Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 03:21
Behavioral task
behavioral1
Sample
72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe
-
Size
62KB
-
MD5
72685cc8f3285f54e3750ffed7c15ad9
-
SHA1
46aa11f1c7f63bc491d9b22f1fba8ab6a1ffdede
-
SHA256
21f3d204a654504df437b0e7ef779e7614811120c7dedccc740a65f6ad92a44f
-
SHA512
821999ba849ef8ab358a027d5b7558920243a94121d655b637eaa352093879fa6bc9ecb4f85e8753af3706d2b0ee1b7fc447b91b9d1a475d9104816f2b92a459
-
SSDEEP
1536:C+RIrvL2NCYDUTErewpKL4vXkdk9mlwqdZ3hFN76VKUUE:C+2rL8pDUTEr1pKLaGk9UdZ339EP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2716 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 824 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/824-11-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral1/memory/824-13-0x0000000000400000-0x000000000042C000-memory.dmp upx -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{58FB2CBB-C874-45FC-A1C9-B62CC9E3BED9} 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Enable Browser Extensions = "yes" 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe -
Modifies registry class 46 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BBD0D9E0-EE99-4C66-AC1E-2E77D40FE7C9}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{35B576B9-5A0F-43D7-8174-2AC714DC3AD2}\ProxyStubClsid32 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{35B576B9-5A0F-43D7-8174-2AC714DC3AD2}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C3.bho3\CLSID 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C3.bho3\CurVer\ = "C3.bho3.1" 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{58FB2CBB-C874-45FC-A1C9-B62CC9E3BED9}\InprocServer32 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BBD0D9E0-EE99-4C66-AC1E-2E77D40FE7C9} 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C3.bho3.1\ = "bho3 Class" 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C3.bho3\ = "bho3 Class" 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{58FB2CBB-C874-45FC-A1C9-B62CC9E3BED9}\ProgID 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{35B576B9-5A0F-43D7-8174-2AC714DC3AD2}\ProxyStubClsid32 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{58FB2CBB-C874-45FC-A1C9-B62CC9E3BED9}\ = "bho3 Class" 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{58FB2CBB-C874-45FC-A1C9-B62CC9E3BED9}\ProgID\ = "C3.bho3.1" 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{58FB2CBB-C874-45FC-A1C9-B62CC9E3BED9}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7264238.dll" 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BBD0D9E0-EE99-4C66-AC1E-2E77D40FE7C9}\1.0\FLAGS 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BBD0D9E0-EE99-4C66-AC1E-2E77D40FE7C9}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7264238.dll" 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{35B576B9-5A0F-43D7-8174-2AC714DC3AD2}\TypeLib\Version = "1.0" 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{58FB2CBB-C874-45FC-A1C9-B62CC9E3BED9} 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{58FB2CBB-C874-45FC-A1C9-B62CC9E3BED9}\VersionIndependentProgID 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{58FB2CBB-C874-45FC-A1C9-B62CC9E3BED9}\Programmable 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BBD0D9E0-EE99-4C66-AC1E-2E77D40FE7C9}\1.0\FLAGS\ = "0" 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C3.bho3\CurVer 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{58FB2CBB-C874-45FC-A1C9-B62CC9E3BED9}\TypeLib\ = "{BBD0D9E0-EE99-4C66-AC1E-2E77D40FE7C9}" 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BBD0D9E0-EE99-4C66-AC1E-2E77D40FE7C9}\1.0 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{35B576B9-5A0F-43D7-8174-2AC714DC3AD2} 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{35B576B9-5A0F-43D7-8174-2AC714DC3AD2}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{35B576B9-5A0F-43D7-8174-2AC714DC3AD2}\TypeLib\ = "{BBD0D9E0-EE99-4C66-AC1E-2E77D40FE7C9}" 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{35B576B9-5A0F-43D7-8174-2AC714DC3AD2}\TypeLib 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C3.bho3.1 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C3.bho3\CLSID\ = "{58FB2CBB-C874-45FC-A1C9-B62CC9E3BED9}" 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{58FB2CBB-C874-45FC-A1C9-B62CC9E3BED9}\VersionIndependentProgID\ = "C3.bho3" 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{58FB2CBB-C874-45FC-A1C9-B62CC9E3BED9}\TypeLib 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{35B576B9-5A0F-43D7-8174-2AC714DC3AD2}\ = "Ibho3" 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{35B576B9-5A0F-43D7-8174-2AC714DC3AD2}\TypeLib 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{35B576B9-5A0F-43D7-8174-2AC714DC3AD2} 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{35B576B9-5A0F-43D7-8174-2AC714DC3AD2}\TypeLib\ = "{BBD0D9E0-EE99-4C66-AC1E-2E77D40FE7C9}" 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C3.bho3.1\CLSID 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C3.bho3.1\CLSID\ = "{58FB2CBB-C874-45FC-A1C9-B62CC9E3BED9}" 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BBD0D9E0-EE99-4C66-AC1E-2E77D40FE7C9}\1.0\0 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BBD0D9E0-EE99-4C66-AC1E-2E77D40FE7C9}\1.0\HELPDIR 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{35B576B9-5A0F-43D7-8174-2AC714DC3AD2}\ = "Ibho3" 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{35B576B9-5A0F-43D7-8174-2AC714DC3AD2}\TypeLib\Version = "1.0" 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C3.bho3 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{58FB2CBB-C874-45FC-A1C9-B62CC9E3BED9}\InprocServer32\ThreadingModel = "Apartment" 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BBD0D9E0-EE99-4C66-AC1E-2E77D40FE7C9}\1.0\ = "c3 1.0 Type Library" 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BBD0D9E0-EE99-4C66-AC1E-2E77D40FE7C9}\1.0\0\win32 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 824 wrote to memory of 2716 824 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe 31 PID 824 wrote to memory of 2716 824 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe 31 PID 824 wrote to memory of 2716 824 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe 31 PID 824 wrote to memory of 2716 824 72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\72685cc8f3285f54e3750ffed7c15ad9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\cmd.execmd /c del.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90B
MD5c537d659fd065c37c511e91721c67edd
SHA18b8a886a74387cbeda87de5bc10eef77a7000699
SHA256b34134e6c191a466a44753c8ef2058766ad1076155392f17db033edf5d96ac4f
SHA51226c0f2ba809c1fc72c196a7a2e1cd40ac3782dacb30e578f5c04a662e9cc12fe3282347a40df37afbb2c493d297a04541d2d7881768ec9e70535e34b16f187d9
-
Filesize
120KB
MD553359826d1bfa6e92645b7a376abfd9a
SHA166db0a878930350863fce8404efdcbb67a4a91a3
SHA256ad25b2375be8b561683151d9d6652352047c012963667af29b34d48012e22646
SHA512fe679e2bae0991bbebd0c9fac79c41ff3ad5529f6b7e1aef2e114e3fb158c9e5866f21c95154e58a86631b560ecfe8a6bd1346c0d3d650a41bbb973a7714a8c0