Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 10:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe
Resource
win7-20240708-en
windows7-x64
9 signatures
150 seconds
General
-
Target
6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe
-
Size
99KB
-
MD5
6f495ca4f37f6c77e110e2ae804c9c08
-
SHA1
3da30d63003b11372b70c0bc4adc267d47c63659
-
SHA256
804b034fd0846d3037f452808d0f8a6322d4da81f42dc686bc2ddafe7a8f5fd1
-
SHA512
9a5daf360f779e86d727f095980d498bdf2129c59c53f12fa39e810be0946a3f99a70412f300b5d792a8314090a6c8e04b1469f5c0d45a72683370c338b3ec05
-
SSDEEP
3072:oxzukNo3QbZhED4CA8sy/zsVNH+iu0zW0:okSogbZt8dsfV
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Program Files\Internet Explorer\IEXPLORE.EXE = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE:*:Enabled:Internet Explorer" 6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\browser helper objects\{36DBC179-A19F-48F2-B16A-6A3E19B42A87} 6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\ipv6monl.dll 6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ipv6monl.dll 6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2364 set thread context of 2280 2364 6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Enable Browser Extensions = "yes" 6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{36DBC179-A19F-48F2-B16A-6A3E19B42A87}\InprocServer32\ = "C:\\Windows\\SysWow64\\ipv6monl.dll" 6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{36DBC179-A19F-48F2-B16A-6A3E19B42A87}\InprocServer32\ThreadingModel = "apartment" 6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{36DBC179-A19F-48F2-B16A-6A3E19B42A87} 6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{36DBC179-A19F-48F2-B16A-6A3E19B42A87} 6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{36DBC179-A19F-48F2-B16A-6A3E19B42A87}\InprocServer32 6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2280 6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2280 2364 6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe 30 PID 2364 wrote to memory of 2280 2364 6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe 30 PID 2364 wrote to memory of 2280 2364 6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe 30 PID 2364 wrote to memory of 2280 2364 6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe 30 PID 2364 wrote to memory of 2280 2364 6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe 30 PID 2364 wrote to memory of 2280 2364 6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\6f495ca4f37f6c77e110e2ae804c9c08_JaffaCakes118.exe2⤵
- Modifies firewall policy service
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2280
-