SVCH0ST.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TBFILES\shell\open SVCH0ST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TBFILES\shell\open\command\ = "C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe http://%w%w%w.22%qi.%com/%t%a%o%b%a%o.h%t%ml" SVCH0ST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ie\ = "IEFILES" SVCH0ST.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEFILES\DefaultIcon SVCH0ST.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEFILES\shell\open SVCH0ST.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1988 system.exe 1988 system.exe 2656 SVCH0ST.EXE 2656 SVCH0ST.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1988 system.exe 1988 system.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2316 wrote to memory of 1988 2316 440f9131d1a3615aa10836424b4d3134_JaffaCakes118.exe 30 PID 2316 wrote to memory of 1988 2316 440f9131d1a3615aa10836424b4d3134_JaffaCakes118.exe 30 PID 2316 wrote to memory of 1988 2316 440f9131d1a3615aa10836424b4d3134_JaffaCakes118.exe 30 PID 2316 wrote to memory of 1988 2316 440f9131d1a3615aa10836424b4d3134_JaffaCakes118.exe 30 PID 1988 wrote to memory of 2656 1988 system.exe 31 PID 1988 wrote to memory of 2656 1988 system.exe 31 PID 1988 wrote to memory of 2656 1988 system.exe 31 PID 1988 wrote to memory of 2656 1988 system.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\440f9131d1a3615aa10836424b4d3134_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\440f9131d1a3615aa10836424b4d3134_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files\NetMeeting\system.exe"C:\Program Files\NetMeeting\system.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files\Messenger\SVCH0ST.EXE"C:\Program Files\Messenger\SVCH0ST.EXE"3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201KB
MD51e0eb07e2e6f297a7b9384a2931e35b4
SHA18c5e568d4366ac33c45bc7b2264316c02fe14148
SHA2561e12ebd50990bada4dd8ae6e3a83b35d1cafb29e0cd819d139b7bbe2d7f87805
SHA51299a6cf9c3c4f7c794582836e472090609adf7b40a442d0e8eb6ffb94167009562d12eda627809ca41e9186864b2ff00229e2f8cf4ed051495f40cef5937b488a
-
Filesize
222KB
MD55446efc59699da00431c074ef7fa70fd
SHA193fc96aaca1a229476fcefe74903a2341268e897
SHA25602321c8072f8348c74ae79e4c0c4b098d074acea429a263ca257badedc01b80d
SHA512b3d9c6f3983e17b0e3aa1d891c5b24117e206e7d06a6de725cf2219769f26756d68e86fa8d06d6cb0b88ae43378001d1966169a587cda6d382513500c8a2b2dc
-
Filesize
249KB
MD5440f9131d1a3615aa10836424b4d3134
SHA10f1353fd4ac77e4c98903b710870bb2067835c0d
SHA256d40f089fa61aedc4658f041eb95d91d404f52b432b96b696e91854c7a970e86e
SHA51245ec3693537f10c13c3f1037334041be4adffc54332837f7a41f4e744bdcd15b3bfa54dd9c1b156346cdd2fcb73dc244f3ec7b9818fbc165426191ea9bce5da6