Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 23:48
Static task
static1
Behavioral task
behavioral1
Sample
a8b970888cdd89e32716800bef02ca74_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a8b970888cdd89e32716800bef02ca74_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a8b970888cdd89e32716800bef02ca74_JaffaCakes118.dll
-
Size
220KB
-
MD5
a8b970888cdd89e32716800bef02ca74
-
SHA1
0c321745b0d0484df4db1e46247372752b8dbca9
-
SHA256
7ef1ae1db4b652fb79ee1ca50a411c56d3e86a4887dc99ceee86e9953ce2c145
-
SHA512
d9ac3d7cc35b3077191dff9d77ccb17afb0b5fbf6d38cd2a23147023ef66ca9690b4ba99838ce5280fa41aa8bbeb7b24aec6ade93e5e5d27a2ac364ecece5dc7
-
SSDEEP
3072:XJohAfhKBJ9R+An0AzIzcJVMbbpKApMwIhNieXD11a8YBJa59ErZf6VfUoz:EDv/ztVMbt58NbxHYSyp6xU
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation HLInstaller3.exe -
Executes dropped EXE 6 IoCs
pid Process 4364 TVM_B5B37.EXE 4856 iB873.tmp 404 PreInstaller_p1.exe 4140 MegasearchBarSetup.exe 2852 HLInstaller3.exe 852 Xhrmy.exe -
Loads dropped DLL 2 IoCs
pid Process 404 PreInstaller_p1.exe 4140 MegasearchBarSetup.exe -
resource yara_rule behavioral2/files/0x000b0000000234b6-10.dat upx behavioral2/memory/4856-11-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/files/0x000c000000023417-45.dat upx behavioral2/memory/4856-48-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/2852-49-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral2/memory/2852-65-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral2/memory/4856-76-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\xhrmy = "C:\\Windows\\Xhrmy.exe" Xhrmy.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\TVM_B5B37.EXE regsvr32.exe File created C:\Windows\SysWOW64\PreInstaller_p1.exe regsvr32.exe File created C:\Windows\SysWOW64\MegasearchBarSetup.exe regsvr32.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\HLInstaller3.exe regsvr32.exe File created C:\Windows\Xhrmy.exe HLInstaller3.exe File opened for modification C:\Windows\Xhrmy.exe HLInstaller3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TVM_B5B37.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iB873.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PreInstaller_p1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MegasearchBarSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HLInstaller3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xhrmy.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53F066F0-A4C0-4F46-83EB-2DFD03F938CF}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53F066F0-A4C0-4F46-83EB-2DFD03F938CF}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53F066F0-A4C0-4F46-83EB-2DFD03F938CF}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53F066F0-A4C0-4F46-83EB-2DFD03F938CF} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53F066F0-A4C0-4F46-83EB-2DFD03F938CF}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53F066F0-A4C0-4F46-83EB-2DFD03F938CF}\1.0\ = "exe_in_dll 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53F066F0-A4C0-4F46-83EB-2DFD03F938CF}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53F066F0-A4C0-4F46-83EB-2DFD03F938CF}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a8b970888cdd89e32716800bef02ca74_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53F066F0-A4C0-4F46-83EB-2DFD03F938CF}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53F066F0-A4C0-4F46-83EB-2DFD03F938CF}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 264 wrote to memory of 4908 264 regsvr32.exe 84 PID 264 wrote to memory of 4908 264 regsvr32.exe 84 PID 264 wrote to memory of 4908 264 regsvr32.exe 84 PID 4908 wrote to memory of 4364 4908 regsvr32.exe 87 PID 4908 wrote to memory of 4364 4908 regsvr32.exe 87 PID 4908 wrote to memory of 4364 4908 regsvr32.exe 87 PID 4364 wrote to memory of 4856 4364 TVM_B5B37.EXE 88 PID 4364 wrote to memory of 4856 4364 TVM_B5B37.EXE 88 PID 4364 wrote to memory of 4856 4364 TVM_B5B37.EXE 88 PID 4908 wrote to memory of 404 4908 regsvr32.exe 90 PID 4908 wrote to memory of 404 4908 regsvr32.exe 90 PID 4908 wrote to memory of 404 4908 regsvr32.exe 90 PID 4908 wrote to memory of 4140 4908 regsvr32.exe 91 PID 4908 wrote to memory of 4140 4908 regsvr32.exe 91 PID 4908 wrote to memory of 4140 4908 regsvr32.exe 91 PID 4908 wrote to memory of 2852 4908 regsvr32.exe 92 PID 4908 wrote to memory of 2852 4908 regsvr32.exe 92 PID 4908 wrote to memory of 2852 4908 regsvr32.exe 92 PID 2852 wrote to memory of 852 2852 HLInstaller3.exe 93 PID 2852 wrote to memory of 852 2852 HLInstaller3.exe 93 PID 2852 wrote to memory of 852 2852 HLInstaller3.exe 93
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\a8b970888cdd89e32716800bef02ca74_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\a8b970888cdd89e32716800bef02ca74_JaffaCakes118.dll2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\TVM_B5B37.EXE"C:\Windows\System32\TVM_B5B37.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\iB873.tmpC:\Users\Admin\AppData\Local\Temp\iB873.tmp 3814⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4856
-
-
-
C:\Windows\SysWOW64\PreInstaller_p1.exe"C:\Windows\System32\PreInstaller_p1.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:404
-
-
C:\Windows\SysWOW64\MegasearchBarSetup.exe"C:\Windows\System32\MegasearchBarSetup.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4140
-
-
C:\Windows\HLInstaller3.exe"C:\Windows\HLInstaller3.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\Xhrmy.exe"C:\Windows\Xhrmy.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:852
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5b8290c7d9f25ee357146c091d2c389e0
SHA105a9c8504b8b2ab9926f12fd2d648a3a20aeb787
SHA25629abac54514bcfcf7413c9b3bfd86a4217e9cc69fc0d611846d805a73de7dd89
SHA5124d8f544548c2ae1fc6ffd0c96ff2014c515311fb73a27be81adf0fe0b7b069b0f2d2c09fb930f8ba450fdf786fc0b64c04f494c5ca32c723d695f1c7cb7328aa
-
Filesize
12KB
MD5e4145a76f37b199c3cb9ab8d23c3c1d6
SHA1b6beecaaf0f29d02f293e07954ebd7f7df25160b
SHA256ab657405df2b4d86793a4959a7c8c86ffbcc732733bc884f001fcb1219e68a9d
SHA5129fe0796a76998b80c2d34825ba0256147cb8104bf2b39fa3d8642ab8a7ef99cf2fd9715bb73661b4e42c47125a22d96e1e85abb88018bfc97548823f7a254b06
-
Filesize
102KB
MD5ff1e2f1eedd5a15c432b898b1f27fe76
SHA15add09db7c85b7debcd01020e7db4f5ce0f12b29
SHA256980d16ff3d7df195de35da8b4d65dfd380610b5a78b8af6e0af305be4c8e017f
SHA51243a41809aeb48c5df34c40b3aeed901535ed19587e2d9b3cf4204c3419b886ec75687eab7e96468cd992c764ecce2e2eecf640c26e2735e23bba8ee41bba1a6c
-
Filesize
39KB
MD52ba45ac0d19297950d4fa1b8acc56800
SHA192e35d569edf5fca6ec5eee1b1e874c5157215b9
SHA256c261285295845b6bab774a0c854fa0ec895df9b5c76dbc6cf514e92223f221dd
SHA5125352d7e755a4eec50dbc699f0b2b9f41b86972beeb6d6c980855c66a6da861f166d301a618176295f608a1e77e1c7047213b6c232bbfd61653beb18830125319
-
Filesize
38KB
MD564868bfbe248f203000df3c75796c9fe
SHA14489c3d721ebd185b21c2546a9b0cbba8ed20f6d
SHA256aaa24d1c38f2fcea59e8330da1a3d4ceec5ec7d883cc3521844eb7688456fc38
SHA5129f00d1030bdf828fc9d4040e6c8404992c495a825d2757804d7c7e379088e5fd05b800818c134fd1847a265fb15ed167255739c13bfccdff17b9d339deabd777
-
Filesize
17KB
MD512c6b51eca7aca2b1dd0cc7b0a2438fe
SHA1509b9e7fb9761364514bd8f3208ac6e5d7b37ea1
SHA256677456f41cecf64d00d3c35c649c12bc43dc4421819d1508ce2a3d7e8d401b77
SHA51201cc387bbdc9c2b2ca8892d71c68d87035b112724c4f3edb2031b91feff03b7928f1bf481b8432d516eafe0c8ff8f30f8104731dc4fe0012ffff828245a33cef
-
Filesize
176KB
MD5e58e15f7301e37924ba29d5a20a4c058
SHA1c8760327a2b2cf6fd4e66d33ba62a20861971490
SHA2566635bb563776dd2c8e1b0f9d6f5a530a442220bbc28ca731d17d03b22e73f2e9
SHA51234c19a6f95f03d61c710ffaa6c81e1ecdd3ef67bcde87a8283451f158b2d21ceed58de4cf5559eaf8345dc434be40d4965fe93b6c55bb404511bdb15f4b24ab8