Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
64ad3fbf31657091b2dbddc095752b3e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
64ad3fbf31657091b2dbddc095752b3e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
64ad3fbf31657091b2dbddc095752b3e_JaffaCakes118.exe
-
Size
251KB
-
MD5
64ad3fbf31657091b2dbddc095752b3e
-
SHA1
1ddd280954e9a50460e91f8ef2edbd50a897e4d4
-
SHA256
815ce88eb9a6faa9bd1447651c34e593b4fe6bcf186b6953411392f607969764
-
SHA512
16fd8d7b784958b4b8c968d519fa67e38939f4c99edc46514972f701464b97da2b3db21b627fd1da651f6f26f517bc9be926d2276196a50fea2739dbe92a2e58
-
SSDEEP
3072:GY0yj4Gi3dDlp67pX6LG2Nexysk758vf3F2TEDCfjab4nRVOhRUv9qPbwPlclusb:GY94N5mwLeFoEDC7NRw2zNclusKPbS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation rinst.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 64ad3fbf31657091b2dbddc095752b3e_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 4136 rinst.exe 872 Nuke IP Death.exe 1596 jabcora.exe -
Loads dropped DLL 5 IoCs
pid Process 1596 jabcora.exe 872 Nuke IP Death.exe 1596 jabcora.exe 1596 jabcora.exe 4772 64ad3fbf31657091b2dbddc095752b3e_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\jabcora = "C:\\WINDOWS\\System\\jabcora.exe" jabcora.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A} jabcora.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ = "PK IE Plugin" jabcora.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\WINDOWS\System\rinst.exe rinst.exe File opened for modification C:\WINDOWS\System\pk.bin jabcora.exe File created C:\WINDOWS\System\pk.bin rinst.exe File created C:\WINDOWS\System\jabcora.exe rinst.exe File created C:\WINDOWS\System\jabcorahk.dll rinst.exe File created C:\WINDOWS\System\jabcorawb.dll rinst.exe File created C:\WINDOWS\System\inst.dat rinst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CLSID jabcora.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A} jabcora.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\VersionIndependentProgID\ = "PK.IE" jabcora.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\0\win32 jabcora.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\HELPDIR jabcora.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib jabcora.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A} jabcora.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CurVer\ = "PK.IE.1" jabcora.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\InprocServer32\ = "C:\\WINDOWS\\System\\jabcorawb.dll" jabcora.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\TypeLib jabcora.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\ = "{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}" jabcora.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A} jabcora.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\ = "{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}" jabcora.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\Version = "1.0" jabcora.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ = "IViewSource" jabcora.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" jabcora.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib jabcora.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE jabcora.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ = "IE Plugin Class" jabcora.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\FLAGS jabcora.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\FLAGS\ = "0" jabcora.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\0\win32\ = "C:\\WINDOWS\\System\\jabcorawb.dll" jabcora.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\HELPDIR\ = "C:\\WINDOWS\\System\\" jabcora.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ = "IViewSource" jabcora.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1 jabcora.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1\CLSID\ = "{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}" jabcora.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A} jabcora.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" jabcora.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\ = "IE Class" jabcora.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ProgID\ = "PK.IE.1" jabcora.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\Programmable jabcora.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\InprocServer32 jabcora.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\InprocServer32\ThreadingModel = "Apartment" jabcora.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ProgID jabcora.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32 jabcora.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1\ = "IE Plugin Class" jabcora.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0 jabcora.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\0 jabcora.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\Version = "1.0" jabcora.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1\CLSID jabcora.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CLSID\ = "{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}" jabcora.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CurVer jabcora.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\VersionIndependentProgID jabcora.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\ = "BPK IE Plugin Type Library" jabcora.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32 jabcora.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\ = "{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}" jabcora.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1596 jabcora.exe 1596 jabcora.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 872 Nuke IP Death.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe 1596 jabcora.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4772 wrote to memory of 4136 4772 64ad3fbf31657091b2dbddc095752b3e_JaffaCakes118.exe 84 PID 4772 wrote to memory of 4136 4772 64ad3fbf31657091b2dbddc095752b3e_JaffaCakes118.exe 84 PID 4772 wrote to memory of 4136 4772 64ad3fbf31657091b2dbddc095752b3e_JaffaCakes118.exe 84 PID 4136 wrote to memory of 872 4136 rinst.exe 87 PID 4136 wrote to memory of 872 4136 rinst.exe 87 PID 4136 wrote to memory of 872 4136 rinst.exe 87 PID 4136 wrote to memory of 1596 4136 rinst.exe 88 PID 4136 wrote to memory of 1596 4136 rinst.exe 88 PID 4136 wrote to memory of 1596 4136 rinst.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\64ad3fbf31657091b2dbddc095752b3e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\64ad3fbf31657091b2dbddc095752b3e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Nuke IP Death.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Nuke IP Death.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:872
-
-
C:\WINDOWS\System\jabcora.exeC:\WINDOWS\System\jabcora.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1596
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD54af544316c0e73801624faeea2b4307f
SHA14c6d62b53d453294c22fe04202e2f35daf42e473
SHA2566781d92f199f3e02ebc5c58ad164b1cca802d3981b097b646e927875a5bab22c
SHA51206ac238046af45d4c589f181f432742513bb63c06591035e57db065f07ed84c3ab1b988a33d3d17ccf7036e635de8bc7862b8e077add767a56067a3dfa5e49c6
-
Filesize
996B
MD5e0064d12f42d1148602d926b4c4f34ff
SHA1cae23d6c8700ebd3751a80fc534a85ec8c33bd03
SHA256fce967be78fd4bf66284b40e920624b4e9ce81df551700f86399f021da0b3a21
SHA512278d92c7e896ee94276af4f1eb33937047127ba9fede27aa7edf09d24fa2f88e2e0ce36e40a041dd7f2507b45d8c2187b1411ea20e2d0f7d05fd3c85ff1084f5
-
Filesize
428KB
MD52cf8e7033db4057911b9ec1c9ac6d27f
SHA13ed68e186fcb19be3c51161523f154f08cde4253
SHA256654364ea9de26a05955645e7b95959a3d83fcc34a663c7acee2e273651eaa0db
SHA512fd599ce97e267c1fdb468316e640d31778eaab39aa2f3d7355b3fd7bf3ec268fc3d654d22f71ec38c8d8f501b5278ebd44a3fb71b9b5813cd376e71c227cd777
-
Filesize
24KB
MD56f48b9bbd868ff24f7f1dfc2c57db79b
SHA1f71a063b93c248a6dd146472b3b00663f05a68e8
SHA25691a92522b953d0713d83a4fe073e71baf2a183ff83146722e7a88afbf48d24b6
SHA51294f10cfcd38bca608b2f79e2183205b7e66702dcf5b9388c02a1941faa9a95224c5fe169e67c58b7204b70783f162f38446b8fee289501c9bfc3469e7cc97ef7
-
Filesize
40KB
MD5669104f155e1bb1c984af74b0edd20cc
SHA18a7efce57c128b121bfbbef9244289a3552add2d
SHA256017f905690e343762ffd8369c0fad8c9a41e07a25f595ab316a02745af888fdf
SHA512ee519fb75170fe1982a3806ffd5d98732cbb76349024b9183741dfae1f462a669a3f2ac1288730f0d55fd0f0937dc246734b42e9e581fa91f460c37385884b20
-
Filesize
4KB
MD5f2a0fc2f227ec1613f9791e80b50206c
SHA101b3d167a2817d98f7edfcfa2fd41a588eb5603a
SHA256b587bf0c48bbc8420f43482d2451812d635e71a81273a34d4c2cdbac7ad8fac2
SHA512e149dad9d1ed3e12a3c79c0762d36d74c43fded4f5cca0ac4e997f3856670082baf6082e90c0a77ef8fe96c933109191bbc9132fd287c0fb272f7ba5700ab301
-
Filesize
7KB
MD5a455ca431e66975d886f1a8cfee8cb9f
SHA195868529973c77199b76ec593a686d9b324dee8b
SHA2566bba0b8d8bf03ba15828c53e72d83d766e44b3238b55ab75348d8ce93bfd0056
SHA51253e0c4edf9d91ebdea04bfb343c568190eaaeb066bc6742262f1e5943d2b27c375e1eca483419ae8753138dc2131c9d3c7742812c16863689c3bb266057c0531
-
Filesize
24KB
MD558129986fa29f6dacd99ab45f60bcb3c
SHA17f21995794a060fc8629e0d113cf568de14c509e
SHA256525414ffe5f797ebdd7de5620b75ff723de17bf8f399ffcd7ddec2d0b8a5dc4a
SHA51262ade2d2eb41cd99dcd9f6d66e7966d129be20551faadcf827558e85d669f885ad144d10a87c3be7faed08103b86ab523fb6756b44f9e0ba77cdff586214701a
-
Filesize
40KB
MD52e6016325548ab79e2d636640c6ec473
SHA1586e2b84d46ef00e26c1686033def28e8a9995a5
SHA25662e2948c3e3857e8304a657b7e7da30cdcb6842f71bd4c678a1734ebbf17198e
SHA5121dc89b9e15f5835dff3203e278f000df5c0d8d93cbef5059be3f1024ef1e16ae8087a4f8e1131b20b190942984e9dc6079dfe951a52de7f4d4ad7de8721a0e86
-
Filesize
4KB
MD5795e512f8713fa3a9214d1ea874fe8ab
SHA1060c974cbea54847ff61bd47a409d0c37bc41fdb
SHA2568c7daeae0c41d9666eec78a1fbcfa1c72de360aaaea12f10bf587e56dadd790a
SHA512065e8efa54c827ec5232fc508794198d489e48868cfb71c54d7d453becc49db8a7ac21b2d424757906d69b74ba5911e37b07ea65f76393253ff4b20099b5d016
-
Filesize
428KB
MD5bae0fb25bcf05a5da7fde8dce759ee0d
SHA1bc74b07d14a63ce572755c70ceb796136d129e20
SHA256b966953b0a0e0bf648b1043b4e708445b52b020a0485921138bbf3be58d9995d
SHA51274a61f7712df39194b2cb77186231d5960b8bfc5b37abdf20c357471a4e8dd8a8e648161cda7b1c8ee01d422926e3b30fd5ec9c6ebbf589a4feeaeba99ca2929