Analysis
-
max time kernel
92s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 04:32
Static task
static1
Behavioral task
behavioral1
Sample
d38bd25958ef03023922b69ded4c4d94_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d38bd25958ef03023922b69ded4c4d94_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
C:/Program Files/Internet Explorer/IEXPL0RE.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
C:/Program Files/Internet Explorer/IEXPL0RE.exe
Resource
win10v2004-20240802-en
General
-
Target
d38bd25958ef03023922b69ded4c4d94_JaffaCakes118.exe
-
Size
347KB
-
MD5
d38bd25958ef03023922b69ded4c4d94
-
SHA1
2a426d8556768b7a83b71f17e32ca4cdaa5a1034
-
SHA256
c0a8580cb4cd5586fdd1d7c78beea9eee1909ced7fb24afdecea4f9d43139126
-
SHA512
b459d1fbe8605c68d600759919655cb5ef2446db189b9396d31ea73a0a2fd24b7c04b42379bdebe3729e520b5c99e713f0902ae15d04dbfa2ab1432aa66c2ff9
-
SSDEEP
6144:85O8s31cy0QeVTG0SdBBMrSRat3Rw3DfZRf8wb0qSEicbQ7e7cpaGKX:R/1cy6G5/8SJ1SwbvSJEX
Malware Config
Signatures
-
Blocks application from running via registry modification 1 IoCs
Adds application to list of disallowed applications.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun regedit.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\1.reg d38bd25958ef03023922b69ded4c4d94_JaffaCakes118.exe File created C:\Program Files\Internet Explorer\2.reg d38bd25958ef03023922b69ded4c4d94_JaffaCakes118.exe File created C:\Program Files\Internet Explorer\3.reg d38bd25958ef03023922b69ded4c4d94_JaffaCakes118.exe File created C:\Program Files\Internet Explorer\ie.reg d38bd25958ef03023922b69ded4c4d94_JaffaCakes118.exe File created C:\Program Files\Internet Explorer\IEXPL0RE.exe d38bd25958ef03023922b69ded4c4d94_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d38bd25958ef03023922b69ded4c4d94_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe -
Modifies registry class 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EC6F8951-C12D-0AEE-6338-5213BF6AE96C}\InProcServer32 regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EC6F8951-C12D-0AEE-6338-5213BF6AE96C}\InProcServer32\ThreadingModel = "Apartment" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EC6F8951-C12D-0AEE-6338-5213BF6AE96C}\Shell\OpenHomePage\Command\ = "\"C:\\Program Files\\Internet Explorer\\iexpl0re.exe\"" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EC6F8951-C12D-0AEE-6338-5213BF6AE96C}\LocalizedString = "@shdoclc.dll,-880" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EC6F8951-C12D-0AEE-6338-5213BF6AE96C}\DefaultIcon\ = "shdoclc.dll,-190" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EC6F8951-C12D-0AEE-6338-5213BF6AE96C}\DefaultIcon regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EC6F8951-C12D-0AEE-6338-5213BF6AE96C}\Shell\OpenHomePage\MUIVerb = "@shdoclc.dll,-10241" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EC6F8951-C12D-0AEE-6338-5213BF6AE96C}\Shell\OpenHomePage\Command regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EC6F8951-C12D-0AEE-6338-5213BF6AE96C}\ShellFolder\HideFolderVerbs regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EC6F8951-C12D-0AEE-6338-5213BF6AE96C}\ShellFolder\WantsParseDisplayName regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EC6F8951-C12D-0AEE-6338-5213BF6AE96C} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EC6F8951-C12D-0AEE-6338-5213BF6AE96C}\InfoTip = "@shdoclc.dll,-881" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EC6F8951-C12D-0AEE-6338-5213BF6AE96C}\ShellFolder\HideOnDesktopPerUser regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EC6F8951-C12D-0AEE-6338-5213BF6AE96C}\InProcServer32\ = "%SystemRoot%\\SysWow64\\shdocvw.dll" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EC6F8951-C12D-0AEE-6338-5213BF6AE96C}\ShellFolder regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EC6F8951-C12D-0AEE-6338-5213BF6AE96C}\Shell\OpenHomePage regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EC6F8951-C12D-0AEE-6338-5213BF6AE96C}\Shell\OpenHomePage\ = "打开主页(&H)" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EC6F8951-C12D-0AEE-6338-5213BF6AE96C}\ShellFolder\Attributes = "0" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EC6F8951-C12D-0AEE-6338-5213BF6AE96C}\Shell regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EC6F8951-C12D-0AEE-6338-5213BF6AE96C}\Shell\ = "OpenHomePage" regedit.exe -
Runs .reg file with regedit 3 IoCs
pid Process 4232 regedit.exe 732 regedit.exe 1072 regedit.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4148 wrote to memory of 4232 4148 d38bd25958ef03023922b69ded4c4d94_JaffaCakes118.exe 83 PID 4148 wrote to memory of 4232 4148 d38bd25958ef03023922b69ded4c4d94_JaffaCakes118.exe 83 PID 4148 wrote to memory of 4232 4148 d38bd25958ef03023922b69ded4c4d94_JaffaCakes118.exe 83 PID 4148 wrote to memory of 732 4148 d38bd25958ef03023922b69ded4c4d94_JaffaCakes118.exe 85 PID 4148 wrote to memory of 732 4148 d38bd25958ef03023922b69ded4c4d94_JaffaCakes118.exe 85 PID 4148 wrote to memory of 732 4148 d38bd25958ef03023922b69ded4c4d94_JaffaCakes118.exe 85 PID 4148 wrote to memory of 1072 4148 d38bd25958ef03023922b69ded4c4d94_JaffaCakes118.exe 86 PID 4148 wrote to memory of 1072 4148 d38bd25958ef03023922b69ded4c4d94_JaffaCakes118.exe 86 PID 4148 wrote to memory of 1072 4148 d38bd25958ef03023922b69ded4c4d94_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d38bd25958ef03023922b69ded4c4d94_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d38bd25958ef03023922b69ded4c4d94_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\regedit.exeregedit.exe /s 1.reg2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Runs .reg file with regedit
PID:4232
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s 2.reg2⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:732
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s 3.reg2⤵
- Blocks application from running via registry modification
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD50d0f3e9c92aaf09ce36362d68809e0bf
SHA1eb42a785649408e1166951a268f0a9eca4cd2a89
SHA2563c752fb18450e212e2faaeee5bb5f17eec5b8a82bb517cd248595da13743c11b
SHA512d17734b1fdc75e4eadbaac8f346d12d156beb4f290593e82582a1dc0b0c720f35b0c820565577f3fe6fc518103b96972a637db914591f122603ac7abd5526f6c
-
Filesize
358B
MD57df64c2f984a856c37da26eb7de9113a
SHA15ca68487e8ea27209736e588b8e3a61850c50ce0
SHA256bc98f5f5592d7bd8d98df4b6cd68864b061a3c4c9f818bb4318ef64e351fef52
SHA512f3153d44db726e7ef259aceb665c7aad2e1688e1f2b28ca06d072788e014581eae10ab667912c8fd34e4d7b7d1b9949446d83de729189aa57d4ab5a24b61ffb4
-
Filesize
586B
MD5e7472bffd558ccc71a6e923a084e9c84
SHA132329185d47a9c46fef10636ace66b001d56aee0
SHA256423800bfdb6b7542b541345f04c4604216a7cbb64553d7cfd690071bf418d686
SHA5122e0d807003e0f94eeb61a2fabce1eb7fcf51053b9d68875ec7e11d90b00c06052be470f62d2ba0117e122a872d176918513d5d3ab2ccb57335cbc2e394245abf