Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 16:40
Static task
static1
Behavioral task
behavioral1
Sample
4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe
-
Size
402KB
-
MD5
4a84e173a5ffa3e55d745b4e7527c466
-
SHA1
253d163638ab72f18e4b1ebd71295b996bdbb736
-
SHA256
6c152b0129287ca03477ac12b6df40ef46c7330df2e97197e841757578e0f5ac
-
SHA512
39a6517ae3878049e59e2500dfc47d37a8c71ed1fb4404875ed28a462d1ae7ea032cd0f3f2d28b1f302d14725fa542d5b839c3375a32a35dd3d98040f3435285
-
SSDEEP
12288:QozAKsPUXKIEhf/VrfQauuJgaSNk0tKX2Wa:DzNKftrfQDTkp
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{C3E9B20A-B7E2-4aab-9835-3C548937E46F} = "v2.10|Action=Allow|Active=TRUE|Dir=Out|Profile=Private|Profile=Public|App=C:\\Windows\\explorer.exe|Name=Windows Shell|Desc=Windows Shell Networking|" 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{B078B2B6-A878-44ff-9BCC-458257924F96} = "v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|Profile=Public|App=C:\\Windows\\explorer.exe|Name=Windows Explorer|" 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{92459C5E-D350-4cba-AA74-C8F989C9336F} = "v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|App=C:\\Windows\\explorer.exe|Name=Windows Explorer|" 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{7ACC6E87-8C12-4adb-91B7-EFC3F2F4705A} = "v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|Profile=Public|App=C:\\Windows\\explorer.exe|Name=Windows Explorer|" 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{B1A40E4F-58DB-490f-9D18-55B5194E8BD5} = "v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Private|Profile=Public|App=C:\\Windows\\explorer.exe|Name=Windows Explorer|" 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{77BE3E79-6E80-4212-8F05-80BBD9E2F270} = "v2.10|Action=Allow|Active=TRUE|Dir=In|Profile=Private|Profile=Public|App=C:\\Windows\\explorer.exe|Name=Windows Shell|Desc=Windows Shell Networking|" 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2624 netsh.exe -
Loads dropped DLL 1 IoCs
pid Process 3040 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/3040-5-0x0000000010000000-0x0000000010074000-memory.dmp upx behavioral1/memory/3040-9-0x0000000010000000-0x0000000010074000-memory.dmp upx behavioral1/memory/3040-11-0x0000000010000000-0x0000000010074000-memory.dmp upx behavioral1/memory/3040-17-0x0000000010000000-0x0000000010074000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{166A9954-E453-4571-9640-BD74F015B92f} 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\dsdmo32.dll 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\XMLHTTP_UUID_Default = 54996a1653e471459640bd74f015b92f 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\ToolBarPosition = "1721061812" 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Netwhywmax\CLSID\ = "{1e8a9da1-5723-4dbe-8dab-57231def7746}" 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-19\Software\Netwhywmax 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-20\Software\Netwhywmax 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Internet Explorer\Main\XMLHTTP_UUID_Default = 54996a1653e471459640bd74f015b92f 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Netwhywmax\CLSID 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-20 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-19\Software\Netwhywmax\CLSID 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Netwhywmax\CLSID\ = "{1e8a9da1-5723-4dbe-8dab-57231def7746}" 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-20\Software\Netwhywmax\CLSID 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Internet Explorer\Main\XMLHTTP_UUID_Default = 54996a1653e471459640bd74f015b92f 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Netwhywmax 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Netwhywmax\CLSID 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-19 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-19\Software 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-20\Software 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Netwhywmax\CLSID\ = "{1e8a9da1-5723-4dbe-8dab-57231def7746}" 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe -
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Netwhywmax 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{166A9954-E453-4571-9640-BD74F015B92f} 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Netwhywmax\CLSID 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_Classes\Software\Netwhywmax\CLSID 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Software\Netwhywmax 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.fsharproj\PersistentHandler 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{166A9954-E453-4571-9640-BD74F015B92f}\InprocServer32 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Netwhywmax\CLSID\ = "{1e8a9da1-5723-4dbe-8dab-57231def7746}" 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1e8a9da1-5723-4dbe-8dab-57231def7746} 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Software 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.fsharproj 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{166A9954-E453-4571-9640-BD74F015B92f}\InprocServer32\ = "C:\\Windows\\SysWow64\\dsdmo32.dll" 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Software\Netwhywmax\CLSID 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Software\Netwhywmax\CLSID\ = "{1e8a9da1-5723-4dbe-8dab-57231def7746}" 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.fsharproj\PersistentHandler\ = "{2c50c8c6-d037-4d5b-ba00-60e2905e37b4}" 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{166A9954-E453-4571-9640-BD74F015B92f}\InprocServer32\ThreadingModel = "Both" 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2624 3040 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe 30 PID 3040 wrote to memory of 2624 3040 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe 30 PID 3040 wrote to memory of 2624 3040 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe 30 PID 3040 wrote to memory of 2624 3040 4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4a84e173a5ffa3e55d745b4e7527c466_JaffaCakes118.exe"1⤵
- Modifies firewall policy service
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" firewall add allowedprogram program="C:\Windows\explorer.exe" name="Windows Shell" mode=ENABLE scope=ALL profile=ALL2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Browser Extensions
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235KB
MD5419857533f3f0c74b0b299b8b47afa25
SHA13dc83fdecd5c7af7961aeec3a9c94f710ad0520b
SHA256db3762b66e9d42b23d6cc2319fbb2bfe71779be1672c6df745d269f44e4ca7d3
SHA512c1ff07027fc4c24ae46e0a1715c92037032457760ddb4d9daa8754d98307b5ec978abcca90e25819ae4ff7d83166d354d53b67df84ef154ef9f3e243cdd91762