Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe
-
Size
52KB
-
MD5
eb826a2f5c090c4672cd33f7e7f097a0
-
SHA1
18b4b32b6bdf8646c1bea8c242af2a32acc381f8
-
SHA256
1d58154dd4a4cd4467335e52d17bb9b67a95121ea3ba631d8fa36a4cd0685cb4
-
SHA512
031d76a1d9a5efe2c044b929be29c5dba5a860232deacf5fa36f61654e5d0551bd139e7cd186e9fe9be4df5b927d3d20e9cbf3c5fdc27998b316d62c71e599a5
-
SSDEEP
384:0/rwIZedbLkPO+dsRz+QzwnSguBBQARQk3ygMkk6QymJi6QVvlM:QsI2L6O+mDBBQARQk3rjmW
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\C:\Windows\Fonts\treqabao.dll = "{A272F097-E24C-4A6E-8BCD-8C42839CE8DE}" eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2744 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1848 eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe 2128 regsvr32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\treqabao.tmp eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe File opened for modification C:\Windows\Fonts\JR09124.dat eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Jr2.jratl.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Jr2.jratl\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A272F097-E24C-4A6E-8BCD-8C42839CE8DE}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{534DCFC8-392F-4D0F-BFBA-D29149F893A8} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{534DCFC8-392F-4D0F-BFBA-D29149F893A8}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{534DCFC8-392F-4D0F-BFBA-D29149F893A8}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Jr2.jratl.1\ = "jratl Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A272F097-E24C-4A6E-8BCD-8C42839CE8DE} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A272F097-E24C-4A6E-8BCD-8C42839CE8DE}\ = "jratl Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A272F097-E24C-4A6E-8BCD-8C42839CE8DE}\InprocServer32\ = "C:\\Windows\\Fonts\\treqabao.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2A3121A9-72A7-4410-81EF-912D600B1687}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2A3121A9-72A7-4410-81EF-912D600B1687}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2A3121A9-72A7-4410-81EF-912D600B1687}\1.0\HELPDIR\ = "C:\\Windows\\Fonts" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{534DCFC8-392F-4D0F-BFBA-D29149F893A8}\TypeLib\ = "{2A3121A9-72A7-4410-81EF-912D600B1687}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Jr2.jratl regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{534DCFC8-392F-4D0F-BFBA-D29149F893A8}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{534DCFC8-392F-4D0F-BFBA-D29149F893A8} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A272F097-E24C-4A6E-8BCD-8C42839CE8DE}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2A3121A9-72A7-4410-81EF-912D600B1687} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{534DCFC8-392F-4D0F-BFBA-D29149F893A8}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{534DCFC8-392F-4D0F-BFBA-D29149F893A8}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A272F097-E24C-4A6E-8BCD-8C42839CE8DE}\ProgID\ = "Jr2.jratl.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A272F097-E24C-4A6E-8BCD-8C42839CE8DE}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2A3121A9-72A7-4410-81EF-912D600B1687}\1.0\ = "jr2 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2A3121A9-72A7-4410-81EF-912D600B1687}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Jr2.jratl\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Jr2.jratl\ = "jratl Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Jr2.jratl.1\CLSID\ = "{A272F097-E24C-4A6E-8BCD-8C42839CE8DE}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2A3121A9-72A7-4410-81EF-912D600B1687}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{534DCFC8-392F-4D0F-BFBA-D29149F893A8}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{534DCFC8-392F-4D0F-BFBA-D29149F893A8}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2A3121A9-72A7-4410-81EF-912D600B1687}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A272F097-E24C-4A6E-8BCD-8C42839CE8DE}\VersionIndependentProgID\ = "Jr2.jratl" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A272F097-E24C-4A6E-8BCD-8C42839CE8DE}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A272F097-E24C-4A6E-8BCD-8C42839CE8DE}\TypeLib\ = "{2A3121A9-72A7-4410-81EF-912D600B1687}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2A3121A9-72A7-4410-81EF-912D600B1687}\1.0\0\win32\ = "C:\\Windows\\Fonts\\treqabao.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2A3121A9-72A7-4410-81EF-912D600B1687}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{534DCFC8-392F-4D0F-BFBA-D29149F893A8}\ = "Ijratl" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{534DCFC8-392F-4D0F-BFBA-D29149F893A8}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A272F097-E24C-4A6E-8BCD-8C42839CE8DE}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{534DCFC8-392F-4D0F-BFBA-D29149F893A8}\TypeLib\ = "{2A3121A9-72A7-4410-81EF-912D600B1687}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Jr2.jratl\CLSID\ = "{A272F097-E24C-4A6E-8BCD-8C42839CE8DE}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Jr2.jratl\CurVer\ = "Jr2.jratl.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A272F097-E24C-4A6E-8BCD-8C42839CE8DE}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{534DCFC8-392F-4D0F-BFBA-D29149F893A8}\ = "Ijratl" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Jr2.jratl.1 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1848 eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1848 eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1848 eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe 1848 eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe 1848 eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2128 1848 eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2128 1848 eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2128 1848 eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2128 1848 eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2128 1848 eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2128 1848 eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2128 1848 eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2744 1848 eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe 32 PID 1848 wrote to memory of 2744 1848 eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe 32 PID 1848 wrote to memory of 2744 1848 eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe 32 PID 1848 wrote to memory of 2744 1848 eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb826a2f5c090c4672cd33f7e7f097a0_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Windows\Fonts\treqabao.dll"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2128
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\EB826A~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5dcf1210a6e291f74395cb2827684eaa9
SHA1ed876d101a5a4e04fa09edb7c904a8efb8566605
SHA2564bb1cc64ca230faa2fb6bab078541f1af38ab64d77b4121c08459005bb23ccd5
SHA5124d08db267958c7c97c6d8c142276db287cdeb5606bf2fc2b0b918c88d20a8ac219ce2053afe9fbd2c33f8e7d83eed684ad2cd41af9a9ffd0d6e697d21ae65d19