Analysis
-
max time kernel
133s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 03:09
Behavioral task
behavioral1
Sample
ba1fc8a1073bf0547d3d14a3a464152b_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
ba1fc8a1073bf0547d3d14a3a464152b_JaffaCakes118.exe
-
Size
317KB
-
MD5
ba1fc8a1073bf0547d3d14a3a464152b
-
SHA1
af179884275df3b482223c9807d947fb8bce6395
-
SHA256
331154d6f9e7734f5eaebc970dfc7c3616c983f72d411da110a418a4d7cacb0c
-
SHA512
b95b3a9d32c777978520556cb5e23fb518f91893ffca836cb03f2937591ca6e909ecabcef51276673d9d188703d490e59d5f172e2b37614c6aa132a690f7238f
-
SSDEEP
6144:aA3xt2BoRpY4oEspnVDgF7zSuJvINP9LoOQVxrrbzum4LpMGMe:aA72BoRGFEuDgYTLuH/u
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 916 Regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{34C1F70A-CA00-4B6D-A827-01D468AB2D1B} Regsvr32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\Media\media-update.dll ba1fc8a1073bf0547d3d14a3a464152b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba1fc8a1073bf0547d3d14a3a464152b_JaffaCakes118.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.9249.com/?s" ba1fc8a1073bf0547d3d14a3a464152b_JaffaCakes118.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{34C1F70A-CA00-4B6D-A827-01D468AB2D1B}\InprocServer32 Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{34C1F70A-CA00-4B6D-A827-01D468AB2D1B}\InprocServer32\ThreadingModel = "Apartment" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\media-update.IEExtend Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\media-update.IEExtend\Clsid Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{34C1F70A-CA00-4B6D-A827-01D468AB2D1B}\ProgID\ = "media-update.IEExtend" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{34C1F70A-CA00-4B6D-A827-01D468AB2D1B} Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{34C1F70A-CA00-4B6D-A827-01D468AB2D1B}\ Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\media-update.IEExtend\Clsid\ = "{34C1F70A-CA00-4B6D-A827-01D468AB2D1B}" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{34C1F70A-CA00-4B6D-A827-01D468AB2D1B}\ProgID Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{34C1F70A-CA00-4B6D-A827-01D468AB2D1B}\InprocServer32\ = "C:\\Windows\\Media\\media-update.dll" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\media-update.IEExtend\ Regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1908 wrote to memory of 916 1908 ba1fc8a1073bf0547d3d14a3a464152b_JaffaCakes118.exe 84 PID 1908 wrote to memory of 916 1908 ba1fc8a1073bf0547d3d14a3a464152b_JaffaCakes118.exe 84 PID 1908 wrote to memory of 916 1908 ba1fc8a1073bf0547d3d14a3a464152b_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba1fc8a1073bf0547d3d14a3a464152b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ba1fc8a1073bf0547d3d14a3a464152b_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\Regsvr32.exeRegsvr32.exe /s C:\WINDOWS\Media\media-update.dll2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105B
MD5af66b7930455743a072e5955010a52b4
SHA1e025ad5313895ae6ae506f7cf396198823c34ea0
SHA256dac8b3f6736854281bfc48508047dec2bbf1f2114293574fd3ccb1d1b64e0c5d
SHA5121e0f92866341a33ffc3f9a6b61d9b64d119f8cc0f50eddfc41c1292ac1824b507f90839a258d79e0f3a82834718975a3aef4e416d419d76a2cf6fd814d38adee
-
Filesize
562KB
MD5f495a9f34124164aca59b54d8f901b4d
SHA19b903cd369e72b451eefff0a7005e70283312ff1
SHA2565abac7348ce80c115c2333ed4eaf766d37ad3fe2fd7f46281e381e05cdc73cfa
SHA512175d4656a93cf81fad9befadce2ea619a8fa2094007de446eb55a0c4c084d62c48403606551e903ecf1f2d5e79176892db3b029945c3f77773a939babc2f786d