Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 16:16
Static task
static1
Behavioral task
behavioral1
Sample
78c145aa6937af9ccd855169e97adab9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
78c145aa6937af9ccd855169e97adab9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
78c145aa6937af9ccd855169e97adab9_JaffaCakes118.exe
-
Size
374KB
-
MD5
78c145aa6937af9ccd855169e97adab9
-
SHA1
a73ace4b512c7923aea1b4045faab44b723a6103
-
SHA256
6d3415233b968c7d3b908d95ff649507097d8b7e0fffcfb5e42716b96cafcf2e
-
SHA512
295952331ac2b8c3494b02d2bb461eee346d30b3723d86fd8f430832009fe7180fbee61e0af58bcbcb1a0c1c8eb1be38b6e4a23a8f8f030eb4320f4a936924e5
-
SSDEEP
6144:unBgzvrz0hrinKXkkJteVHal1KAepkxPgsnJ1v1ukCKGRPqzb4LObsteKleG/Q4t:Zzvr4hFJtmAKjpSPn98KMP44LObme2e
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2376 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2264 start.jpg -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat IEXPLORE.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2264 set thread context of 2188 2264 start.jpg 30 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\pemote\start.jpg 78c145aa6937af9ccd855169e97adab9_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\pemote\start.jpg 78c145aa6937af9ccd855169e97adab9_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78c145aa6937af9ccd855169e97adab9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language start.jpg -
Modifies data under HKEY_USERS 14 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached IEXPLORE.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{D9144DCD-E998-4ECA-AB6A-DCD83CCBA16D} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 010000000000000060fb28d771e2da01 IEXPLORE.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{16F3DD56-1AF5-4347-846D-7C10C4192619} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 0100000000000000a04337d771e2da01 IEXPLORE.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{2916C86E-86A6-43FE-8112-43ABE6BF8DCC} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 0100000000000000a04337d771e2da01 IEXPLORE.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings IEXPLORE.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{99FD978C-D287-4F50-827F-B2C658EDA8E7} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 0100000000000000c05c2bd771e2da01 IEXPLORE.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{920E6DB1-9907-4370-B3A0-BAFC03D81399} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 0100000000000000a04337d771e2da01 IEXPLORE.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{08244EE6-92F0-47F2-9FC9-929BAA2E7235} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 010000000000000020c940d771e2da01 IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections IEXPLORE.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{AB5C5600-7E6E-4B06-9197-9ECEF74D31CC} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 0100000000000000a04337d771e2da01 IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings IEXPLORE.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2188 2264 start.jpg 30 PID 2264 wrote to memory of 2188 2264 start.jpg 30 PID 2264 wrote to memory of 2188 2264 start.jpg 30 PID 2264 wrote to memory of 2188 2264 start.jpg 30 PID 2264 wrote to memory of 2188 2264 start.jpg 30 PID 2264 wrote to memory of 2188 2264 start.jpg 30 PID 2260 wrote to memory of 2376 2260 78c145aa6937af9ccd855169e97adab9_JaffaCakes118.exe 31 PID 2260 wrote to memory of 2376 2260 78c145aa6937af9ccd855169e97adab9_JaffaCakes118.exe 31 PID 2260 wrote to memory of 2376 2260 78c145aa6937af9ccd855169e97adab9_JaffaCakes118.exe 31 PID 2260 wrote to memory of 2376 2260 78c145aa6937af9ccd855169e97adab9_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\78c145aa6937af9ccd855169e97adab9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\78c145aa6937af9ccd855169e97adab9_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\YUMQOU.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2376
-
-
C:\Program Files (x86)\pemote\start.jpg"C:\Program Files (x86)\pemote\start.jpg"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" 555482⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
374KB
MD578c145aa6937af9ccd855169e97adab9
SHA1a73ace4b512c7923aea1b4045faab44b723a6103
SHA2566d3415233b968c7d3b908d95ff649507097d8b7e0fffcfb5e42716b96cafcf2e
SHA512295952331ac2b8c3494b02d2bb461eee346d30b3723d86fd8f430832009fe7180fbee61e0af58bcbcb1a0c1c8eb1be38b6e4a23a8f8f030eb4320f4a936924e5
-
Filesize
218B
MD5132361b1051f202fdd6f0ea73a67edce
SHA14ee5da483570d643cfcf351c886d973063eca0b5
SHA256176111b3ab133679cae5f7c194a0a80dd20ef28e22468b5fa855442a1f790717
SHA51246cf369fe2236ecf9b87d7366b9c1a72e971f37e6400d31fdc734e855eb17c38735dd66c16b1fd0732561b756ae11055c4f68c45a3452d23612bce70b4288667