Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 06:24
Static task
static1
Behavioral task
behavioral1
Sample
5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe
-
Size
160KB
-
MD5
5f5e9142cd34707794908a7258331afd
-
SHA1
d5436005d27d2d14c1559b7e2083d67227537b2e
-
SHA256
ea364eb1a0a45b78b3f8ebe9273cbafa3e3fc9a2f98264eec22d1f95133f4e85
-
SHA512
392cd2be11f4b27440a7073b71040f0d00b055e695a99a14e97fb75d858a75975da2b2e351eaab2b00f6037ce4ca8ded8e53d6eb22797508f22f37864e12cc1a
-
SSDEEP
3072:T0ACXtCQzFG1jcFjMwWQHwbM4IDmQavl0T:T0AUCs4FwWJg4IDmnvW
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "1" 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\dao.ico 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe -
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\TYPEDURLS 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "Microsoft Internet Explorer" 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Window Title = "Microsoft Internet Explorer" 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.ccc7.com" 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://www.ccc7.com" 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe -
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\Open(&O)\Command\ = "iexplore.exe http://www.ccc7.com" 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\ShellFolder\WantsParseDisplayName 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8} 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\DefaultIcon 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ÊôÐÔ(&R) 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ÖØÃüÃû(&M) 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\ShellFolder 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Pz\9 = "0" 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\ShellFolder\Attributes = "0" 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\Open(&O) 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Pz 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\Open(&O)\Command 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ÊôÐÔ(&R)\Command\ = "Rundll32.exe Shell32.dll,Control_RunDLL Inetcpl.cpl" 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ÖØÃüÃû(&M)\Command 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ÖØÃüÃû(&M)\Command\ = "Rundll32.exe" 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Pz\1 = "20240720" 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Pz\5 = "51" 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\ = "Internet Explorer" 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\ShellFolder\HideFolderVerbs 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\Open(&O)\ = "´ò¿ªÖ÷Ò³(&H)" 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Pz\9 = "1" 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\DefaultIcon\ = "C:\\Program Files (x86)\\Internet Explorer\\IEXPLORE.EXE" 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ɾ³ý(&D)\Command 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\ShellFolder\HideOnDesktopPerUser 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ÊôÐÔ(&R)\Command 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ɾ³ý(&D) 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ɾ³ý(&D)\Command\ = "Rundll32.exe" 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4992 wrote to memory of 1396 4992 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe 84 PID 4992 wrote to memory of 1396 4992 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe 84 PID 4992 wrote to memory of 1396 4992 5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\5f5e9142cd34707794908a7258331afd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\5f5e9142cd34707794908a7258331afd_JaffaCakes118.exe2⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:1396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD51a7a94ae60fda590bb97e9ed69a08b88
SHA1192fc32babb2e2f64e0787f05aaace1a9a544f11
SHA256ccd614a99b1cc6995f4d1e5b7ce6fa735ea5965d05e676f20ccba11393cef5be
SHA5120517bc96ff81f6f3ded3fb728f5ca723e4ad0f2c39bca47d6a28aa3ca108dcaa502fabaccb697e041d6e1a33c5804e59bd2189dcea1bed13297666a830cb33d2
-
Filesize
347B
MD5c0510927bb4b1821335e14fa0d90fc88
SHA1026ec30913b31f8cbd28261e25410da139763db8
SHA25640a3d8ac06c7191adabc936f2809192d3fb88421f9509a8b8a5c82181b411005
SHA512327eaa26ffb776bda65720d39ee906ccfe38017fd39a3f9e46fa91559d231226eb408cee58fe88240607206e813f3aaf26e9bb730c35d36041cd1fbc26745053