Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 09:49
Static task
static1
Behavioral task
behavioral1
Sample
77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe
-
Size
188KB
-
MD5
77bc3beca617a3269226a47c2c084bb6
-
SHA1
d9222276597a188d0613f9a4eb7aee416da5487c
-
SHA256
470edf1ae3f53c3fe72c5e8c12ce896596a4ade9db83961d4d242fd00eef33b1
-
SHA512
8e567bb5651e5b2e7be1d49822f1e3030ce9d93ef4730f986c469f3b5861d0cf943a5400dde00b347f159e460f03478a1fe13e885f0250a45cbe215bc2db539c
-
SSDEEP
3072:A1gObv+5KmvMYURXYUGbMLwEp7M/3jqnaku0/3WEkkbr3oepDwqUDy5j:A1jawGUHXZMPjqabO3FbrYoDVGy
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\eawi2600.dll 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ZimboNews.clsZimboNews\Clsid 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ZimboNews.clsZimboNews 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3032 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2056 3032 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2056 3032 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2056 3032 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2056 3032 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe 30 PID 2056 wrote to memory of 2408 2056 cmd.exe 32 PID 2056 wrote to memory of 2408 2056 cmd.exe 32 PID 2056 wrote to memory of 2408 2056 cmd.exe 32 PID 2056 wrote to memory of 2408 2056 cmd.exe 32 PID 3032 wrote to memory of 2972 3032 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe 35 PID 3032 wrote to memory of 2972 3032 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe 35 PID 3032 wrote to memory of 2972 3032 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe 35 PID 3032 wrote to memory of 2972 3032 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe 35 PID 3032 wrote to memory of 2972 3032 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe 35 PID 3032 wrote to memory of 2972 3032 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe 35 PID 3032 wrote to memory of 2972 3032 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe"1⤵
- Installs/modifies Browser Helper Object
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADDHKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System/v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADDHKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System/v EnableLUA /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:2408
-
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\eawi2600.dll2⤵
- System Location Discovery: System Language Discovery
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5a6cacb5804414ab881651ac0a592181d
SHA17e588633f7247bfd3469d8ac089381cfa94e2bcc
SHA2561c6ab620c452b7264e9875274be8a17927ca05b867f7ce9a06dacc3ef2af190d
SHA5123f6ed5e1b72da9f402682237fc664e99202f1af1dbee8b2f03328d62381d7701031ad7e92c101b541875a0e8b698e2a2ed9bed964a78401b94cf734b8e530bf9