Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 05:21
Static task
static1
Behavioral task
behavioral1
Sample
b67d2f29bec72e9f2381fea0c35b836d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b67d2f29bec72e9f2381fea0c35b836d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b67d2f29bec72e9f2381fea0c35b836d_JaffaCakes118.exe
-
Size
286KB
-
MD5
b67d2f29bec72e9f2381fea0c35b836d
-
SHA1
5af0404583b963957b9a170b23faabffd38c73cb
-
SHA256
9f82faf5dbd7427c874165c963058888aa879e138374c41991bc94a144f640ed
-
SHA512
e194921610bfeb84f091f0d9b94db3f9930e5f93102badbf439f100e8fb254862b852d36173aef90b5aa665bd7827d6a0c78f5eac9dbf763ea64d75ca05f250b
-
SSDEEP
6144:OUrqA3AheuswyPnBiJVwc6SurzzIdznc2mijeOhdTJHPM4qgr:OUWA3AheuswyioSUzzIdrc2mipdTJHPp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3004 cqqsvr.exe -
Loads dropped DLL 2 IoCs
pid Process 2672 b67d2f29bec72e9f2381fea0c35b836d_JaffaCakes118.exe 2672 b67d2f29bec72e9f2381fea0c35b836d_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\QQÍøÂç·þÎñ = "C:\\Program Files (x86)\\cqqsvr\\cqqsvr.exe" cqqsvr.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\cqqsvr\bd.dat cqqsvr.exe File opened for modification C:\Program Files (x86)\cqqsvr b67d2f29bec72e9f2381fea0c35b836d_JaffaCakes118.exe File created C:\Program Files (x86)\cqqsvr\__tmp_rar_sfx_access_check_259468179 b67d2f29bec72e9f2381fea0c35b836d_JaffaCakes118.exe File created C:\Program Files (x86)\cqqsvr\cqqsvr.exe b67d2f29bec72e9f2381fea0c35b836d_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\cqqsvr\cqqsvr.exe b67d2f29bec72e9f2381fea0c35b836d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b67d2f29bec72e9f2381fea0c35b836d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cqqsvr.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet explorer\Main cqqsvr.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main cqqsvr.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://hao.uenet.info" cqqsvr.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage cqqsvr.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command\ = "\"C:\\Program Files\\Internet Explorer\\iexplore.exe\" http://hao.uenet.info" cqqsvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command cqqsvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID cqqsvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell cqqsvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage cqqsvr.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command cqqsvr.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Wow6432Node cqqsvr.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Wow6432Node\CLSID cqqsvr.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} cqqsvr.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell cqqsvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} cqqsvr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3004 cqqsvr.exe 3004 cqqsvr.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2672 wrote to memory of 3004 2672 b67d2f29bec72e9f2381fea0c35b836d_JaffaCakes118.exe 30 PID 2672 wrote to memory of 3004 2672 b67d2f29bec72e9f2381fea0c35b836d_JaffaCakes118.exe 30 PID 2672 wrote to memory of 3004 2672 b67d2f29bec72e9f2381fea0c35b836d_JaffaCakes118.exe 30 PID 2672 wrote to memory of 3004 2672 b67d2f29bec72e9f2381fea0c35b836d_JaffaCakes118.exe 30 PID 2672 wrote to memory of 3004 2672 b67d2f29bec72e9f2381fea0c35b836d_JaffaCakes118.exe 30 PID 2672 wrote to memory of 3004 2672 b67d2f29bec72e9f2381fea0c35b836d_JaffaCakes118.exe 30 PID 2672 wrote to memory of 3004 2672 b67d2f29bec72e9f2381fea0c35b836d_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b67d2f29bec72e9f2381fea0c35b836d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b67d2f29bec72e9f2381fea0c35b836d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\cqqsvr\cqqsvr.exe"C:\Program Files (x86)\cqqsvr\cqqsvr.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
465KB
MD58cbd35f376cf8ab67e5446113247c3e4
SHA1f91de10c7d10fa4870e0ad584d6ae0b7ad416cb6
SHA256ced5032e03c5b8acfa208fb7d6f4679e4091685035353f09f957529ed4116a9e
SHA5127d845318457446258fbab1ebecc8e21dd7a67a81d52f807e059cac363249be3386dfb3082ac0cf055552db403c37528f3dfc6881c3ff05eb4668c2320bef15d6