Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 09:47

General

  • Target

    cf430d21a88574f080c16bc881b01d33_JaffaCakes118.exe

  • Size

    65KB

  • MD5

    cf430d21a88574f080c16bc881b01d33

  • SHA1

    47d6b48eea1d870ceff8bb3e7446aae8fa4999a8

  • SHA256

    1dc9bf158a21e540576ebbd71a95335d4f8353f7b7293168c82227e9d11216a0

  • SHA512

    a0eab101943c05e10193831cc797c87eb080b260773b099a44c922ed095df5b8387a97bb5b287ca3fdad30ebc9e665e1da4aa852c887448f6d78ee20523ecce7

  • SSDEEP

    1536:NhBoWdHaDL1UOUc01anifKUYJFqLa4oqi:NcWdHaDhocDGKU4t4oqi

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 28 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 30 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 11 IoCs
  • Runs .reg file with regedit 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf430d21a88574f080c16bc881b01d33_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cf430d21a88574f080c16bc881b01d33_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2480
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c C:\Users\Admin\AppData\Local\Temp\bt15318.bat "C:\Users\Admin\AppData\Local\Temp\cf430d21a88574f080c16bc881b01d33_JaffaCakes118.exe"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2524
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableRegistryTools /t reg_dword /d 00000000 /f
        3⤵
        • Disables RegEdit via registry modification
        • System Location Discovery: System Language Discovery
        PID:2084
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v HideFileExt /t reg_dword /d 00000000 /f
        3⤵
        • Modifies visibility of file extensions in Explorer
        • System Location Discovery: System Language Discovery
        PID:1148
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Hidden /t reg_dword /d 00000000 /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1368
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v ShowSuperHidden /t reg_dword /d 00000000 /f
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • System Location Discovery: System Language Discovery
        PID:2316
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v HideFileExt /t reg_dword /d 00000001 /f
        3⤵
        • Modifies visibility of file extensions in Explorer
        • System Location Discovery: System Language Discovery
        PID:2336
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL" /v CheckedValue /t reg_dword /d 00000000 /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2332
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel" /v {871C5380-42A0-1069-A2EA-08002B30309D} /t reg_dword /d 00000001 /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2040
      • C:\Windows\SysWOW64\regedit.exe
        regedit /s C:\Windows\jiantou.reg
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Runs .reg file with regedit
        PID:924
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoInternetIcon /t reg_dword /d 00000001 /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2320
      • C:\Windows\SysWOW64\regedit.exe
        REGEDIT /S "C:\Users\Admin\AppData\Local\Temp.\DefOpen.reg"
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Runs .reg file with regedit
        PID:2448
      • C:\Windows\SysWOW64\regedit.exe
        REGEDIT /S "C:\Users\Admin\AppData\Local\Temp.\DefOpen.reg"
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Runs .reg file with regedit
        PID:2704
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Runonce" /v kacvc /t reg_sz /d c:\WINDOWS\system32\drivers\kavx.exe /f
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:2700
      • C:\Windows\SysWOW64\gpupdate.exe
        gpupdate.exe /force
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2812
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\theworld.exe" /v Debugger /t reg_sz /d C:\WINDOWS\system32\iexplore.EXE /f
        3⤵
        • Event Triggered Execution: Image File Execution Options Injection
        • System Location Discovery: System Language Discovery
        PID:2548
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe" /v Debugger /t reg_sz /d C:\WINDOWS\system32\iexplore.EXE /f
        3⤵
        • Event Triggered Execution: Image File Execution Options Injection
        • System Location Discovery: System Language Discovery
        PID:2544
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\opera.exe" /v Debugger /t reg_sz /d C:\WINDOWS\system32\iexplore.EXE /f
        3⤵
        • Event Triggered Execution: Image File Execution Options Injection
        • System Location Discovery: System Language Discovery
        PID:2564
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Maxthon.exe" /v Debugger /t reg_sz /d C:\WINDOWS\system32\iexplore.EXE /f
        3⤵
        • Event Triggered Execution: Image File Execution Options Injection
        • System Location Discovery: System Language Discovery
        PID:2580
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chrome.exe" /v Debugger /t reg_sz /d C:\WINDOWS\system32\iexplore.EXE /f
        3⤵
        • Event Triggered Execution: Image File Execution Options Injection
        • System Location Discovery: System Language Discovery
        PID:2600
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TTraveler.exe" /v Debugger /t reg_sz /d C:\WINDOWS\system32\iexplore.EXE /f
        3⤵
        • Event Triggered Execution: Image File Execution Options Injection
        • System Location Discovery: System Language Discovery
        PID:2624
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hsreg.exe" /v Debugger /t reg_sz /d C:\WINDOWS\ctfmon.exe /f
        3⤵
        • Event Triggered Execution: Image File Execution Options Injection
        • System Location Discovery: System Language Discovery
        PID:2672
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.exe" /v Debugger /t reg_sz /d C:\WINDOWS\ctfmon.exe /f
        3⤵
        • Event Triggered Execution: Image File Execution Options Injection
        • System Location Discovery: System Language Discovery
        PID:3064
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe" /v Debugger /t reg_sz /d C:\WINDOWS\ctfmon.exe /f
        3⤵
        • Event Triggered Execution: Image File Execution Options Injection
        • System Location Discovery: System Language Discovery
        PID:652
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\srgui.exe" /v Debugger /t reg_sz /d C:\WINDOWS\ctfmon.exe /f
        3⤵
        • Event Triggered Execution: Image File Execution Options Injection
        • System Location Discovery: System Language Discovery
        PID:2004
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sriecli.exe" /v Debugger /t reg_sz /d C:\WINDOWS\ctfmon.exe /f
        3⤵
        • Event Triggered Execution: Image File Execution Options Injection
        • System Location Discovery: System Language Discovery
        PID:2424
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safe.exe" /v Debugger /t reg_sz /d C:\WINDOWS\ctfmon.exe /f
        3⤵
        • Event Triggered Execution: Image File Execution Options Injection
        • System Location Discovery: System Language Discovery
        PID:3068
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RSTray.exe" /v Debugger /t reg_sz /d C:\WINDOWS\system32\kavy.exe /f
        3⤵
        • Event Triggered Execution: Image File Execution Options Injection
        • System Location Discovery: System Language Discovery
        PID:2248
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GreenBrowser.exe" /v Debugger /t reg_sz /d C:\WINDOWS\system3\iexplore.EXE /f
        3⤵
        • Event Triggered Execution: Image File Execution Options Injection
        • System Location Discovery: System Language Discovery
        PID:1520
      • C:\Windows\SysWOW64\attrib.exe
        ATTRIB -H -R -S -A c:\GRLDR
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2080

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\DefOpen.reg

          Filesize

          217B

          MD5

          eb05fdeaddc8bac55faebc8da0561c6b

          SHA1

          e5e371be9894c9593774f4319e7f1d0274eb0f03

          SHA256

          87c5552b74991369e61ab4228c1b15a2047c6de79bd60c483293bb9200fdd91b

          SHA512

          95d616a03d1000f6abf139f6791bf3f257bee861c49419e6cfd90b579b56c2162b8f863265c219f147cb833e7d6d9b392214c9b6ecec0cdf63df3f79b3a7dd99

        • C:\Users\Admin\AppData\Local\Temp\DefOpen.reg

          Filesize

          229B

          MD5

          0a99bb0fbc273298d23aefea136a870d

          SHA1

          089c95ef3a22b4afc6e1828a69558b34425b2918

          SHA256

          b344aa402eb89946e109900bea40871b4ee23f12b28ac640c184cd9a7bf897fb

          SHA512

          04ce4f6ab65590061ffd5fdb4b236cbec9e2aba95f513bacfcd0d0170994db9def4fba6271ecc85e90e8babee5e69caf57c1b2657ca5b3bec6038cf91948d0fd

        • C:\Users\Admin\AppData\Local\Temp\bt15318.bat

          Filesize

          5KB

          MD5

          a1f75c8ae94e9d3ef059481bee42a087

          SHA1

          2b3f212f6449adfe6289f15ecd030bc194e11a59

          SHA256

          3de561aa2b926f3a486df3e26b56b8da4f843bc06ecfdaca286b839213a13dc9

          SHA512

          f0e714951d81594e675b57266cab706469fdbfff50b8c0989bb84f061287374bcc1027681acf0055af058ae44ca4c177104f516b501fa021a52f85f9542ff94d

        • C:\Windows\jiantou.reg

          Filesize

          129B

          MD5

          a2d95ae638ce4b14357c46de3e575cfa

          SHA1

          3f8ee00f17676d5899ee25895477cd566b544abd

          SHA256

          180885b4a0ddf6a090daacb6dd0078c06e9ef6903b6594df769aa35b3e547041

          SHA512

          1d8cbcf527f7b16d79a9eab20db0238e473bcb900f9dda4fffa73ffdc908da32591d453203c572c91c9af38ed371c07364486e299e46a5b058283385de3c0564

        • memory/2480-31-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB