Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 06:35
Static task
static1
Behavioral task
behavioral1
Sample
a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe
-
Size
204KB
-
MD5
a9f6e78e77a235a05c20244aa25d2479
-
SHA1
83cc54f729a3d1d411f10ffe9c6e81cb93878745
-
SHA256
edc6e5d94a0db1e256be267292b4f7b97ff4cdb638e34b78520d66a2e2c51725
-
SHA512
f0b0a8e1a8992136d3fa6a009f0429ff78f460f2b11edd8f8c0d4667891d6f92e67bad5f0f275aed1ca2fc8a5dc4b9909e3421f78cf008aedf599680ff34b360
-
SSDEEP
3072:dVFKR3q9DeyMfSyA7YlA80kWFdHkOBv+/4H+XFjXt2w6oO5hhBcy:5K//PZB0kWDEMv+/QQFx2wVOvhS
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2844 a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{08804AF8-7D13-B6A8-52F0-5286F0CAF48A} a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\altcmd\altcmd32.dll a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\altcmd\altcmd32.dll a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe File created C:\Program Files (x86)\altcmd\altcmd.inf a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\altcmd\altcmd.inf a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe File created C:\Program Files (x86)\altcmd\uninstall.bat a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\altcmd\uninstall.bat a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 60 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91}\ProxyStubClsid32 a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\TypeLib\ = "{A8954909-1F0F-41A5-A7FA-3B376D69E226}" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\TypeLib\Version = "1.0" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5} a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MsVCL1.BhoApp\ = "BhoApp Class" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{08804AF8-7D13-B6A8-52F0-5286F0CAF48A}\VersionIndependentProgID a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226}\1.0\0\win32\ = "C:\\Program Files (x86)\\altcmd\\altcmd32.dll" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\ = "IBhoApp" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\TypeLib\ = "{A8954909-1F0F-41A5-A7FA-3B376D69E226}" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MsVCL1.BhoApp\CLSID a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226}\1.0\FLAGS a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91}\TypeLib\Version = "1.0" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91}\TypeLib\ = "{A8954909-1F0F-41A5-A7FA-3B376D69E226}" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91}\ProxyStubClsid32 a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MsVCL1.BhoApp.1\CLSID a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{08804AF8-7D13-B6A8-52F0-5286F0CAF48A}\VersionIndependentProgID\ = "MsVCL1.BhoApp" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{08804AF8-7D13-B6A8-52F0-5286F0CAF48A}\InprocServer32 a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{08804AF8-7D13-B6A8-52F0-5286F0CAF48A}\InprocServer32\ = "C:\\Program Files (x86)\\altcmd\\altcmd32.dll" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{08804AF8-7D13-B6A8-52F0-5286F0CAF48A}\TypeLib a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226}\1.0\0\win32 a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91}\TypeLib\ = "{A8954909-1F0F-41A5-A7FA-3B376D69E226}" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\ = "IBhoApp" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226} a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91}\ = "_IBhoAppEvents" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91}\TypeLib a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226}\1.0\0 a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\TypeLib\Version = "1.0" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226}\1.0 a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226}\1.0\HELPDIR a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91}\ = "_IBhoAppEvents" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MsVCL1.BhoApp.1 a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MsVCL1.BhoApp.1\ = "BhoApp Class" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MsVCL1.BhoApp a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{08804AF8-7D13-B6A8-52F0-5286F0CAF48A}\InprocServer32\ThreadingModel = "Apartment" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{08804AF8-7D13-B6A8-52F0-5286F0CAF48A}\TypeLib\ = "{A8954909-1F0F-41A5-A7FA-3B376D69E226}" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226}\1.0\FLAGS\ = "0" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{08804AF8-7D13-B6A8-52F0-5286F0CAF48A}\Programmable a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\ProxyStubClsid32 a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{08804AF8-7D13-B6A8-52F0-5286F0CAF48A} a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226}\1.0\ = "MsVCL1 1.0 Type Library" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A8954909-1F0F-41A5-A7FA-3B376D69E226}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\altcmd\\" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\TypeLib a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91} a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MsVCL1.BhoApp.1\CLSID\ = "{08804AF8-7D13-B6A8-52F0-5286F0CAF48A}" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MsVCL1.BhoApp\CLSID\ = "{08804AF8-7D13-B6A8-52F0-5286F0CAF48A}" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MsVCL1.BhoApp\CurVer a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{08804AF8-7D13-B6A8-52F0-5286F0CAF48A}\ = "BhoApp Class" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{08804AF8-7D13-B6A8-52F0-5286F0CAF48A}\ProgID a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91}\TypeLib a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MsVCL1.BhoApp\CurVer\ = "MsVCL1.BhoApp.1" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91} a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\ProxyStubClsid32 a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\TypeLib a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{08804AF8-7D13-B6A8-52F0-5286F0CAF48A}\ProgID\ = "MsVCL1.BhoApp.1" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{967A494A-6AEC-4555-9CAF-FA6EB00ACF91}\TypeLib\Version = "1.0" a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5} a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2844 a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2700 2844 a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2700 2844 a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2700 2844 a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2700 2844 a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a9f6e78e77a235a05c20244aa25d2479_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\280A.bat2⤵
- System Location Discovery: System Language Discovery
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD568efb842c652233d902e7c3c20439baa
SHA1f8c99518f9ad1a0126825fb1980d49d0dc703f12
SHA25680e4d4999ed243273827d6852c4502d106e818e5109665307aef26d4e18b22ae
SHA5124d908adbccc31432edfc5eddad29a9566d85b77c68df3f00adf7c960951b0552d569e0c5ae6586dc92b08c982a87100e0cbf9edb92354ca5b165395e7501b377
-
Filesize
259B
MD57c3d7c0e457788d19a2823e7fb59182e
SHA1cc4a75fa27644f203a2508d286dd3d64508d955f
SHA2561f397297947bf297da8b3e5b5d3dd15aa2deb08055f37976c7291589cd1a198c
SHA512fbed78457021fda05ca746e1246ed996e273666981512787671e362322f09fc2647ba40f86a52373fe11c13a667060fa1b2722d23c3b42c020545434fe13d91d