Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 18:04
Static task
static1
Behavioral task
behavioral1
Sample
b04475ad65b210fb0d74e0b0e58837b5_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b04475ad65b210fb0d74e0b0e58837b5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b04475ad65b210fb0d74e0b0e58837b5_JaffaCakes118.exe
-
Size
75KB
-
MD5
b04475ad65b210fb0d74e0b0e58837b5
-
SHA1
45cdcb434eeaad34448bd557daf5865b7b0d086a
-
SHA256
dad54e17620a464e58e162d6883cc559c2ea4ff7b1e66ba538d9196b6fb425a4
-
SHA512
3e9e110a4167470c4fd1d10e6584a128bd3ba08223e574369b851cadc57a1cab2f7c744555223b9b1a6aec5fcfca0c3b68170b8fef0186bd3dafeb38501d4178
-
SSDEEP
1536:yBej95nI6HSpc+UIqnEixqOLaJ5bOD+OMh0Fkr:PLnI6RoqnxqRjU+OUekr
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe service.gbp" reg.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Win\ImagePath = "\\??\\C:\\WINDOWS\\system32\\drivers\\Win.sys" regedit.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\chkdlx.dll cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b04475ad65b210fb0d74e0b0e58837b5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31126315" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1784659549" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31126315" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003d1c6f3067c0c84abb3839afa92ebb0f00000000020000000000106600000001000020000000883be6e2ed9c62cb5d18ebd5fbddcef20de83db779d79858a606821990d7e64a000000000e8000000002000020000000ba7f29957da9e2e21ffc600c45585851cf1ad35ffff9bf1cce5c4b0f9f14c413200000002979428d20defdc358c9e1208ef1240c6058306db4a3c89b91bf745d1d39184040000000541f4519ba636998dad6c4e55e8a825cffcb6767b6ee8e1ab9317b660a8d526cc000307c1f11f857deee733b2010368304ed6986331da8596b248d23d757ab77 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1791534654" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5002476b2bf3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{95FD59A7-5F1E-11EF-939B-DA2E3A28CA1B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31126315" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1784659549" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430942019" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003d1c6f3067c0c84abb3839afa92ebb0f00000000020000000000106600000001000020000000aab38ef53febe82a4d8c1579f1d50f8ca84606f224631d2276f89df21dcb1892000000000e80000000020000200000003808be6a159f21fb279219958e5b59b5fbb2a3c70e763dd4d8189e59c5725f5820000000e2751a0252d13b26376093a9cd1e2cb0c126d95553761a2463e7eb2715a9246f4000000034ba537dccb4b2df225a9af24895b8bef5cb0af301a9d775c6b12528ad62a9e362c45c6ee8c35a844983e4998c8dac6137e72ef40cdc3fe61bdde85462ec77dd iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 404c496b2bf3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.gbp cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.gbp\ = "exefile" cmd.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1568 regedit.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 228 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 228 iexplore.exe 228 iexplore.exe 4688 IEXPLORE.EXE 4688 IEXPLORE.EXE 4688 IEXPLORE.EXE 4688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3220 wrote to memory of 4248 3220 b04475ad65b210fb0d74e0b0e58837b5_JaffaCakes118.exe 84 PID 3220 wrote to memory of 4248 3220 b04475ad65b210fb0d74e0b0e58837b5_JaffaCakes118.exe 84 PID 3220 wrote to memory of 4248 3220 b04475ad65b210fb0d74e0b0e58837b5_JaffaCakes118.exe 84 PID 4248 wrote to memory of 1568 4248 cmd.exe 86 PID 4248 wrote to memory of 1568 4248 cmd.exe 86 PID 4248 wrote to memory of 1568 4248 cmd.exe 86 PID 4248 wrote to memory of 4700 4248 cmd.exe 88 PID 4248 wrote to memory of 4700 4248 cmd.exe 88 PID 4248 wrote to memory of 4700 4248 cmd.exe 88 PID 4248 wrote to memory of 4144 4248 cmd.exe 89 PID 4248 wrote to memory of 4144 4248 cmd.exe 89 PID 4248 wrote to memory of 4144 4248 cmd.exe 89 PID 4248 wrote to memory of 4296 4248 cmd.exe 90 PID 4248 wrote to memory of 4296 4248 cmd.exe 90 PID 4248 wrote to memory of 4296 4248 cmd.exe 90 PID 4248 wrote to memory of 1324 4248 cmd.exe 91 PID 4248 wrote to memory of 1324 4248 cmd.exe 91 PID 4248 wrote to memory of 1324 4248 cmd.exe 91 PID 4248 wrote to memory of 228 4248 cmd.exe 93 PID 4248 wrote to memory of 228 4248 cmd.exe 93 PID 228 wrote to memory of 4688 228 iexplore.exe 96 PID 228 wrote to memory of 4688 228 iexplore.exe 96 PID 228 wrote to memory of 4688 228 iexplore.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\b04475ad65b210fb0d74e0b0e58837b5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b04475ad65b210fb0d74e0b0e58837b5_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\a52366.bat "C:\Users\Admin\AppData\Local\Temp\b04475ad65b210fb0d74e0b0e58837b5_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\regedit.exeC:\Windows\regedit.exe /s C:\Users\Admin\AppData\Local\Temp\635.reg3⤵
- Sets service image path in registry
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1568
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵
- System Location Discovery: System Language Discovery
PID:4700
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "Explorer.exe service.gbp"3⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:4144
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵
- System Location Discovery: System Language Discovery
PID:4296
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v DisableSR /t REG_DWORD /d 0x00000001 /f3⤵
- System Location Discovery: System Language Discovery
PID:1324
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "http://www.cartoes-terra.com.br/ver.html"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:228 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4688
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5064f0852c2c8b2305d305a7c35752c40
SHA12cc0c70401cba3db156121508676439f1e804d48
SHA2564b07740f809b29f43f048c558ef309fd1983835c69b9e08014add366cfd82130
SHA5123049f2e2d8f4c9305bb57cc69bd138f431d1c7db2d7a80846ea48f710dfc42af8d8d2ff891c9e4c8c9fdf809c86ab61b742b1ef94a55a3903cbdefc043ca5fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD53b921bd80a7fabd88c005f040394e18e
SHA19405026beb8473805572279726eaf9b2031f4637
SHA25614f81a69374fd9ee171b1d21688cec7a0f0f83f5da6541055b966739dddb919d
SHA512de2fae39512e7f35080d89a59da0b3425c9a55a5d008b1d138e62dbc3ba769add9807583a495dcc894c61ef19f12f51b3515866e46d25bf119680e8d3ae7864e
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
1KB
MD5a816293920bbc442494bd31c7ab18e2c
SHA194f9d7d916ae977bc9c82474c8c646daaa133900
SHA256005b6d10d283a554cb8facd2073eac759601362c0afb146ce97141522cc2366f
SHA512f24dd2a7b52480b0212f559b022f66e7a049c36962472402ec55b9871688509fcec44baa8083c04693db151101b4657c79b12ffb02b3bbfc213249021c47dd21
-
Filesize
2KB
MD573db6d3b61e84181c624b4aea0593bb3
SHA128870ccff9b93f422dd37378fb8e046497fc7ad5
SHA2568636afef7c1f1d6ddf2eba2f82b9a0e2ecb453aae9d2fa0157dfc8550d220159
SHA5125dc61709fed0c87ea5bd2789cb0e4c45e8f037919ee9f15595de539facccca2aa7176d75d8dae521ccd164cb1e34927e1bbded17693961a5a9591a7980068692
-
Filesize
9KB
MD5c393728704119047c10b58de0170ffdf
SHA1fc148642b8e4ed37e595bf099c71ac2af4ae4a9a
SHA2560e93109587416cad225fb0addf245ec119b690ac98b9a30daf8a1bb52583b550
SHA51217d84387071f731e27e79bfd82f81423f367d1ce71138487951446915c9c433d13b577a1b6569225b804823006fb9006b9f50ac1a5326e08c34a0e8708cbf90f