Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 09:49
Static task
static1
Behavioral task
behavioral1
Sample
77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe
-
Size
188KB
-
MD5
77bc3beca617a3269226a47c2c084bb6
-
SHA1
d9222276597a188d0613f9a4eb7aee416da5487c
-
SHA256
470edf1ae3f53c3fe72c5e8c12ce896596a4ade9db83961d4d242fd00eef33b1
-
SHA512
8e567bb5651e5b2e7be1d49822f1e3030ce9d93ef4730f986c469f3b5861d0cf943a5400dde00b347f159e460f03478a1fe13e885f0250a45cbe215bc2db539c
-
SSDEEP
3072:A1gObv+5KmvMYURXYUGbMLwEp7M/3jqnaku0/3WEkkbr3oepDwqUDy5j:A1jawGUHXZMPjqabO3FbrYoDVGy
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\jnua483.dll 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ZimboNews.clsZimboNews\Clsid 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ZimboNews.clsZimboNews 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2332 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2332 wrote to memory of 452 2332 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe 84 PID 2332 wrote to memory of 452 2332 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe 84 PID 2332 wrote to memory of 452 2332 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe 84 PID 452 wrote to memory of 4132 452 cmd.exe 86 PID 452 wrote to memory of 4132 452 cmd.exe 86 PID 452 wrote to memory of 4132 452 cmd.exe 86 PID 2332 wrote to memory of 4608 2332 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe 94 PID 2332 wrote to memory of 4608 2332 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe 94 PID 2332 wrote to memory of 4608 2332 77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\77bc3beca617a3269226a47c2c084bb6_JaffaCakes118.exe"1⤵
- Installs/modifies Browser Helper Object
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADDHKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System/v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADDHKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System/v EnableLUA /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:4132
-
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\jnua483.dll2⤵
- System Location Discovery: System Language Discovery
PID:4608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5aaa0c0480a85174341d5210b544bd231
SHA16321856034f31a06e67d60b384af0856b05c221c
SHA2566ef10e631cef3e8407c8b5e7a720cdc9484dc6920521a7bffa058169693b626f
SHA51281a9d4f832ab0e7c2f83c296c57bd3bfbc53d1eb0a43b5276623604cf21fa897faaecb16ccba5a3ded3331ea5c3b732f89b7c42629034c7b423ad758871f60ee