Analysis
-
max time kernel
103s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:32
Static task
static1
Behavioral task
behavioral1
Sample
eac3d817ac090247defcef25452eee6e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac3d817ac090247defcef25452eee6e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eac3d817ac090247defcef25452eee6e_JaffaCakes118.exe
-
Size
473KB
-
MD5
eac3d817ac090247defcef25452eee6e
-
SHA1
28c4b79ff185b10b8763a7567096e7da50ce359c
-
SHA256
cab49e7d4836d9ff879db002e8c7a6db6e4db55dc28aad214ad105fe9db899a5
-
SHA512
c5b9e171606a47c8dea7314b77682f35d1e4fc5ba687aeb40aaa4d0c69a60f9556750765416098ad85d6974a716e16cd9b254a7a349d47462b7cf6a26ecb95dc
-
SSDEEP
6144:kLpL3s3exN4SS4noP6QnoW89BUcLg6+u1+djiKkkS1POLL37zktY/9FQgaxFR:ip7sOxlnoP189Bh86+u1+4kS12cY/aPR
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4812 InstallManager.exe 4504 IEHelper.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eac3d817ac090247defcef25452eee6e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallManager.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEHelper.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\ IEHelper.exe Set value (data) \REGISTRY\USER\{8DCB7100-DF86-4384-8842-8FA844297B3F} = 51667a6c4c1d3b1b106adb97b384eb09974bd0f747683927 IEHelper.exe Set value (data) \REGISTRY\USER\{D2CE3E00-F94A-4740-988E-03DC2F38C34F} = 51667a6c4c1d3b1b1025dec87fa22f0d87875c832c798157 IEHelper.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4360 wrote to memory of 4812 4360 eac3d817ac090247defcef25452eee6e_JaffaCakes118.exe 91 PID 4360 wrote to memory of 4812 4360 eac3d817ac090247defcef25452eee6e_JaffaCakes118.exe 91 PID 4360 wrote to memory of 4812 4360 eac3d817ac090247defcef25452eee6e_JaffaCakes118.exe 91 PID 4812 wrote to memory of 2956 4812 InstallManager.exe 92 PID 4812 wrote to memory of 2956 4812 InstallManager.exe 92 PID 4360 wrote to memory of 4504 4360 eac3d817ac090247defcef25452eee6e_JaffaCakes118.exe 93 PID 4360 wrote to memory of 4504 4360 eac3d817ac090247defcef25452eee6e_JaffaCakes118.exe 93 PID 4360 wrote to memory of 4504 4360 eac3d817ac090247defcef25452eee6e_JaffaCakes118.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\eac3d817ac090247defcef25452eee6e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eac3d817ac090247defcef25452eee6e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\BingBarInstaller\InstallManager.exeC:\Users\Admin\AppData\Local\Temp\\BingBarInstaller\InstallManager.exe /silent /ignorebrowsercheck /launchie2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\system32\pcaui.exe"C:\Windows\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {493b1d92-a173-47e5-a24d-c4859bbc16e9} -a "Bing Bar" -v "Microsoft" -s "This app can't run because it causes security or performance issues on Windows. A new version may be available. Check with your software provider for an updated version that runs on this version of Windows." -n 2 -f 0 -k 0 -e "C:\Users\Admin\AppData\Local\Temp\BingBarInstaller\InstallManager.exe"3⤵PID:2956
-
-
-
C:\Users\Admin\AppData\Local\Temp\BingBarInstaller\IEHelper.exeC:\Users\Admin\AppData\Local\Temp\\BingBarInstaller\IEHelper.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD573693a14a400b36ae35882aeae185a75
SHA15a1e66530b761a9a7425d72e7907a27070b3ebdc
SHA256abdea93ed5002a9aed3d3ba06b947461e7696f65be8d7ada6a9e481647b8d30e
SHA512e15128c89dd13e29a215089f535118f7b7e704dea01e2ee9811f892dd4dd0df5a9392ca0ece92e635b89ec8ba912f30988a9cc119c58f96e87f14346b8f83ec0
-
Filesize
329KB
MD53e568e0b61ef3f835fa822980e2224be
SHA1cd7a8a70d28b4a628dcf743994366ec669612a51
SHA256c3a76c772a2e04e4f11841f63d1b9b50eb80155b6f0bb05259b8a40207264fc6
SHA512f7950709cfd902331a293a633af46c4a3ecb7fe27677ca29d2b7d7a5b8e60baf279b708b9cc1b4dad21de1d22e58cbc4047eb762c49aca3cc4d56b1fcad86231