Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 03:51
Behavioral task
behavioral1
Sample
dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe
-
Size
293KB
-
MD5
dbc292a2292c6061700236830d45ca91
-
SHA1
fcdfba4b95c145a715209d694639de6be0478f6b
-
SHA256
e60fc4473ada26f3a8d2dd5c5f226441073bf86737e271f6f2ec61324ef9ab60
-
SHA512
551e097fb31a5e7a6b6ecf602f7ae8cb63dc620940fe47b003ebcafcedbfdb391731cfce399b48111ee9524f2272f53eb4076c84f65e377336930fd6b3c3e0fe
-
SSDEEP
6144:6qcbmoTtMUxxzP75a2eoEnnZcYupty6DPlQ82hmbN:6NTTyUX/5a2NGZcTs6DPlahmbN
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe ,C:\\Windows\\system32\\PnkB.exe" dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe -
resource yara_rule behavioral1/files/0x000800000001748f-19.dat aspack_v212_v242 -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\PnkB.exe dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe File created C:\Windows\SysWOW64\pp.exe dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\pp.exe dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main regedit.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Version Vector dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.185b.com/" regedit.exe -
Modifies registry class 23 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E188F7A3-A04E-413E-99D1-D79A45F78506} dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E188F7A3-A04E-413E-99D1-D79A45F78506}\Shell dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E188F7A3-A04E-413E-99D1-D79A45F78506}\InprocServer32 dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E188F7A3-A04E-413E-99D1-D79A45F78506}\Shell\open\command\ = "C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe http://www.185B.Com/" dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E188F7A3-A04E-413E-99D1-D79A45F78506}\shell dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E188F7A3-A04E-413E-99D1-D79A45F78506}\Shell\open dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E188F7A3-A04E-413E-99D1-D79A45F78506}\Shell\open\command dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E188F7A3-A04E-413E-99D1-D79A45F78506}\shellex dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E188F7A3-A04E-413E-99D1-D79A45F78506}\ShellFolder dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E188F7A3-A04E-413E-99D1-D79A45F78506}\DefaultIcon dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E188F7A3-A04E-413E-99D1-D79A45F78506}\DefaultIcon\ = "C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe" dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E188F7A3-A04E-413E-99D1-D79A45F78506}\Shell\ÊôÐÔ(&R)\ = "ÊôÐÔ(&R)" dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E188F7A3-A04E-413E-99D1-D79A45F78506}\ = "Internet Explorer" dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E188F7A3-A04E-413E-99D1-D79A45F78506}\InprocServer32\InprocServer32 = "Apartment" dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E188F7A3-A04E-413E-99D1-D79A45F78506}\Shell\ÊôÐÔ(&R) dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E188F7A3-A04E-413E-99D1-D79A45F78506}\shell\open\command dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E188F7A3-A04E-413E-99D1-D79A45F78506}\shell\ÊôÐÔ(&R)\Command dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E188F7A3-A04E-413E-99D1-D79A45F78506}\Shell\ÊôÐÔ(&R)\Command\ = "Rundll32.exe Shell32.dll,Control_RunDLL Inetcpl.cpl" dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E188F7A3-A04E-413E-99D1-D79A45F78506}\ShellFolder\Attributes = "0" dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E188F7A3-A04E-413E-99D1-D79A45F78506}\InprocServer32\ = "C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe" dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E188F7A3-A04E-413E-99D1-D79A45F78506}\shell\open dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E188F7A3-A04E-413E-99D1-D79A45F78506}\Shell\open\ = "´ò¿ªÖ÷Ò³(&H)" dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E188F7A3-A04E-413E-99D1-D79A45F78506}\shell\ÊôÐÔ(&R) dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe -
Runs regedit.exe 1 IoCs
pid Process 2336 regedit.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2336 2572 dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe 30 PID 2572 wrote to memory of 2336 2572 dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe 30 PID 2572 wrote to memory of 2336 2572 dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe 30 PID 2572 wrote to memory of 2336 2572 dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe 30 PID 2572 wrote to memory of 2716 2572 dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe 31 PID 2572 wrote to memory of 2716 2572 dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe 31 PID 2572 wrote to memory of 2716 2572 dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe 31 PID 2572 wrote to memory of 2716 2572 dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe 31 PID 2716 wrote to memory of 2860 2716 cmd.exe 33 PID 2716 wrote to memory of 2860 2716 cmd.exe 33 PID 2716 wrote to memory of 2860 2716 cmd.exe 33 PID 2716 wrote to memory of 2860 2716 cmd.exe 33 PID 2716 wrote to memory of 2896 2716 cmd.exe 34 PID 2716 wrote to memory of 2896 2716 cmd.exe 34 PID 2716 wrote to memory of 2896 2716 cmd.exe 34 PID 2716 wrote to memory of 2896 2716 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\regedit.exeregedit.exe /s "C:\Users\Admin\AppData\Local\Temp\\\35.ini"2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Runs regedit.exe
PID:2336
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\srun96.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2860
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\╞⌠╢» Internet Explorer Σ»└└╞≈.lnk" /G Everyone:R /C3⤵
- System Location Discovery: System Language Discovery
PID:2896
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139B
MD5bb454b063043f484326575ce60d587c1
SHA1cac3171df8fc25526a82356ed53f1c45a86167be
SHA256838a54026108ff550f5d3c425cf7852abea41882590863e423cf9e94573dc11f
SHA5128c86e46eea787025937204f93738c02f1d5268c19e20126d86df5f1bb3d15367935b3f23e5c6c482b462ac79dbbcc87b38a952a3a8567bf9a3cff2a68ab92099
-
Filesize
191B
MD55c716e6579353075cbb7d67cf9d8d0de
SHA1b033eba781a4eaaecd015fd59189b26ea7dacd13
SHA256b0cc60f962361c2bd560bf09989246ac8f48ecde94d1b3edd99e50aa6322a42f
SHA51292bb090fe51ba17472cced2921b471666d2739783c1fba6e347479ff084f8583852bc057dd90b6b1fca6acb76a063e034b98f42a0b159b0a22fbf97b3ab8d069
-
Filesize
293KB
MD5d35bae95bae2981ea43f8d07d8a7350b
SHA111a9f88b5a706e095f451598cd3452397c467dcf
SHA256185d5d42dbe1107c58a8e940199d428cfed8ab1420f87c2f970affc273c64a0f
SHA512054a0cf5f5d18f1f143e88e95a22be4549bbdd29c1407bdb6d20198f3cdf49955c8ebecf8906a7e72e5ede4d74a0608bff574fc48abe88903768446631df0de2