Analysis
-
max time kernel
141s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 04:52
Static task
static1
Behavioral task
behavioral1
Sample
72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe
-
Size
1006KB
-
MD5
72a7645a4ea5a1d4ea1b7c82aa6cd433
-
SHA1
9e14f9d538ca3fdf2254f7614d572ed82a0721f8
-
SHA256
c2c96204f686f2290bbf1492db83756ea80412e4518403651137b0e2ef8d106c
-
SHA512
25c80e2205fd21f6b9265bddc7cd2c358eb4edf676f0ccb93ce626710e1456eda167fad91cf31039eda04b9c5b6fd9db1062f5fb0e06b78272bf8362747b11dc
-
SSDEEP
12288:iImDfNZL1r0+IjX4OQ1dC3c0nWb/F7LD7ciUKyxppcZ/AsysPNxVNFrVBJ:Dm7r1rcD4NdGc0nWzFXaKkppT0v/f
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\WinRAR 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\WinRAR.exe\" \"%1\"" 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinRAR.exe,1" 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR32 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\DefaultIcon 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\WinRAR32 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\DragDropHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\WinRAR 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\WinRAR.exe\" \"%1\"" 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rev\ = "WinRAR.REV" 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell\open\command 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\WinRAR.exe\" \"%1\"" 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\DefaultIcon 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\DropHandler\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\WinRAR32 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\DropHandler\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\WinRAR 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shell\open 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinRAR.exe,0" 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rev 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\DropHandler\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\ = "WinRAR ????" 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinRAR.exe,0" 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shell\open\command 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shell\open\command 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\ = "RAR ???" 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\DefaultIcon 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\WinRAR32 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\ = "WinRAR ZIP ????" 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\DropHandler 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\DropHandler 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\WinRAR32 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1944 72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\72a7645a4ea5a1d4ea1b7c82aa6cd433_JaffaCakes118.exe"1⤵
- Modifies system executable filetype association
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:1944