Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 03:45
Behavioral task
behavioral1
Sample
84af2ab703050f1cec176535a9c5d12e_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
84af2ab703050f1cec176535a9c5d12e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
84af2ab703050f1cec176535a9c5d12e_JaffaCakes118.exe
-
Size
31KB
-
MD5
84af2ab703050f1cec176535a9c5d12e
-
SHA1
2a31814559d5480961dd7627df8e239672e7b68e
-
SHA256
5c0f93efb52051a3937a738c1fd8ae68b7f3c869cc1ffefc1b4c9fcc4a66c168
-
SHA512
90e554a426ba0a7f17708800db8eef6dcd4b1762bb620c40396303dabbf4e41799bd868691f9eb5607b49f3998ecbdb85f7f3872c41cb82453ab94428f64ea98
-
SSDEEP
768:uSb7BvPZF1z3Bl4Hyyc8KB5Yg8yvepyq:bHtTJ3BlKg8KOAwX
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Deletes itself 1 IoCs
pid Process 1692 cmd.exe -
resource yara_rule behavioral1/memory/1316-1-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1316-10-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 5 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} 84af2ab703050f1cec176535a9c5d12e_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} 84af2ab703050f1cec176535a9c5d12e_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects 84af2ab703050f1cec176535a9c5d12e_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} 84af2ab703050f1cec176535a9c5d12e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects 84af2ab703050f1cec176535a9c5d12e_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\mmsjxtjxt.dll 84af2ab703050f1cec176535a9c5d12e_JaffaCakes118.exe File created C:\Windows\SysWOW64\DefaultColor.info 84af2ab703050f1cec176535a9c5d12e_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84af2ab703050f1cec176535a9c5d12e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar 84af2ab703050f1cec176535a9c5d12e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1316 wrote to memory of 1692 1316 84af2ab703050f1cec176535a9c5d12e_JaffaCakes118.exe 30 PID 1316 wrote to memory of 1692 1316 84af2ab703050f1cec176535a9c5d12e_JaffaCakes118.exe 30 PID 1316 wrote to memory of 1692 1316 84af2ab703050f1cec176535a9c5d12e_JaffaCakes118.exe 30 PID 1316 wrote to memory of 1692 1316 84af2ab703050f1cec176535a9c5d12e_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\84af2ab703050f1cec176535a9c5d12e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\84af2ab703050f1cec176535a9c5d12e_JaffaCakes118.exe"1⤵
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\cmd.execmd /c color.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
242B
MD502633cd5914f4bed2681cbc4d4b12b34
SHA17e63a415c7bd512d4037a55028cf672c151388d0
SHA256cf79ef513f228ef0ccfb50746b150bd9c8943c9336484cd1b903ce560bbcd3ce
SHA5126e534004ecaece2fc5a1891f33e06bfde4f3cac46bf67543f58abe48cba846624ac66842a2abd99dcb3654634dfd62e717ba7aa400b3bf79c27f04961181801a