Analysis
-
max time kernel
141s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 11:50
Static task
static1
Behavioral task
behavioral1
Sample
8a40689c25ef37cbe6721c5777f00859_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
8a40689c25ef37cbe6721c5777f00859_JaffaCakes118.exe
-
Size
928KB
-
MD5
8a40689c25ef37cbe6721c5777f00859
-
SHA1
814a68571fc544a281c5e096199e559882a1e01f
-
SHA256
2170b2ae7c1bd75d1465b9d70b9dd90da3bb511f3aed07ca0d263864719c6380
-
SHA512
1ab8eee4ac793c30787916190b2a3afc86f7c062f371028dc45c928e69c4a138063b5d5b0cd1de4810cdec9ed19624e13c643450493d2b26b746a7a7bb2ccbbb
-
SSDEEP
24576:VZ8SXWQmXtu/nhfA68NJvhjyR4kKJRi0+4:TvmQ46AjyeZJRi0T
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00080000000234db-74.dat acprotect behavioral2/files/0x00070000000234df-89.dat acprotect behavioral2/files/0x00070000000234e0-91.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 1212 PrstService.exe -
Loads dropped DLL 4 IoCs
pid Process 1944 8a40689c25ef37cbe6721c5777f00859_JaffaCakes118.exe 1212 PrstService.exe 1212 PrstService.exe 1212 PrstService.exe -
resource yara_rule behavioral2/memory/1944-87-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral2/files/0x00080000000234db-74.dat upx behavioral2/files/0x00070000000234df-89.dat upx behavioral2/memory/1212-95-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral2/files/0x00070000000234e0-91.dat upx behavioral2/memory/1212-103-0x00000000035E0000-0x0000000003604000-memory.dmp upx behavioral2/memory/1944-108-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral2/memory/1212-126-0x0000000010000000-0x000000001012A000-memory.dmp upx -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\PrstService.exe 8a40689c25ef37cbe6721c5777f00859_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\PrstService.exe 8a40689c25ef37cbe6721c5777f00859_JaffaCakes118.exe File created C:\Windows\SysWOW64\PrstService.dll PrstService.exe File opened for modification C:\Windows\SysWOW64\PrstService.dll PrstService.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\IJL105.DLL PrstService.exe File opened for modification C:\Program Files\Internet Explorer\IJL105.DLL PrstService.exe File created C:\Program Files\Internet Explorer\dp1.fne PrstService.exe File opened for modification C:\Program Files\Internet Explorer\dp1.fne PrstService.exe File created C:\Program Files\Internet Explorer\Exmlrpc.fne PrstService.exe File opened for modification C:\Program Files\Internet Explorer\Exmlrpc.fne PrstService.exe File created C:\Program Files\Internet Explorer\krnln.fnr PrstService.exe File opened for modification C:\Program Files\Internet Explorer\krnln.fnr PrstService.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\PrstService.jpg PrstService.exe File opened for modification C:\Windows\Fonts\PrstService.jpg PrstService.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a40689c25ef37cbe6721c5777f00859_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrstService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430142017" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3295494053" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31124452" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3374400667" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Check_Associations = "NO" PrstService.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3295494053" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{F0087A20-57D7-11EF-B1C5-C61537EC8B44} = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31124452" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31124452" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1944 8a40689c25ef37cbe6721c5777f00859_JaffaCakes118.exe 1944 8a40689c25ef37cbe6721c5777f00859_JaffaCakes118.exe 1212 PrstService.exe 1212 PrstService.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1860 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1944 8a40689c25ef37cbe6721c5777f00859_JaffaCakes118.exe 1212 PrstService.exe 1860 IEXPLORE.EXE 1860 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1212 1944 8a40689c25ef37cbe6721c5777f00859_JaffaCakes118.exe 84 PID 1944 wrote to memory of 1212 1944 8a40689c25ef37cbe6721c5777f00859_JaffaCakes118.exe 84 PID 1944 wrote to memory of 1212 1944 8a40689c25ef37cbe6721c5777f00859_JaffaCakes118.exe 84 PID 1212 wrote to memory of 1860 1212 PrstService.exe 85 PID 1212 wrote to memory of 1860 1212 PrstService.exe 85 PID 1860 wrote to memory of 3044 1860 IEXPLORE.EXE 87 PID 1860 wrote to memory of 3044 1860 IEXPLORE.EXE 87 PID 1860 wrote to memory of 3044 1860 IEXPLORE.EXE 87 PID 1944 wrote to memory of 4452 1944 8a40689c25ef37cbe6721c5777f00859_JaffaCakes118.exe 90 PID 1944 wrote to memory of 4452 1944 8a40689c25ef37cbe6721c5777f00859_JaffaCakes118.exe 90 PID 1944 wrote to memory of 4452 1944 8a40689c25ef37cbe6721c5777f00859_JaffaCakes118.exe 90 PID 1212 wrote to memory of 1860 1212 PrstService.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a40689c25ef37cbe6721c5777f00859_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8a40689c25ef37cbe6721c5777f00859_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\PrstService.exeC:\Windows\system32\PrstService.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1860 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\delus.bat2⤵
- System Location Discovery: System Language Discovery
PID:4452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
34KB
MD5387cf1d2f17aff6967f3107773764513
SHA1b971bcd44988bee744f8133acb032e07d9dcd1db
SHA25674c55aaee905be674763d679ca05a6baaf93f456b5d8935d6293e523766968c6
SHA51219a4fb39b2f9863c92d76016290e701fd6bb1aa5d889896666922fd862d5b72b95a97aa27d3d0b3218233ba9dbcb3db147efbf9e61e5be853d4d3672e87bfd5c
-
Filesize
56KB
MD56649262561fba5d19f8b99dd251b5d02
SHA1286e2ab6bc2220b3c9a83720c4c612623210e10f
SHA256824afe6bde1c2890077e9a40c4261a77a1d736429709a45d68ed508581e74771
SHA512688bd75b1e9661f425a21577063362e609ce496880a4780012317d56075095e5804fb7b849b32fbbea06fbbff5d47a5534113b6613f1a236b2a76cd043bba7ef
-
Filesize
406KB
MD5e79169d47394020f7c893abb840b61bb
SHA1c5b9c2cbef3d5458b52ebb67461e84432673fb1b
SHA25611c25cdeb02ac401d913dc48b935a087e32c2d9b7b7c4a5cfdf36e4947e959dc
SHA51221ca64559082a31e46e28513de762fa2239c521f60b3485bf99926f895f0bf6f63fe2162c3e2eb25705efad22d351e24b8283442f4954ac88bc8c56ef5dc529a
-
Filesize
928KB
MD58a40689c25ef37cbe6721c5777f00859
SHA1814a68571fc544a281c5e096199e559882a1e01f
SHA2562170b2ae7c1bd75d1465b9d70b9dd90da3bb511f3aed07ca0d263864719c6380
SHA5121ab8eee4ac793c30787916190b2a3afc86f7c062f371028dc45c928e69c4a138063b5d5b0cd1de4810cdec9ed19624e13c643450493d2b26b746a7a7bb2ccbbb
-
Filesize
230B
MD551a5da2d123970ff06136d1c34a8618d
SHA1c73874f2b5deb1a204bfa38f9fbb8147523996f1
SHA256ec83fab580f8495200d4024295abb989cf10b5cac773fc1e7880be4e566a5a14
SHA512654f0a72d1a5e6f4f179df489601832d293ad5e7cf3c355fe88ee7457ab1b5e5519889775ae84b31848911ac18ee948617a88f0baafddc2d3a3eefbfe8e67d05