Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
dc12df8dbe0c7165ed620933bc343a97_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dc12df8dbe0c7165ed620933bc343a97_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dc12df8dbe0c7165ed620933bc343a97_JaffaCakes118.exe
-
Size
320KB
-
MD5
dc12df8dbe0c7165ed620933bc343a97
-
SHA1
5da83bc5c013c107ef648eb560f17f08fb416d16
-
SHA256
269c1b4bd1ba6d520b0e8da5177e03f4474c85a452563c777d43fd06225f51bd
-
SHA512
4b679a53bddb91d50e43c736f44dabf4d1c6986943751b32cc43daf99b8d6ba28b8bbc102c271d25f6ba62fcaea5d64156cc3e4c254491038649548582d3898a
-
SSDEEP
6144:I4lRkAehaKuqT+FDlpmrpad7P52JW4Vj3OeH2GgN72RoODr:IkWAehJuqT6pmtadD5qVj3YOV/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation dc12df8dbe0c7165ed620933bc343a97_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2664 JustClicking.exe 4496 dll.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\service2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\service.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WebSite = "C:\\Program Files (x86)\\JustClicking\\JustClicking.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\service = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\service.exe" dll.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\JustClicking\home.bat dc12df8dbe0c7165ed620933bc343a97_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\JustClicking\home.bat dc12df8dbe0c7165ed620933bc343a97_JaffaCakes118.exe File created C:\Program Files (x86)\JustClicking\JustClicking.exe dc12df8dbe0c7165ed620933bc343a97_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\JustClicking\JustClicking.exe dc12df8dbe0c7165ed620933bc343a97_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\JustClicking dc12df8dbe0c7165ed620933bc343a97_JaffaCakes118.exe File created C:\Program Files (x86)\JustClicking\__tmp_rar_sfx_access_check_240627593 dc12df8dbe0c7165ed620933bc343a97_JaffaCakes118.exe File created C:\Program Files (x86)\JustClicking\dll.exe dc12df8dbe0c7165ed620933bc343a97_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\JustClicking\dll.exe dc12df8dbe0c7165ed620933bc343a97_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc12df8dbe0c7165ed620933bc343a97_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JustClicking.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main JustClicking.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "www.JustClicking.net" JustClicking.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4396 reg.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4512 wrote to memory of 4708 4512 dc12df8dbe0c7165ed620933bc343a97_JaffaCakes118.exe 86 PID 4512 wrote to memory of 4708 4512 dc12df8dbe0c7165ed620933bc343a97_JaffaCakes118.exe 86 PID 4512 wrote to memory of 4708 4512 dc12df8dbe0c7165ed620933bc343a97_JaffaCakes118.exe 86 PID 4708 wrote to memory of 4396 4708 cmd.exe 88 PID 4708 wrote to memory of 4396 4708 cmd.exe 88 PID 4708 wrote to memory of 4396 4708 cmd.exe 88 PID 4708 wrote to memory of 2664 4708 cmd.exe 89 PID 4708 wrote to memory of 2664 4708 cmd.exe 89 PID 4708 wrote to memory of 2664 4708 cmd.exe 89 PID 4708 wrote to memory of 4496 4708 cmd.exe 91 PID 4708 wrote to memory of 4496 4708 cmd.exe 91 PID 4708 wrote to memory of 4496 4708 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc12df8dbe0c7165ed620933bc343a97_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc12df8dbe0c7165ed620933bc343a97_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\JustClicking\home.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\reg.exereg add HKLM\software\Microsoft\Windows\CurrentVersion\Run /v "WebSite" /t REG_SZ /d "C:\Program Files (x86)\JustClicking\JustClicking.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4396
-
-
C:\Program Files (x86)\JustClicking\JustClicking.exeJustClicking.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:2664
-
-
C:\Program Files (x86)\JustClicking\dll.exedll.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4496
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
565KB
MD5056389adb8409ea9557313e95c465d89
SHA112b3226f2d94de916f43dd7c2299595af5462c38
SHA25607726da66b65fa5765eaa1ae2b6252ab1372fe3c3e5234ea18f329d789787665
SHA512796947830e4f0ad8b31e763584b5f41c27042f99e1a8fbca87fc05ccda2d33041b91c7cbb2a8f844e8299a852da0d047131b6ce4d3b4446b40cfdd00fe05f2da
-
Filesize
156KB
MD55d003f891fb747a0343640fba040a38f
SHA14e75325ad5edb3ca6ded501c92c0f4aced4a5873
SHA25612a2803eff682e62a816571a40dfcb9418d56e8f19e0459d55eb117d37a10d6c
SHA5125ed39c3297dc2df4febe1fdd7bffff04a11d4b23cac38e30ac57c8ae81e208461fd85c5bac34d48049bc7684621cac003c5deacbe0fc4eb410aefb29ca00470c
-
Filesize
173B
MD5e9b8196ebbf61f2af27aa6a503015fb5
SHA127ac0c3bff72609ea3c5b0bd6fd338965c08ada8
SHA256825214610a812300ce3e8f13b175b1ae40f80ac99edb67f9c58eb7730433fee2
SHA512a09d5a5af64fd632906082c94ddbb90212a57be14aaf6f8399051878758447c5fdb221e8965dc0c4b5ee76d5f825dc0ed474f721b83f3978ea32e2e73e9f3115