Analysis
-
max time kernel
93s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 18:29
Static task
static1
Behavioral task
behavioral1
Sample
d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe
-
Size
14KB
-
MD5
d6dfabf4120eb00a512e6e7c4a4d7330
-
SHA1
a94899ac76234dfc92cf7d5995dd2e6cab57f93e
-
SHA256
fdca4927824dc3ab6bfd9c217fe1e3650d0154d8cbdec936688b1234cc143f78
-
SHA512
881dd0e64bf16ce015f5ff86ba2c2635abf80f37837715e1a6471058efb3deb66061f3b42b1de8c24f0113bf287d8fb41b9875ad7874e7f3ca539f44af8fa3ad
-
SSDEEP
384:HVJ87NR32T3Oy8t3GOBcWlXx/LxFphz/XDvFEW8:r8ZR5GOFx/phz/XDNEW8
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer\run d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\nvctrl.exe = "nvctrl.exe" d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 4384 d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe 4384 d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe -
Installs/modifies Browser Helper Object 2 TTPs 5 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{e0103cd4-d1ce-411a-b75b-4fec072867f4} d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{e0103cd4-d1ce-411a-b75b-4fec072867f4}\ d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\ncompat.tlb d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe File created C:\Windows\SysWOW64\msvol.tlb d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe File created C:\Windows\SysWOW64\hpAF5A.tmp d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ncompat.tlb d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Main d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Search d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\SearchUrl d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe -
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0103CD4-D1CE-411A-B75B-4FEC072867F4}\InprocServer32\ = "C:\\Windows\\SysWow64\\hpAF5A.tmp" d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0103CD4-D1CE-411A-B75B-4FEC072867F4}\InprocServer32\ThreadingModel = "Apartment" d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{e0103cd4-d1ce-411a-b75b-4fec072867f4}\InprocServer32 d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0103CD4-D1CE-411A-B75B-4FEC072867F4} d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0103CD4-D1CE-411A-B75B-4FEC072867F4}\ = "Restorator" d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0103CD4-D1CE-411A-B75B-4FEC072867F4}\InprocServer32 d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d6dfabf4120eb00a512e6e7c4a4d7330_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:4384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5e0ef0f678adda3dc92b60e4a5d786fe1
SHA1479f39fc02adc4e706c2c3c77241da6064d8ba94
SHA25645020a8c80c47f4c4d8b1f35cb37de6c0e0b93d507188ed4b9a13b5e3d9d8a92
SHA5129e346bdc10f4133de393bb018d626c63a492174747653d4c5b6418b524b647c331443d24dfa0ae80ca2f9c604cf349627c75e63a9237f8b3dfd8be70c609be5a
-
Filesize
5KB
MD507332c7eb6f5b3adb7f314413aaef7c5
SHA195d86f2b37c01c345acb37b204d2ca871cfc84dc
SHA2560e032943cfaa9405170ec4590e811f9fa17130cf5bb1055a50053cb3cc99d885
SHA5127ed5bbf2776f02dd951d2901cf23ccd3e558137b6c098d5c61dc8246a9e00502820abe82c6911fa27bcd4f347d1154487457879df0670b924a7939c5bf43343d