Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2024 16:47
Static task
static1
Behavioral task
behavioral1
Sample
cb3ed0fab377c48841597c09e0fec1f1_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
cb3ed0fab377c48841597c09e0fec1f1_JaffaCakes118.dll
-
Size
506KB
-
MD5
cb3ed0fab377c48841597c09e0fec1f1
-
SHA1
6e74569cc356139e1892732fcc97a6ec94c6240e
-
SHA256
6cd4744b21f0f2f3145ff26150d7c8db36da68a4cf5d7ba7346cd2a31569c871
-
SHA512
ecb20de8b435db88f766dd03344ca96a06c7b60392deafdb21fa4e1b2f675a33ed7117294d74bf6395cb79157b438fca7ea53ad26d5cfdc578da59703d662079
-
SSDEEP
12288:4W7OY3YTn155L/9hFTMq2EKMAcuCSF7aqxETMNIp0Fh6zUV:4Wf3YTnJLBv2EKMAcOgqxETMNIpM6Y
Malware Config
Extracted
qakbot
402.363
obama108
1633342139
206.47.134.234:2222
73.230.205.91:443
190.198.206.189:2222
103.246.130.2:20
103.246.130.122:20
81.250.153.227:2222
167.248.100.227:443
37.210.152.224:995
96.57.188.174:2078
2.99.100.134:2222
217.17.56.163:2222
217.17.56.163:2078
41.228.22.180:443
136.232.34.70:443
68.186.192.69:443
167.248.111.245:443
81.241.252.59:2078
94.200.181.154:443
96.46.103.226:443
187.116.124.82:995
73.130.180.25:443
73.52.50.32:443
120.151.47.189:443
47.22.148.6:443
124.123.42.115:2222
208.89.170.179:443
86.8.177.143:443
73.77.87.137:443
73.25.124.140:2222
181.118.183.94:443
109.12.111.14:443
89.101.97.139:443
216.201.162.158:443
105.198.236.99:443
188.210.210.122:0
174.54.58.170:443
24.152.219.253:995
103.142.10.177:443
75.75.179.226:443
185.250.148.74:443
122.11.220.212:2222
120.150.218.241:995
103.148.120.144:443
140.82.49.12:443
40.131.140.155:995
103.157.122.198:995
76.25.142.196:443
45.46.53.140:2222
173.21.10.71:2222
75.89.195.186:995
67.165.206.193:993
71.74.12.34:443
24.119.214.7:443
75.66.88.33:443
73.151.236.31:443
159.2.51.200:2222
78.191.36.142:995
75.188.35.168:443
95.77.223.148:443
110.174.64.179:995
47.40.196.233:2222
201.93.111.2:995
187.56.71.109:995
187.101.25.96:32100
174.54.193.186:443
76.84.230.103:443
174.59.35.191:443
173.63.245.129:443
24.139.72.117:443
72.252.201.69:443
68.117.229.117:443
167.248.117.81:443
75.163.81.130:995
76.84.32.159:443
147.92.51.49:443
167.248.99.149:443
68.204.7.158:443
76.84.226.17:443
68.13.157.69:443
167.248.126.223:443
69.30.186.190:443
72.196.22.184:443
167.248.23.224:443
98.22.92.139:995
209.50.20.255:443
97.98.130.50:443
196.117.37.214:995
77.57.204.78:443
191.191.38.8:443
176.251.215.116:443
96.46.103.109:2222
188.210.210.122:443
37.117.191.19:2222
90.197.155.33:443
197.90.137.161:61201
70.37.217.196:443
24.32.174.175:443
76.84.225.21:443
78.145.153.73:995
69.30.190.105:995
167.248.81.60:443
69.80.113.148:443
217.17.56.163:443
39.52.236.68:995
71.190.231.182:443
62.23.194.38:443
62.23.194.41:995
173.25.166.81:443
199.27.127.129:443
24.229.150.54:995
189.210.115.207:443
174.59.226.6:443
73.130.237.36:443
69.253.197.100:443
174.59.242.9:443
177.130.82.197:2222
67.214.30.12:995
24.55.112.61:443
174.59.120.69:443
47.181.84.61:443
73.130.239.166:443
217.165.163.21:995
93.8.66.216:443
73.52.114.202:443
186.18.205.199:995
38.10.202.214:443
78.191.44.76:443
96.83.180.29:443
124.123.42.115:2078
105.159.144.186:995
27.223.92.142:995
109.190.253.11:2222
217.17.56.163:465
38.10.201.211:443
92.148.59.207:2222
92.157.171.41:2222
186.87.135.68:995
80.6.192.58:443
187.156.138.172:443
82.77.137.101:995
173.234.155.233:443
5.238.148.193:61202
182.176.112.182:443
96.37.113.36:993
162.244.227.34:443
92.59.35.196:2222
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Jaayy = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Qsjvohk = "0" reg.exe -
Loads dropped DLL 1 IoCs
pid Process 1576 regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Modifies data under HKEY_USERS 10 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Oasayfye\6aeb02d = 2995503ad61dafd66f8d2f0f0baf7925a00f8e6d6e290429a7964dd85d46c8730daf5ff258683e962d003371d703dad9711c29fc23fd2dd4ad3a2dbccf48a5e95054b75054ef4282f3d4f2b0af4c4847568c3153b422b379 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Oasayfye\f685488c = b2a6cd5d17829d64522a0a0a6762db958f8f8098ef837cb81c199650bbe1d628a184170e73361930614ee16b388ecb95743636a00a5bcbdd1b5f199a3346a142606f12eb96b7b9e84698d4434d669756f741db68e16cabdc6bc2805991a3a8e7a6 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Oasayfye\f4c468f0 = 753c3e1739c8f34305b585d696387d3349dea6df56d96097ab65845ed5ca6251f387a71fa85a9103bc258ac4c5332837148a1d1554886c58fd633bccc521fa36494aced5e7d87f50426307f82c explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Oasayfye\4c780f95 = 633af5d308020a124643796183b6bd3f4bf60581cdc920fd75b686a0a9d6720fd2e7246a6642cb83cea5a343a1ebf9f5a54b3ac187c540f43247621076f24695a4cd40676848504c1e075636da76aad31beecbbda17192179a6b1e15fbea86448dc7ddb6cd538bcc7dc3f3513ef3746a011561762e9259557833f4be4eddd39655113b11b9d3ff1a9c1dd76d1f74eb27fc58cecddad90ac415f98a9a50dbbf4dd77f7954ad55407c75af94 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Oasayfye\4e392fe9 = e5c22e1a229ed6fee66e2c41c0261184777c9f4b1d1cdf2ea230a16f421487eddee7127373b4257bc9b492e080bae20aa5b978be6d4269553ac102a8dcdab278589e20b29c9fd40bc00edb37020126ac04 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Oasayfye\8b8d0706 = 68507e344ca761f11f17221e0e8efea47c4ccc2fc71d23188f1be27934a9ac24074056af explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Oasayfye\33316063 = fe58284bb4e66bb3bf8f0f5e0c2fb08ca9b5cede14 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Oasayfye\79e7dfdb = 0c7227cab64834668fa00a60d05da66a7fd0b38ef39f1c846727dc31ea6ea94c984b790d954d1f09dcb1a8df4ea83078a2205943cdbed2b42c475b77136cadb8869d06498fdd1eb5fec82d35cfb6b03c3759eb65397d02987da285ce7f2108863bf4438e7f explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Oasayfye explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Oasayfye\79e7dfdb = 0c7230cab648010ef50863fee246f20b94904d943e91f2836069fadd569eec4a046d71b37ef6ba01315f0a03042a48502b9bd477c4f8dd9c4150772a753549c2612845d49ad49380e3b1ee3f65de19d5 explorer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4260 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4248 rundll32.exe 4248 rundll32.exe 1576 regsvr32.exe 1576 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4248 rundll32.exe 1576 regsvr32.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 652 wrote to memory of 4248 652 rundll32.exe 84 PID 652 wrote to memory of 4248 652 rundll32.exe 84 PID 652 wrote to memory of 4248 652 rundll32.exe 84 PID 4248 wrote to memory of 3756 4248 rundll32.exe 95 PID 4248 wrote to memory of 3756 4248 rundll32.exe 95 PID 4248 wrote to memory of 3756 4248 rundll32.exe 95 PID 4248 wrote to memory of 3756 4248 rundll32.exe 95 PID 4248 wrote to memory of 3756 4248 rundll32.exe 95 PID 3756 wrote to memory of 4260 3756 explorer.exe 96 PID 3756 wrote to memory of 4260 3756 explorer.exe 96 PID 3756 wrote to memory of 4260 3756 explorer.exe 96 PID 1576 wrote to memory of 5008 1576 regsvr32.exe 110 PID 1576 wrote to memory of 5008 1576 regsvr32.exe 110 PID 1576 wrote to memory of 5008 1576 regsvr32.exe 110 PID 1576 wrote to memory of 5008 1576 regsvr32.exe 110 PID 1576 wrote to memory of 5008 1576 regsvr32.exe 110 PID 5008 wrote to memory of 640 5008 explorer.exe 111 PID 5008 wrote to memory of 640 5008 explorer.exe 111 PID 5008 wrote to memory of 3660 5008 explorer.exe 113 PID 5008 wrote to memory of 3660 5008 explorer.exe 113
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cb3ed0fab377c48841597c09e0fec1f1_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cb3ed0fab377c48841597c09e0fec1f1_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn ysaswncjtd /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\cb3ed0fab377c48841597c09e0fec1f1_JaffaCakes118.dll\"" /SC ONCE /Z /ST 16:50 /ET 17:024⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4260
-
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\cb3ed0fab377c48841597c09e0fec1f1_JaffaCakes118.dll"1⤵PID:4436
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\cb3ed0fab377c48841597c09e0fec1f1_JaffaCakes118.dll"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Jaayy" /d "0"4⤵
- Windows security bypass
PID:640
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Qsjvohk" /d "0"4⤵
- Windows security bypass
PID:3660
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD5cb3ed0fab377c48841597c09e0fec1f1
SHA16e74569cc356139e1892732fcc97a6ec94c6240e
SHA2566cd4744b21f0f2f3145ff26150d7c8db36da68a4cf5d7ba7346cd2a31569c871
SHA512ecb20de8b435db88f766dd03344ca96a06c7b60392deafdb21fa4e1b2f675a33ed7117294d74bf6395cb79157b438fca7ea53ad26d5cfdc578da59703d662079