Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
b94266574db43e28f39fb657890321f9_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
b94266574db43e28f39fb657890321f9_JaffaCakes118.exe
-
Size
299KB
-
MD5
b94266574db43e28f39fb657890321f9
-
SHA1
717aa98fc89805fe3905d5acf06d83aa8bd5f036
-
SHA256
5be1e6f7f4c472cf0566382ae2f2ec86b0f6d7e8fb961a23413937facc741d40
-
SHA512
abb0e3ec017c6d442ad5c80b19160a9e5faee6e37019d3689d37d11d49677c6ee4b49fd917d3a23b73c0d80f7e9ca66d32b39bff77831e58111e6511c478772f
-
SSDEEP
6144:VNunPuVXLjkHGR4febZrnGQZ9iip1hl1uBhol/0Iio0CH8Z0jF:VknoXLjkzfebxGQrXuslMx50jF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2792 skype.exe -
Loads dropped DLL 10 IoCs
pid Process 2220 Regsvr32.exe 1940 b94266574db43e28f39fb657890321f9_JaffaCakes118.exe 1940 b94266574db43e28f39fb657890321f9_JaffaCakes118.exe 2708 WerFault.exe 2708 WerFault.exe 2708 WerFault.exe 2708 WerFault.exe 2708 WerFault.exe 2708 WerFault.exe 2708 WerFault.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4D2EAF15-81D0-42DA-8C39-19EDD39E0FB3} Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{4D2EAF15-81D0-42DA-8C39-19EDD39E0FB3}\ Regsvr32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\resiifers.ini b94266574db43e28f39fb657890321f9_JaffaCakes118.exe File created C:\Windows\SysWOW64\llakuqyrod.dll b94266574db43e28f39fb657890321f9_JaffaCakes118.exe File created C:\Windows\SysWOW64\skype.exe b94266574db43e28f39fb657890321f9_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2708 2792 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b94266574db43e28f39fb657890321f9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skype.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4D2EAF15-81D0-42DA-8C39-19EDD39E0FB3} Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\llakuqyrod.TIEBHOCom Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4D2EAF15-81D0-42DA-8C39-19EDD39E0FB3}\ProgID\ = "llakuqyrod.TIEBHOCom" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4D2EAF15-81D0-42DA-8C39-19EDD39E0FB3}\ Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4D2EAF15-81D0-42DA-8C39-19EDD39E0FB3}\InprocServer32 Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4D2EAF15-81D0-42DA-8C39-19EDD39E0FB3}\InprocServer32\ = "C:\\Windows\\SysWow64\\llakuqyrod.dll" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4D2EAF15-81D0-42DA-8C39-19EDD39E0FB3}\InprocServer32\ThreadingModel = "Apartment" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\llakuqyrod.TIEBHOCom\ Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\llakuqyrod.TIEBHOCom\Clsid Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\llakuqyrod.TIEBHOCom\Clsid\ = "{4D2EAF15-81D0-42DA-8C39-19EDD39E0FB3}" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4D2EAF15-81D0-42DA-8C39-19EDD39E0FB3}\ProgID Regsvr32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2220 1940 b94266574db43e28f39fb657890321f9_JaffaCakes118.exe 30 PID 1940 wrote to memory of 2220 1940 b94266574db43e28f39fb657890321f9_JaffaCakes118.exe 30 PID 1940 wrote to memory of 2220 1940 b94266574db43e28f39fb657890321f9_JaffaCakes118.exe 30 PID 1940 wrote to memory of 2220 1940 b94266574db43e28f39fb657890321f9_JaffaCakes118.exe 30 PID 1940 wrote to memory of 2220 1940 b94266574db43e28f39fb657890321f9_JaffaCakes118.exe 30 PID 1940 wrote to memory of 2220 1940 b94266574db43e28f39fb657890321f9_JaffaCakes118.exe 30 PID 1940 wrote to memory of 2220 1940 b94266574db43e28f39fb657890321f9_JaffaCakes118.exe 30 PID 1940 wrote to memory of 2792 1940 b94266574db43e28f39fb657890321f9_JaffaCakes118.exe 31 PID 1940 wrote to memory of 2792 1940 b94266574db43e28f39fb657890321f9_JaffaCakes118.exe 31 PID 1940 wrote to memory of 2792 1940 b94266574db43e28f39fb657890321f9_JaffaCakes118.exe 31 PID 1940 wrote to memory of 2792 1940 b94266574db43e28f39fb657890321f9_JaffaCakes118.exe 31 PID 2792 wrote to memory of 2708 2792 skype.exe 32 PID 2792 wrote to memory of 2708 2792 skype.exe 32 PID 2792 wrote to memory of 2708 2792 skype.exe 32 PID 2792 wrote to memory of 2708 2792 skype.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b94266574db43e28f39fb657890321f9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b94266574db43e28f39fb657890321f9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\Regsvr32.exeRegsvr32.exe /s C:\Windows\system32\llakuqyrod.dll2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2220
-
-
C:\Windows\SysWOW64\skype.exe"C:\Windows\system32\skype.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 1763⤵
- Loads dropped DLL
- Program crash
PID:2708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218KB
MD5d4e7740d937f9c74597eca18a9188155
SHA1d363f2d3c5a2ccbb152ca780e32411522459f0cd
SHA2566cad972d2bcb94a538c172aa90122739fa725ff60c0edc71edcd4bdb6f42b702
SHA512dfc44473d76af4437678a626f3c3cf322cfa287734bbc898a43bad99dcccb03896b105fff955b2a6b2e6d18fc248bc98b360f836586a45fe608e7bf16689d562
-
Filesize
83B
MD5fb040e7a3aac21042a53df355dc07074
SHA162c3efc6cafc11e47654e7ee7ddce9284a7efced
SHA2567bcd9c0c85398cb0cb41c732791b889003d867d475cfea9633d21ca8928f4e45
SHA5121f97f84e1b7bedd93a27be54267718fd3882b22c8080abbe01f9cafa0da32428fdcbaa22e774f53fff619a8d6d4c7dc5c30b9be2cd26f8a3c88a2150e6b88747
-
Filesize
57KB
MD5fc5ac29e159b8442352a75d1a418deaf
SHA1ec570ad6723961107a1afcb940b446de9cf4ea02
SHA256e40c5a5f31db82210bea6dcb779c74ed37ab84169fb0f522916096dedb1794d3
SHA512e215b28f47c653cf4aa06cdc6ac63b0a9e8c1eddaa45e36f90b95f0bf1fd749994233a847a1b73ed6a554c348f30c8c786bfb1b44d6b2b419a08db8525c73c51