Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 00:51
Static task
static1
Behavioral task
behavioral1
Sample
b1890c0c74db43f3fb649c19e375cdb1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b1890c0c74db43f3fb649c19e375cdb1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b1890c0c74db43f3fb649c19e375cdb1_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
b1890c0c74db43f3fb649c19e375cdb1
-
SHA1
2e709b915f7cb4171efc4f4699eb25bcefa85774
-
SHA256
c6c5dc1fa2b637f09c9e1d6190108582447253b72334dd002cd9af8472a76161
-
SHA512
382db4f3f71b2d23e0a3b4158253e115e380604939e0a2c8b75548372eeb8ee519daed9e5b31182f61189f7e8cb9c24f7c64668e142624ca308b0668dac8af38
-
SSDEEP
24576:ZMR3bSXZSXOO+GYKSjqXqe/GVKWl3MBOR3uXQWuGYKS:ZMAT1UXqe/LWlVWu1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2400 CHEAT.exe -
Loads dropped DLL 10 IoCs
pid Process 1872 cmd.exe 1872 cmd.exe 2400 CHEAT.exe 2400 CHEAT.exe 2400 CHEAT.exe 2400 CHEAT.exe 2400 CHEAT.exe 2400 CHEAT.exe 2400 CHEAT.exe 2400 CHEAT.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: CHEAT.exe File opened (read-only) \??\X: CHEAT.exe File opened (read-only) \??\Z: CHEAT.exe File opened (read-only) \??\N: CHEAT.exe File opened (read-only) \??\B: CHEAT.exe File opened (read-only) \??\E: CHEAT.exe File opened (read-only) \??\G: CHEAT.exe File opened (read-only) \??\H: CHEAT.exe File opened (read-only) \??\I: CHEAT.exe File opened (read-only) \??\R: CHEAT.exe File opened (read-only) \??\A: CHEAT.exe File opened (read-only) \??\P: CHEAT.exe File opened (read-only) \??\S: CHEAT.exe File opened (read-only) \??\V: CHEAT.exe File opened (read-only) \??\O: CHEAT.exe File opened (read-only) \??\K: CHEAT.exe File opened (read-only) \??\L: CHEAT.exe File opened (read-only) \??\M: CHEAT.exe File opened (read-only) \??\Q: CHEAT.exe File opened (read-only) \??\U: CHEAT.exe File opened (read-only) \??\W: CHEAT.exe File opened (read-only) \??\Y: CHEAT.exe File opened (read-only) \??\J: CHEAT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CHEAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1890c0c74db43f3fb649c19e375cdb1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4B78F3AA-5862-42FC-83A0-A6969DC0B60D}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8ED08C53-BB00-4B9A-8037-D38D22FF4B7A}\TypeLib CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0EBC7EC4-ED41-49C7-86B7-9F63E8B28C89}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8ED08C53-BB00-4B9A-8037-D38D22FF4B7A}\Implemented Categories CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{08D24088-19F0-490A-93C8-84B68381D155}\TypeLib\ = "{3383D1F1-029B-43B1-8733-289322EA85FA}" CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0EBC7EC4-ED41-49C7-86B7-9F63E8B28C89}\ = "_UserButtonz" CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4B78F3AA-5862-42FC-83A0-A6969DC0B60D}\ = "__UserButtonz" CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8ED08C53-BB00-4B9A-8037-D38D22FF4B7A}\MiscStatus\1 CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4B78F3AA-5862-42FC-83A0-A6969DC0B60D}\ProxyStubClsid\ = "{00020420-0000-0000-C000-000000000046}" CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{08D24088-19F0-490A-93C8-84B68381D155} CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{3383D1F1-029B-43B1-8733-289322EA85FA} CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{3383D1F1-029B-43B1-8733-289322EA85FA}\1.0 CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{08D24088-19F0-490A-93C8-84B68381D155}\ProxyStubClsid CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7D518439-D9BE-4A7E-A76B-2FB2A03369F0}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7D518439-D9BE-4A7E-A76B-2FB2A03369F0}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0EBC7EC4-ED41-49C7-86B7-9F63E8B28C89}\ProxyStubClsid32 CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0EBC7EC4-ED41-49C7-86B7-9F63E8B28C89}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4B78F3AA-5862-42FC-83A0-A6969DC0B60D}\ProxyStubClsid32 CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\glxpbuttonz.UserButtonz CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C40DE621-5879-4553-882A-EA3F1109E290}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0EBC7EC4-ED41-49C7-86B7-9F63E8B28C89}\TypeLib\Version = "1.0" CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8ED08C53-BB00-4B9A-8037-D38D22FF4B7A} CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C40DE621-5879-4553-882A-EA3F1109E290}\ProxyStubClsid32 CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7D518439-D9BE-4A7E-A76B-2FB2A03369F0}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\~sfx005EC9CD6B\\GIFviewer.ocx" CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7D518439-D9BE-4A7E-A76B-2FB2A03369F0}\Control CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7D518439-D9BE-4A7E-A76B-2FB2A03369F0}\MiscStatus\ = "0" CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{E3583FCE-0595-4681-9ACD-48F7805DEFE1}\1.0\ = "glxpbuttonz" CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{E3583FCE-0595-4681-9ACD-48F7805DEFE1}\1.0\0 CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{E3583FCE-0595-4681-9ACD-48F7805DEFE1}\1.0\HELPDIR CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0EBC7EC4-ED41-49C7-86B7-9F63E8B28C89}\ = "UserButtonz" CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{3383D1F1-029B-43B1-8733-289322EA85FA}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\~sfx005EC9CD6B\\GIFviewer.ocx" CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7D518439-D9BE-4A7E-A76B-2FB2A03369F0}\ = "WelchGIFviewer.ucAniGIF" CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7D518439-D9BE-4A7E-A76B-2FB2A03369F0}\VERSION\ = "1.0" CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{E3583FCE-0595-4681-9ACD-48F7805DEFE1}\1.0\FLAGS CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{08D24088-19F0-490A-93C8-84B68381D155}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{E3583FCE-0595-4681-9ACD-48F7805DEFE1}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\~sfx005EC9CD6B" CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C40DE621-5879-4553-882A-EA3F1109E290}\TypeLib CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7D518439-D9BE-4A7E-A76B-2FB2A03369F0}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8ED08C53-BB00-4B9A-8037-D38D22FF4B7A}\ToolboxBitmap32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\~sfx005EC9CD6B\\glxpbuttonz.ocx, 30000" CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8ED08C53-BB00-4B9A-8037-D38D22FF4B7A}\VERSION CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4B78F3AA-5862-42FC-83A0-A6969DC0B60D}\ = "UserButtonz" CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C40DE621-5879-4553-882A-EA3F1109E290} CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7D518439-D9BE-4A7E-A76B-2FB2A03369F0}\Control\ CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{08D24088-19F0-490A-93C8-84B68381D155}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8ED08C53-BB00-4B9A-8037-D38D22FF4B7A}\VERSION\ = "1.0" CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C40DE621-5879-4553-882A-EA3F1109E290}\TypeLib\ = "{3383D1F1-029B-43B1-8733-289322EA85FA}" CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4B78F3AA-5862-42FC-83A0-A6969DC0B60D}\TypeLib CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4B78F3AA-5862-42FC-83A0-A6969DC0B60D}\TypeLib\ = "{E3583FCE-0595-4681-9ACD-48F7805DEFE1}" CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7D518439-D9BE-4A7E-A76B-2FB2A03369F0}\ProgID\ = "WelchGIFviewer.ucAniGIF" CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7D518439-D9BE-4A7E-A76B-2FB2A03369F0}\MiscStatus\1 CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4B78F3AA-5862-42FC-83A0-A6969DC0B60D}\TypeLib\Version = "1.0" CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C40DE621-5879-4553-882A-EA3F1109E290}\ = "__ucAniGIF" CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4B78F3AA-5862-42FC-83A0-A6969DC0B60D}\TypeLib\ = "{E3583FCE-0595-4681-9ACD-48F7805DEFE1}" CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4B78F3AA-5862-42FC-83A0-A6969DC0B60D}\TypeLib CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8ED08C53-BB00-4B9A-8037-D38D22FF4B7A}\InprocServer32 CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8ED08C53-BB00-4B9A-8037-D38D22FF4B7A}\Implemented Categories\{0DE86A52-2BAA-11CF-A229-00AA003D7352} CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{3383D1F1-029B-43B1-8733-289322EA85FA}\1.0\FLAGS\ = "2" CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{3383D1F1-029B-43B1-8733-289322EA85FA}\1.0\HELPDIR CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0EBC7EC4-ED41-49C7-86B7-9F63E8B28C89}\TypeLib\ = "{E3583FCE-0595-4681-9ACD-48F7805DEFE1}" CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0EBC7EC4-ED41-49C7-86B7-9F63E8B28C89}\ = "_UserButtonz" CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0EBC7EC4-ED41-49C7-86B7-9F63E8B28C89}\ProxyStubClsid32 CHEAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4B78F3AA-5862-42FC-83A0-A6969DC0B60D} CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{08D24088-19F0-490A-93C8-84B68381D155}\TypeLib\Version = "1.0" CHEAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{08D24088-19F0-490A-93C8-84B68381D155}\TypeLib\Version = "1.0" CHEAT.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2400 CHEAT.exe Token: SeIncBasePriorityPrivilege 2400 CHEAT.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2400 CHEAT.exe 2400 CHEAT.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 308 wrote to memory of 1872 308 b1890c0c74db43f3fb649c19e375cdb1_JaffaCakes118.exe 31 PID 308 wrote to memory of 1872 308 b1890c0c74db43f3fb649c19e375cdb1_JaffaCakes118.exe 31 PID 308 wrote to memory of 1872 308 b1890c0c74db43f3fb649c19e375cdb1_JaffaCakes118.exe 31 PID 308 wrote to memory of 1872 308 b1890c0c74db43f3fb649c19e375cdb1_JaffaCakes118.exe 31 PID 1872 wrote to memory of 2400 1872 cmd.exe 33 PID 1872 wrote to memory of 2400 1872 cmd.exe 33 PID 1872 wrote to memory of 2400 1872 cmd.exe 33 PID 1872 wrote to memory of 2400 1872 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1890c0c74db43f3fb649c19e375cdb1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b1890c0c74db43f3fb649c19e375cdb1_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\~sfx005EC9CD6B\CHEAT.bat" "2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\~sfx005EC9CD6B\CHEAT.exeCHEAT.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2400
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5de9f031ba33f80c2241c97e0c92d5962
SHA1ce6e40472d6c54cbc8656356b6f38c16ac45915c
SHA2568f5d84144544678e64e7a2cd97e3e25a6d1e94fb5a7ca1a1f6e55c8c6cd2ec0d
SHA51256b4283dcde123719b0c1b0d1a0a317eae455d95d62d6a01b19299660664391863a35b96f5317b9c3090f2d1b7552475d932c3239160e9a0747e700e7f1d4b37
-
Filesize
220KB
MD5dc7c375616ccf805baff440c80c2aa67
SHA1d5335ace3525ff873bee7da701268d2845369071
SHA256fadc51289cb9327011fd9c5273222d5b032c98b989cb3e1b772b141bf9df068c
SHA5120cfe0dee18b1ed6a1ae6991f45630e0acfc5c2b231ee371200fae71bc3c5c0a87aa8de3ac6d51d28d22b45d8813643521608df5742f618a6cb3913a90a567d4c
-
Filesize
108KB
MD5455812a36b41a4ce537589ebd1410111
SHA16a7872729d72f4fe8bc979846237d25436deec11
SHA25686711c5044f2659c31cc8455bae9f3f361e821bb97d45cac0c2d880d23c45026
SHA512e2810e09e24564027d1e35a5c5d08b514d914b7e7a3551bc5098bd98e270207d5ab2a162d9dc42fec89809a217d1d35fa724e5668a9fdb45b897d61909df9825
-
Filesize
219KB
MD5f8116dbe015ddef8bfc88912c5234e6a
SHA1d13354d5c71a971a02b4594197f054115f54a900
SHA2563d8433ce41e2b1c233186cd962c5fb0491840c3e0cd7844d0bc9402a814cc84a
SHA512b7b45f521d644b8ddc0a681340c29e6a006e7b017f2a80e36944d54064783a778cea18bdd0bdf7c67f3caa82a8a7c65bad9627189eaaf3ea8b2832638977cb0c
-
Filesize
100KB
MD573404435b36b8cb9ea68be6d4249488e
SHA1ecd6f0e28c4f4ac6c1943a7647f42a5d91c14f02
SHA2562123cadad9f7da81601c5e09105a569fedda561b4b12e87f0c0f6b4afa286e5c
SHA512e260099024bdc4711ef068455e350cb400042f5fd5066b07b024e49b8a13b6c058347f2e4e68ff73704358b51db851e4e06c28cb2f3cd36b64d9023c748dcad7