Analysis
-
max time kernel
145s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-08-2024 16:47
Static task
static1
Behavioral task
behavioral1
Sample
cb3ed0fab377c48841597c09e0fec1f1_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
cb3ed0fab377c48841597c09e0fec1f1_JaffaCakes118.dll
-
Size
506KB
-
MD5
cb3ed0fab377c48841597c09e0fec1f1
-
SHA1
6e74569cc356139e1892732fcc97a6ec94c6240e
-
SHA256
6cd4744b21f0f2f3145ff26150d7c8db36da68a4cf5d7ba7346cd2a31569c871
-
SHA512
ecb20de8b435db88f766dd03344ca96a06c7b60392deafdb21fa4e1b2f675a33ed7117294d74bf6395cb79157b438fca7ea53ad26d5cfdc578da59703d662079
-
SSDEEP
12288:4W7OY3YTn155L/9hFTMq2EKMAcuCSF7aqxETMNIp0Fh6zUV:4Wf3YTnJLBv2EKMAcOgqxETMNIpM6Y
Malware Config
Extracted
qakbot
402.363
obama108
1633342139
206.47.134.234:2222
73.230.205.91:443
190.198.206.189:2222
103.246.130.2:20
103.246.130.122:20
81.250.153.227:2222
167.248.100.227:443
37.210.152.224:995
96.57.188.174:2078
2.99.100.134:2222
217.17.56.163:2222
217.17.56.163:2078
41.228.22.180:443
136.232.34.70:443
68.186.192.69:443
167.248.111.245:443
81.241.252.59:2078
94.200.181.154:443
96.46.103.226:443
187.116.124.82:995
73.130.180.25:443
73.52.50.32:443
120.151.47.189:443
47.22.148.6:443
124.123.42.115:2222
208.89.170.179:443
86.8.177.143:443
73.77.87.137:443
73.25.124.140:2222
181.118.183.94:443
109.12.111.14:443
89.101.97.139:443
216.201.162.158:443
105.198.236.99:443
188.210.210.122:0
174.54.58.170:443
24.152.219.253:995
103.142.10.177:443
75.75.179.226:443
185.250.148.74:443
122.11.220.212:2222
120.150.218.241:995
103.148.120.144:443
140.82.49.12:443
40.131.140.155:995
103.157.122.198:995
76.25.142.196:443
45.46.53.140:2222
173.21.10.71:2222
75.89.195.186:995
67.165.206.193:993
71.74.12.34:443
24.119.214.7:443
75.66.88.33:443
73.151.236.31:443
159.2.51.200:2222
78.191.36.142:995
75.188.35.168:443
95.77.223.148:443
110.174.64.179:995
47.40.196.233:2222
201.93.111.2:995
187.56.71.109:995
187.101.25.96:32100
174.54.193.186:443
76.84.230.103:443
174.59.35.191:443
173.63.245.129:443
24.139.72.117:443
72.252.201.69:443
68.117.229.117:443
167.248.117.81:443
75.163.81.130:995
76.84.32.159:443
147.92.51.49:443
167.248.99.149:443
68.204.7.158:443
76.84.226.17:443
68.13.157.69:443
167.248.126.223:443
69.30.186.190:443
72.196.22.184:443
167.248.23.224:443
98.22.92.139:995
209.50.20.255:443
97.98.130.50:443
196.117.37.214:995
77.57.204.78:443
191.191.38.8:443
176.251.215.116:443
96.46.103.109:2222
188.210.210.122:443
37.117.191.19:2222
90.197.155.33:443
197.90.137.161:61201
70.37.217.196:443
24.32.174.175:443
76.84.225.21:443
78.145.153.73:995
69.30.190.105:995
167.248.81.60:443
69.80.113.148:443
217.17.56.163:443
39.52.236.68:995
71.190.231.182:443
62.23.194.38:443
62.23.194.41:995
173.25.166.81:443
199.27.127.129:443
24.229.150.54:995
189.210.115.207:443
174.59.226.6:443
73.130.237.36:443
69.253.197.100:443
174.59.242.9:443
177.130.82.197:2222
67.214.30.12:995
24.55.112.61:443
174.59.120.69:443
47.181.84.61:443
73.130.239.166:443
217.165.163.21:995
93.8.66.216:443
73.52.114.202:443
186.18.205.199:995
38.10.202.214:443
78.191.44.76:443
96.83.180.29:443
124.123.42.115:2078
105.159.144.186:995
27.223.92.142:995
109.190.253.11:2222
217.17.56.163:465
38.10.201.211:443
92.148.59.207:2222
92.157.171.41:2222
186.87.135.68:995
80.6.192.58:443
187.156.138.172:443
82.77.137.101:995
173.234.155.233:443
5.238.148.193:61202
182.176.112.182:443
96.37.113.36:993
162.244.227.34:443
92.59.35.196:2222
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Ctflrvup = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Uxhoagv = "0" reg.exe -
Loads dropped DLL 1 IoCs
pid Process 988 regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Modifies data under HKEY_USERS 10 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Igokagiwp\f01b8bdb = 1bf242521709fb6dafdd3edab59a49e199bfc91c318e12accd491ca159902ee60906f3 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Igokagiwp\c5845b95 = b79b10341d0a58896886bfa10f7cdb28d216f9e365349009030bbec910381a6dc8d9161d515d84293c66f26d0d1ead59d3042b92e76cf98b36614e2471be64e1992f01c8a76ac9232be6cdb664a178a702e797726b1d3a3683fc0fc916e767ce723685f1b68dc8a9f087d837dfb09c75e3496900c56ca91d55fca1 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Igokagiwp\c7c57be9 = c19275412968a5aa18ce7db14b153f1dd2aefabc6243fa7295bed4cef10989 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Igokagiwp\7f791c8c = 2481273f1674c30e01087820fea307e6b8 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Igokagiwp\2715306 = f50bd33cda929dd8ff767f25dcfd8aa37d4100f856417bb9b475da3f524ce4994cc817877c explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Igokagiwp\7d383cf0 = 6f22aa0b490e4939850928b18ba65287068be58cf7ea explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Igokagiwp\f01b8bdb = 1bf255521709ce7e9d628bd982d71cc8a307224e81e5c015f6014241701cc193673cce4fc5cd17000fb0a233e4e6be4da5633b388e46f32e explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Igokagiwp explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Igokagiwp\bacd3463 = e4df0bd37d90a17dc085a1bd0d76aa04b31c0c250528b54fcffbd26590ca047304c5333078c9f78be8e66e527ab705ea3d19844a02b4 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Igokagiwp\8f52e42d = 747f60fa6a2757aa2c74121f2b2f2c4f757c33c8d16233d505f365aa20ede9f750c6fa8063e978fbbc0fea758c4d1168737c6bca17a85a5eae4fbff476104d9131ce242a260b163776e3a45047c147b8fbd6d1f57a70b018a178fbf41c64 explorer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2776 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2348 rundll32.exe 988 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2348 rundll32.exe 988 regsvr32.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2348 2324 rundll32.exe 31 PID 2324 wrote to memory of 2348 2324 rundll32.exe 31 PID 2324 wrote to memory of 2348 2324 rundll32.exe 31 PID 2324 wrote to memory of 2348 2324 rundll32.exe 31 PID 2324 wrote to memory of 2348 2324 rundll32.exe 31 PID 2324 wrote to memory of 2348 2324 rundll32.exe 31 PID 2324 wrote to memory of 2348 2324 rundll32.exe 31 PID 2348 wrote to memory of 2408 2348 rundll32.exe 32 PID 2348 wrote to memory of 2408 2348 rundll32.exe 32 PID 2348 wrote to memory of 2408 2348 rundll32.exe 32 PID 2348 wrote to memory of 2408 2348 rundll32.exe 32 PID 2348 wrote to memory of 2408 2348 rundll32.exe 32 PID 2348 wrote to memory of 2408 2348 rundll32.exe 32 PID 2408 wrote to memory of 2776 2408 explorer.exe 33 PID 2408 wrote to memory of 2776 2408 explorer.exe 33 PID 2408 wrote to memory of 2776 2408 explorer.exe 33 PID 2408 wrote to memory of 2776 2408 explorer.exe 33 PID 1724 wrote to memory of 1064 1724 taskeng.exe 36 PID 1724 wrote to memory of 1064 1724 taskeng.exe 36 PID 1724 wrote to memory of 1064 1724 taskeng.exe 36 PID 1724 wrote to memory of 1064 1724 taskeng.exe 36 PID 1724 wrote to memory of 1064 1724 taskeng.exe 36 PID 1064 wrote to memory of 988 1064 regsvr32.exe 37 PID 1064 wrote to memory of 988 1064 regsvr32.exe 37 PID 1064 wrote to memory of 988 1064 regsvr32.exe 37 PID 1064 wrote to memory of 988 1064 regsvr32.exe 37 PID 1064 wrote to memory of 988 1064 regsvr32.exe 37 PID 1064 wrote to memory of 988 1064 regsvr32.exe 37 PID 1064 wrote to memory of 988 1064 regsvr32.exe 37 PID 988 wrote to memory of 2168 988 regsvr32.exe 38 PID 988 wrote to memory of 2168 988 regsvr32.exe 38 PID 988 wrote to memory of 2168 988 regsvr32.exe 38 PID 988 wrote to memory of 2168 988 regsvr32.exe 38 PID 988 wrote to memory of 2168 988 regsvr32.exe 38 PID 988 wrote to memory of 2168 988 regsvr32.exe 38 PID 2168 wrote to memory of 2588 2168 explorer.exe 39 PID 2168 wrote to memory of 2588 2168 explorer.exe 39 PID 2168 wrote to memory of 2588 2168 explorer.exe 39 PID 2168 wrote to memory of 2588 2168 explorer.exe 39 PID 2168 wrote to memory of 2420 2168 explorer.exe 41 PID 2168 wrote to memory of 2420 2168 explorer.exe 41 PID 2168 wrote to memory of 2420 2168 explorer.exe 41 PID 2168 wrote to memory of 2420 2168 explorer.exe 41
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cb3ed0fab377c48841597c09e0fec1f1_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cb3ed0fab377c48841597c09e0fec1f1_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn olqaltnluw /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\cb3ed0fab377c48841597c09e0fec1f1_JaffaCakes118.dll\"" /SC ONCE /Z /ST 16:50 /ET 17:024⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2776
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {F6F04963-8848-4DF3-8BEB-441A8967E354} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\cb3ed0fab377c48841597c09e0fec1f1_JaffaCakes118.dll"2⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\cb3ed0fab377c48841597c09e0fec1f1_JaffaCakes118.dll"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Ctflrvup" /d "0"5⤵
- Windows security bypass
PID:2588
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Uxhoagv" /d "0"5⤵
- Windows security bypass
PID:2420
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD5cb3ed0fab377c48841597c09e0fec1f1
SHA16e74569cc356139e1892732fcc97a6ec94c6240e
SHA2566cd4744b21f0f2f3145ff26150d7c8db36da68a4cf5d7ba7346cd2a31569c871
SHA512ecb20de8b435db88f766dd03344ca96a06c7b60392deafdb21fa4e1b2f675a33ed7117294d74bf6395cb79157b438fca7ea53ad26d5cfdc578da59703d662079