Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 09:12
Behavioral task
behavioral1
Sample
66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe
-
Size
80KB
-
MD5
66f6cc675747ea29354d217425461d2b
-
SHA1
fdf3bbcf4e6bed8bb1d2a720cc73dec79f1e847b
-
SHA256
57f40bafc8fc1f0b3efee13c49382b43c651b13e1db7b3ea7a20bc6bd3f402b7
-
SHA512
b8b977abbcb08f286971ceb1d467816121b030cb828113a63fa9e02ddffbedcceb93edc0ff4ad97a5e1b4bcffddb4153fca8fbe4cf07687034fbb34ffada5a6c
-
SSDEEP
1536:FQLnySgPuHzpak7EuvFd/Et6pirwzHZj7vaaXK5OQleMS49lQAiL3E8ccl:FQLnyS9HRAcWeiAHZjjauK5OQl44pyc
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1952 regsvr32.exe -
resource yara_rule behavioral1/memory/2412-0-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/2412-4-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{D88E1558-7C2D-407A-953A-C044F5607CEA}\NoExplorer = "1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{D88E1558-7C2D-407A-953A-C044F5607CEA} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{D88E1558-7C2D-407A-953A-C044F5607CEA}\ = "HelloWorldBHO" regsvr32.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Mjcore\Mjcore.dll 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosDate regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosDate 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe -
Modifies registry class 50 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\BHO_MyJavaCore.DLL\AppID = "{80EF304A-B1C4-425C-8535-95AB6F1EEFB8}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO_MyJavaCore.Mjcore.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO_MyJavaCore.Mjcore.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E0F01490-DCF3-4357-95AA-169A8C2B2190}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{17E44256-51E0-4D46-A0C8-44E80AB4BA5B}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88E1558-7C2D-407A-953A-C044F5607CEA}\ProgID\ = "BHO_MyJavaCore.Mjcore.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88E1558-7C2D-407A-953A-C044F5607CEA}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E0F01490-DCF3-4357-95AA-169A8C2B2190}\1.0\ = "BHO_MyJavaCore 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E0F01490-DCF3-4357-95AA-169A8C2B2190}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{17E44256-51E0-4D46-A0C8-44E80AB4BA5B} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO_MyJavaCore.Mjcore\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88E1558-7C2D-407A-953A-C044F5607CEA} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88E1558-7C2D-407A-953A-C044F5607CEA}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88E1558-7C2D-407A-953A-C044F5607CEA}\InprocServer32\ = "C:\\Program Files (x86)\\Mjcore\\Mjcore.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E0F01490-DCF3-4357-95AA-169A8C2B2190}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{17E44256-51E0-4D46-A0C8-44E80AB4BA5B}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{80EF304A-B1C4-425C-8535-95AB6F1EEFB8}\ = "BHO_MyJavaCore" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO_MyJavaCore.Mjcore regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{17E44256-51E0-4D46-A0C8-44E80AB4BA5B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88E1558-7C2D-407A-953A-C044F5607CEA}\ = "Mjcore Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E0F01490-DCF3-4357-95AA-169A8C2B2190}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E0F01490-DCF3-4357-95AA-169A8C2B2190}\1.0\0\win32\ = "C:\\Program Files (x86)\\Mjcore\\Mjcore.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{17E44256-51E0-4D46-A0C8-44E80AB4BA5B}\ = "IMjcore" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO_MyJavaCore.Mjcore\ = "Mjcore Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO_MyJavaCore.Mjcore\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88E1558-7C2D-407A-953A-C044F5607CEA}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{17E44256-51E0-4D46-A0C8-44E80AB4BA5B}\ = "IMjcore" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO_MyJavaCore.Mjcore\CurVer\ = "BHO_MyJavaCore.Mjcore.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{17E44256-51E0-4D46-A0C8-44E80AB4BA5B}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{80EF304A-B1C4-425C-8535-95AB6F1EEFB8} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E0F01490-DCF3-4357-95AA-169A8C2B2190}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88E1558-7C2D-407A-953A-C044F5607CEA}\VersionIndependentProgID\ = "BHO_MyJavaCore.Mjcore" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E0F01490-DCF3-4357-95AA-169A8C2B2190} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E0F01490-DCF3-4357-95AA-169A8C2B2190}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Mjcore" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{17E44256-51E0-4D46-A0C8-44E80AB4BA5B}\TypeLib\ = "{E0F01490-DCF3-4357-95AA-169A8C2B2190}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\BHO_MyJavaCore.DLL regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E0F01490-DCF3-4357-95AA-169A8C2B2190}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{17E44256-51E0-4D46-A0C8-44E80AB4BA5B}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO_MyJavaCore.Mjcore.1\ = "Mjcore Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88E1558-7C2D-407A-953A-C044F5607CEA}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88E1558-7C2D-407A-953A-C044F5607CEA}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88E1558-7C2D-407A-953A-C044F5607CEA}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D88E1558-7C2D-407A-953A-C044F5607CEA}\TypeLib\ = "{E0F01490-DCF3-4357-95AA-169A8C2B2190}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{17E44256-51E0-4D46-A0C8-44E80AB4BA5B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{17E44256-51E0-4D46-A0C8-44E80AB4BA5B} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{17E44256-51E0-4D46-A0C8-44E80AB4BA5B}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO_MyJavaCore.Mjcore.1\CLSID\ = "{D88E1558-7C2D-407A-953A-C044F5607CEA}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO_MyJavaCore.Mjcore\CLSID\ = "{D88E1558-7C2D-407A-953A-C044F5607CEA}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{17E44256-51E0-4D46-A0C8-44E80AB4BA5B}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{17E44256-51E0-4D46-A0C8-44E80AB4BA5B}\TypeLib\ = "{E0F01490-DCF3-4357-95AA-169A8C2B2190}" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2412 wrote to memory of 1912 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 31 PID 2412 wrote to memory of 1912 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 31 PID 2412 wrote to memory of 1912 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 31 PID 2412 wrote to memory of 1912 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 31 PID 2412 wrote to memory of 2176 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 33 PID 2412 wrote to memory of 2176 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 33 PID 2412 wrote to memory of 2176 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 33 PID 2412 wrote to memory of 2176 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 33 PID 2412 wrote to memory of 2300 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 35 PID 2412 wrote to memory of 2300 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 35 PID 2412 wrote to memory of 2300 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 35 PID 2412 wrote to memory of 2300 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 35 PID 2412 wrote to memory of 2060 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 37 PID 2412 wrote to memory of 2060 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 37 PID 2412 wrote to memory of 2060 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 37 PID 2412 wrote to memory of 2060 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 37 PID 2412 wrote to memory of 2624 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 39 PID 2412 wrote to memory of 2624 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 39 PID 2412 wrote to memory of 2624 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 39 PID 2412 wrote to memory of 2624 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 39 PID 2412 wrote to memory of 1952 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 41 PID 2412 wrote to memory of 1952 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 41 PID 2412 wrote to memory of 1952 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 41 PID 2412 wrote to memory of 1952 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 41 PID 2412 wrote to memory of 1952 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 41 PID 2412 wrote to memory of 1952 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 41 PID 2412 wrote to memory of 1952 2412 66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\66f6cc675747ea29354d217425461d2b_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c rmdir /S /Q "C:\Program Files (x86)\Insider\"2⤵PID:1912
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c rmdir /S /Q "C:\Program Files (x86)\Router\"2⤵PID:2176
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c rmdir /S /Q "C:\Program Files (x86)\JavaCore\"2⤵PID:2300
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c rmdir /S /Q "C:\Program Files (x86)\Eroca\"2⤵PID:2060
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c rmdir /S /Q "C:\Program Files (x86)\mjc\"2⤵PID:2624
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\Mjcore\Mjcore.dll"2⤵
- Checks BIOS information in registry
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
PID:1952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD57ef8c70f20b40dc8f9802993ce7ea1d1
SHA1ee021a3e1abd2f162407a81d93a649e6c3aae346
SHA256e811a54532d4fb244372b498fcfd15380a216d96e9083e53cb0672b91cadb489
SHA512f7378158cb82234b393bf053a7a1ab6498dfc9a3b79299b735d3cfc3ace6db2b362a41bca9acf529f862cd73bd2d6260393b90021735a6847e3ca33ea206e11f