Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 11:59
Behavioral task
behavioral1
Sample
efbf1a7c08e26eb64a1ab815eb3dca67_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
efbf1a7c08e26eb64a1ab815eb3dca67_JaffaCakes118.exe
-
Size
265KB
-
MD5
efbf1a7c08e26eb64a1ab815eb3dca67
-
SHA1
7352e516141e2cabbe3782e37cbfe3ed821db412
-
SHA256
9d5d50ae4c45259e3e3950b990bf5b9f0dd0876d17fccfb3c4d8ac1c5b4265dd
-
SHA512
a90d249d1580ff5bfe1d6200bfe70e8f7e23aa8664356ee958b8123ca460d14705d50b9303b7db78559c8b4c6948cc2de49c432b4fb09b79b135c44416773aa3
-
SSDEEP
6144:836Z1F6ZWrjo/l1N3qb1xosJnSXHYqvu5xxQmhfWRzCUpf9Mk4W:82wZCI8b/otC5XQOuROUr
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2488 svchost.exe 2952 svchost.exe -
Loads dropped DLL 3 IoCs
pid Process 1864 efbf1a7c08e26eb64a1ab815eb3dca67_JaffaCakes118.exe 1864 efbf1a7c08e26eb64a1ab815eb3dca67_JaffaCakes118.exe 2952 svchost.exe -
resource yara_rule behavioral1/memory/1864-0-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/files/0x00070000000191df-3.dat upx behavioral1/memory/2488-11-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2952-15-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/1864-20-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2488-19-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2952-28-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2952-30-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2952-32-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2952-33-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2952-34-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2952-35-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2952-36-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2952-37-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2952-38-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2952-39-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2952-40-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2952-41-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2952-42-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2952-43-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2952-44-0x0000000000400000-0x00000000004BE000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efbf1a7c08e26eb64a1ab815eb3dca67_JaffaCakes118.exe -
Modifies data under HKEY_USERS 16 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\1601 = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\AppEvents svchost.exe Key created \REGISTRY\USER\.DEFAULT\AppEvents\Schemes\Apps\Explorer svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\AppEvents\Schemes\Apps\Explorer\Navigating\.Current svchost.exe Key created \REGISTRY\USER\.DEFAULT\AppEvents\Schemes svchost.exe Key created \REGISTRY\USER\.DEFAULT\AppEvents\Schemes\Apps\Explorer\Navigating svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Key created \REGISTRY\USER\.DEFAULT\AppEvents\Schemes\Apps svchost.exe -
Modifies registry class 12 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\aspfile\SCRIPTHOSTENCODE regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\SCRIPTHOSTENCODE regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Scripting.Dictionary regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Scripting.Encoder regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\ASP.HostEncode regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\SCRIPTHOSTENCODE regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\aspfile regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\JSFile\SCRIPTHOSTENCODE regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Scripting.FileSystemObject regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\HTML.HostEncode regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\JSFile.HostEncode regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile.HostEncode regsvr32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2952 svchost.exe 2952 svchost.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2488 1864 efbf1a7c08e26eb64a1ab815eb3dca67_JaffaCakes118.exe 30 PID 1864 wrote to memory of 2488 1864 efbf1a7c08e26eb64a1ab815eb3dca67_JaffaCakes118.exe 30 PID 1864 wrote to memory of 2488 1864 efbf1a7c08e26eb64a1ab815eb3dca67_JaffaCakes118.exe 30 PID 1864 wrote to memory of 2488 1864 efbf1a7c08e26eb64a1ab815eb3dca67_JaffaCakes118.exe 30 PID 2952 wrote to memory of 1416 2952 svchost.exe 32 PID 2952 wrote to memory of 1416 2952 svchost.exe 32 PID 2952 wrote to memory of 1416 2952 svchost.exe 32 PID 2952 wrote to memory of 1416 2952 svchost.exe 32 PID 2952 wrote to memory of 1416 2952 svchost.exe 32 PID 2952 wrote to memory of 1416 2952 svchost.exe 32 PID 2952 wrote to memory of 1416 2952 svchost.exe 32 PID 2952 wrote to memory of 3068 2952 svchost.exe 33 PID 2952 wrote to memory of 3068 2952 svchost.exe 33 PID 2952 wrote to memory of 3068 2952 svchost.exe 33 PID 2952 wrote to memory of 3068 2952 svchost.exe 33 PID 2952 wrote to memory of 3068 2952 svchost.exe 33 PID 2952 wrote to memory of 3068 2952 svchost.exe 33 PID 2952 wrote to memory of 3068 2952 svchost.exe 33 PID 2952 wrote to memory of 3044 2952 svchost.exe 34 PID 2952 wrote to memory of 3044 2952 svchost.exe 34 PID 2952 wrote to memory of 3044 2952 svchost.exe 34 PID 2952 wrote to memory of 3044 2952 svchost.exe 34 PID 2952 wrote to memory of 3044 2952 svchost.exe 34 PID 2952 wrote to memory of 3044 2952 svchost.exe 34 PID 2952 wrote to memory of 3044 2952 svchost.exe 34 PID 2952 wrote to memory of 2672 2952 svchost.exe 35 PID 2952 wrote to memory of 2672 2952 svchost.exe 35 PID 2952 wrote to memory of 2672 2952 svchost.exe 35 PID 2952 wrote to memory of 2672 2952 svchost.exe 35 PID 2952 wrote to memory of 2672 2952 svchost.exe 35 PID 2952 wrote to memory of 2672 2952 svchost.exe 35 PID 2952 wrote to memory of 2672 2952 svchost.exe 35 PID 2952 wrote to memory of 2724 2952 svchost.exe 36 PID 2952 wrote to memory of 2724 2952 svchost.exe 36 PID 2952 wrote to memory of 2724 2952 svchost.exe 36 PID 2952 wrote to memory of 2724 2952 svchost.exe 36 PID 2952 wrote to memory of 2724 2952 svchost.exe 36 PID 2952 wrote to memory of 2724 2952 svchost.exe 36 PID 2952 wrote to memory of 2724 2952 svchost.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\efbf1a7c08e26eb64a1ab815eb3dca67_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\efbf1a7c08e26eb64a1ab815eb3dca67_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1864 -
\??\c:\mp3\svchost.exec:\mp3\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2488
-
-
\??\c:\mp3\svchost.exec:\mp3\svchost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s /u wshom.ocx2⤵
- System Location Discovery: System Language Discovery
PID:1416
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s /u scrrun.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3068
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s /u msxml.dll2⤵
- System Location Discovery: System Language Discovery
PID:3044
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s /u shell32.dll2⤵
- System Location Discovery: System Language Discovery
PID:2672
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s /u "C:\Program Files (x86)\Common Files\System\ado\msado15.dll"2⤵
- System Location Discovery: System Language Discovery
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
265KB
MD5efbf1a7c08e26eb64a1ab815eb3dca67
SHA17352e516141e2cabbe3782e37cbfe3ed821db412
SHA2569d5d50ae4c45259e3e3950b990bf5b9f0dd0876d17fccfb3c4d8ac1c5b4265dd
SHA512a90d249d1580ff5bfe1d6200bfe70e8f7e23aa8664356ee958b8123ca460d14705d50b9303b7db78559c8b4c6948cc2de49c432b4fb09b79b135c44416773aa3