Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 09:38
Static task
static1
Behavioral task
behavioral1
Sample
45447659f2729d59f8ccf8754c5a1f6c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
45447659f2729d59f8ccf8754c5a1f6c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
45447659f2729d59f8ccf8754c5a1f6c_JaffaCakes118.exe
-
Size
18KB
-
MD5
45447659f2729d59f8ccf8754c5a1f6c
-
SHA1
2bfe87fc470ffbef7c3496a6dad75e1a735b2ffe
-
SHA256
ebf480a412696b0518b3c4aa1cc8b7a0133cf688421fbcd70ec57bf76b6b9432
-
SHA512
de2f5f29b58f316be83a99cb06dfdbe05b81e7f61207122de490ace1b3e2dd83be1e4be0eef73988e09d84072ac38262763e914556e5f7971645477c01b99244
-
SSDEEP
384:+3v8xikYTJkk22+RsgW6HcbWLoJjUpMHToRUTYOtUAblcrDY:+kvr12eFpHcbLxUpM+ByKrDY
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\isamonitor.exe = "C:\\Program Files (x86)\\Internet Security\\isamonitor.exe" isamonitor.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer\run isamonitor.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation 45447659f2729d59f8ccf8754c5a1f6c_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 4868 isamonitor.exe 3948 isamini.exe -
Loads dropped DLL 1 IoCs
pid Process 4868 isamonitor.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects isamonitor.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{67982BB7-0F95-44C5-92DC-E3AF3DC19D6D} isamonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{67982BB7-0F95-44C5-92DC-E3AF3DC19D6D}\ isamonitor.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Security\isauninst.exe 45447659f2729d59f8ccf8754c5a1f6c_JaffaCakes118.exe File created C:\Program Files (x86)\Internet Security\isamonitor.exe 45447659f2729d59f8ccf8754c5a1f6c_JaffaCakes118.exe File created C:\Program Files (x86)\Internet Security\isaddon.dll isamonitor.exe File created C:\Program Files (x86)\Internet Security\isamini.exe isamonitor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Microsoft\Internet Explorer\Main isamonitor.exe Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Microsoft\Internet Explorer\Search isamonitor.exe Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Microsoft\Internet Explorer\SearchUrl isamonitor.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{67982BB7-0F95-44C5-92DC-E3AF3DC19D6D} isamonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{67982BB7-0F95-44C5-92DC-E3AF3DC19D6D}\ isamonitor.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{67982BB7-0F95-44C5-92DC-E3AF3DC19D6D}\InprocServer32 isamonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{67982BB7-0F95-44C5-92DC-E3AF3DC19D6D}\InprocServer32\ = "C:\\Program Files (x86)\\Internet Security\\isaddon.dll" isamonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{67982BB7-0F95-44C5-92DC-E3AF3DC19D6D}\InprocServer32\ThreadingModel = "Apartment" isamonitor.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID isamonitor.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 720 45447659f2729d59f8ccf8754c5a1f6c_JaffaCakes118.exe 720 45447659f2729d59f8ccf8754c5a1f6c_JaffaCakes118.exe 4868 isamonitor.exe 4868 isamonitor.exe 3948 isamini.exe 3948 isamini.exe 3948 isamini.exe 4868 isamonitor.exe 3948 isamini.exe 4868 isamonitor.exe 4868 isamonitor.exe 4868 isamonitor.exe 3948 isamini.exe 3948 isamini.exe 3948 isamini.exe 4868 isamonitor.exe 3948 isamini.exe 4868 isamonitor.exe 3948 isamini.exe 4868 isamonitor.exe 3948 isamini.exe 4868 isamonitor.exe 4868 isamonitor.exe 3948 isamini.exe 4868 isamonitor.exe 3948 isamini.exe 4868 isamonitor.exe 4868 isamonitor.exe 3948 isamini.exe 3948 isamini.exe 4868 isamonitor.exe 3948 isamini.exe 3948 isamini.exe 4868 isamonitor.exe 4868 isamonitor.exe 4868 isamonitor.exe 3948 isamini.exe 3948 isamini.exe 4868 isamonitor.exe 3948 isamini.exe 4868 isamonitor.exe 3948 isamini.exe 4868 isamonitor.exe 3948 isamini.exe 4868 isamonitor.exe 3948 isamini.exe 4868 isamonitor.exe 3948 isamini.exe 4868 isamonitor.exe 3948 isamini.exe 4868 isamonitor.exe 3948 isamini.exe 4868 isamonitor.exe 3948 isamini.exe 4868 isamonitor.exe 3948 isamini.exe 3948 isamini.exe 4868 isamonitor.exe 3948 isamini.exe 4868 isamonitor.exe 3948 isamini.exe 4868 isamonitor.exe 4868 isamonitor.exe 3948 isamini.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 720 45447659f2729d59f8ccf8754c5a1f6c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 720 wrote to memory of 4868 720 45447659f2729d59f8ccf8754c5a1f6c_JaffaCakes118.exe 86 PID 720 wrote to memory of 4868 720 45447659f2729d59f8ccf8754c5a1f6c_JaffaCakes118.exe 86 PID 720 wrote to memory of 4868 720 45447659f2729d59f8ccf8754c5a1f6c_JaffaCakes118.exe 86 PID 4868 wrote to memory of 3948 4868 isamonitor.exe 87 PID 4868 wrote to memory of 3948 4868 isamonitor.exe 87 PID 4868 wrote to memory of 3948 4868 isamonitor.exe 87 PID 720 wrote to memory of 1916 720 45447659f2729d59f8ccf8754c5a1f6c_JaffaCakes118.exe 89 PID 720 wrote to memory of 1916 720 45447659f2729d59f8ccf8754c5a1f6c_JaffaCakes118.exe 89 PID 720 wrote to memory of 1916 720 45447659f2729d59f8ccf8754c5a1f6c_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\45447659f2729d59f8ccf8754c5a1f6c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\45447659f2729d59f8ccf8754c5a1f6c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Program Files (x86)\Internet Security\isamonitor.exe"C:\Program Files (x86)\Internet Security\isamonitor.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Program Files (x86)\Internet Security\isamini.exe"C:\Program Files (x86)\Internet Security\isamini.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3948
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\454476~1.EXE > nul2⤵PID:1916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD597fef948eb337717c83af924e699cf69
SHA16f4eadd23e9212eab8b2b1920c8c3a0288f41c45
SHA256d7b1576fa03f650eca3b53c713e6a396b2b477e938b2bedf258a42123cd6c0ca
SHA5124ab79aad17a21fcfaf28b44395b79986f229d73eda813b4e1100e7044eb83f65459dcd56a62f4d921505c08e6ef68d3a982ad03d68b81be63b114ca85ae4f24d
-
Filesize
6KB
MD5944f7d04bda8aaa7ce79b4287d3fd395
SHA1c65126d87de1a78a75757bfbc4a50e8234bb1b93
SHA256c01400b3302c0a9c4cdd6f5cc6450523809ab5d5738709a0d46fbab786a898ba
SHA51208ff2cb4700146d9bd2a1333de7e70281196b731a8706e8d818880572fa7f60f28fe06d12e56194f8495029b4cd22e754a32dcfef2071b43491dea872f6e8674
-
Filesize
34KB
MD5bb03ea39a32fafcff4c8b6b86b1d1e80
SHA1f43c3d99da70040faa205f139ee9ab709e9b324f
SHA2568c9a2d107eb6b3cb5635a2785d1d124878fe9a0fdccf81f28125a859c7ef2e16
SHA512771acd56ff6e239a95710eb508441fb6924439fa191de24faea0d921081f8d2977a8d4101c3a280843a7338d756dd991dc59b23ef9a3d442e030f88b7b5cf512