Analysis
-
max time kernel
139s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 20:06
Behavioral task
behavioral1
Sample
ee555b68a9f7f3b821f509152bcdc12a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee555b68a9f7f3b821f509152bcdc12a_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
ee555b68a9f7f3b821f509152bcdc12a_JaffaCakes118.exe
-
Size
12KB
-
MD5
ee555b68a9f7f3b821f509152bcdc12a
-
SHA1
f7b744f467ef5c83434c796c57d840c598bb8a56
-
SHA256
570ea492eb23ea90b15f8fffb8c0cfd9a0781f8a0566d9584e31d42840a9f938
-
SHA512
0919d6ca804c549b2ea58c49e8e4066e85cae5728f493fd4466201811b127efcccd508cedb4bee3768f9a6776647cfa1a88090b04b3a3f9fb83b2b21d747a9cb
-
SSDEEP
192:seqPDtbsc1xQta/LsCQQmfLUesbPZNw0RaErPudRlIuHenRbpW4ha:cDVh+ta/40ELULNwXVIuHe/W4o
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\C:\Windows\Fonts\womelkdo.dll = "{B8F4C7B3-74C8-4380-80B6-B66E5486B904}" ee555b68a9f7f3b821f509152bcdc12a_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 1940 ee555b68a9f7f3b821f509152bcdc12a_JaffaCakes118.exe 2808 regsvr32.exe -
resource yara_rule behavioral2/memory/1940-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/1940-9-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\womelkdo.tmp ee555b68a9f7f3b821f509152bcdc12a_JaffaCakes118.exe File opened for modification C:\Windows\Fonts\z0114.dat ee555b68a9f7f3b821f509152bcdc12a_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee555b68a9f7f3b821f509152bcdc12a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 46 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Zt.ztatl.1\CLSID\ = "{B8F4C7B3-74C8-4380-80B6-B66E5486B904}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Zt.ztatl regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B8F4C7B3-74C8-4380-80B6-B66E5486B904}\ = "ztatl Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B8F4C7B3-74C8-4380-80B6-B66E5486B904}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B8F4C7B3-74C8-4380-80B6-B66E5486B904}\VersionIndependentProgID\ = "Zt.ztatl" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B8F4C7B3-74C8-4380-80B6-B66E5486B904}\TypeLib\ = "{E6ED0F88-01D3-435F-9913-5F30B83B84AC}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E6ED0F88-01D3-435F-9913-5F30B83B84AC}\1.0\0\win32\ = "C:\\Windows\\Fonts\\womelkdo.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Zt.ztatl.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3AAA8090-9D8D-4C2C-9D8C-B68BCB6A7BAA}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Zt.ztatl\CurVer\ = "Zt.ztatl.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E6ED0F88-01D3-435F-9913-5F30B83B84AC} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3AAA8090-9D8D-4C2C-9D8C-B68BCB6A7BAA} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3AAA8090-9D8D-4C2C-9D8C-B68BCB6A7BAA}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3AAA8090-9D8D-4C2C-9D8C-B68BCB6A7BAA}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Zt.ztatl\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Zt.ztatl\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B8F4C7B3-74C8-4380-80B6-B66E5486B904}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E6ED0F88-01D3-435F-9913-5F30B83B84AC}\1.0\ = "zt 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E6ED0F88-01D3-435F-9913-5F30B83B84AC}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3AAA8090-9D8D-4C2C-9D8C-B68BCB6A7BAA}\TypeLib\ = "{E6ED0F88-01D3-435F-9913-5F30B83B84AC}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Zt.ztatl.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B8F4C7B3-74C8-4380-80B6-B66E5486B904}\ProgID\ = "Zt.ztatl.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B8F4C7B3-74C8-4380-80B6-B66E5486B904}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B8F4C7B3-74C8-4380-80B6-B66E5486B904}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E6ED0F88-01D3-435F-9913-5F30B83B84AC}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3AAA8090-9D8D-4C2C-9D8C-B68BCB6A7BAA}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B8F4C7B3-74C8-4380-80B6-B66E5486B904} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E6ED0F88-01D3-435F-9913-5F30B83B84AC}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3AAA8090-9D8D-4C2C-9D8C-B68BCB6A7BAA}\ = "Iztatl" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3AAA8090-9D8D-4C2C-9D8C-B68BCB6A7BAA}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3AAA8090-9D8D-4C2C-9D8C-B68BCB6A7BAA}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B8F4C7B3-74C8-4380-80B6-B66E5486B904}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3AAA8090-9D8D-4C2C-9D8C-B68BCB6A7BAA} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Zt.ztatl\ = "ztatl Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B8F4C7B3-74C8-4380-80B6-B66E5486B904}\InprocServer32\ = "C:\\Windows\\Fonts\\womelkdo.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E6ED0F88-01D3-435F-9913-5F30B83B84AC}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3AAA8090-9D8D-4C2C-9D8C-B68BCB6A7BAA}\TypeLib\ = "{E6ED0F88-01D3-435F-9913-5F30B83B84AC}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3AAA8090-9D8D-4C2C-9D8C-B68BCB6A7BAA}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B8F4C7B3-74C8-4380-80B6-B66E5486B904}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Zt.ztatl\CLSID\ = "{B8F4C7B3-74C8-4380-80B6-B66E5486B904}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E6ED0F88-01D3-435F-9913-5F30B83B84AC}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E6ED0F88-01D3-435F-9913-5F30B83B84AC}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E6ED0F88-01D3-435F-9913-5F30B83B84AC}\1.0\HELPDIR\ = "C:\\Windows\\Fonts" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3AAA8090-9D8D-4C2C-9D8C-B68BCB6A7BAA}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3AAA8090-9D8D-4C2C-9D8C-B68BCB6A7BAA}\ = "Iztatl" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Zt.ztatl.1\ = "ztatl Class" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1940 ee555b68a9f7f3b821f509152bcdc12a_JaffaCakes118.exe 1940 ee555b68a9f7f3b821f509152bcdc12a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1940 ee555b68a9f7f3b821f509152bcdc12a_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1940 ee555b68a9f7f3b821f509152bcdc12a_JaffaCakes118.exe 1940 ee555b68a9f7f3b821f509152bcdc12a_JaffaCakes118.exe 1940 ee555b68a9f7f3b821f509152bcdc12a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2808 1940 ee555b68a9f7f3b821f509152bcdc12a_JaffaCakes118.exe 87 PID 1940 wrote to memory of 2808 1940 ee555b68a9f7f3b821f509152bcdc12a_JaffaCakes118.exe 87 PID 1940 wrote to memory of 2808 1940 ee555b68a9f7f3b821f509152bcdc12a_JaffaCakes118.exe 87 PID 1940 wrote to memory of 3812 1940 ee555b68a9f7f3b821f509152bcdc12a_JaffaCakes118.exe 96 PID 1940 wrote to memory of 3812 1940 ee555b68a9f7f3b821f509152bcdc12a_JaffaCakes118.exe 96 PID 1940 wrote to memory of 3812 1940 ee555b68a9f7f3b821f509152bcdc12a_JaffaCakes118.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee555b68a9f7f3b821f509152bcdc12a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee555b68a9f7f3b821f509152bcdc12a_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Windows\Fonts\womelkdo.dll"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2808
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\EE555B~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:3812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD51828b8294cdd114be0391f1d78104dc1
SHA15061ea5b6d8ea47a2d2fce86b37a4b448073bf0d
SHA2563409ba9cbf6c2010410b3333897ceb14ed3f4c5b1cea8db663c5557c4a17212a
SHA512ad9a246160cbdd61f7dec908ce70677616555f1bf20c1dc402b68489513de3556ee145f426469005e7750c84f1e763fb8a9dde955f94af04fde95002bfc90405