Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
26/09/2024, 00:14
Static task
static1
Behavioral task
behavioral1
Sample
f7243ca350010d1157bfd5be158f635c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f7243ca350010d1157bfd5be158f635c_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
f7243ca350010d1157bfd5be158f635c_JaffaCakes118.exe
-
Size
40KB
-
MD5
f7243ca350010d1157bfd5be158f635c
-
SHA1
af6aad4bceccde7c79be5d819806dc02808b0551
-
SHA256
6a25ee5d56735d3432b52c47461cc8adc6ad78c451634e356a8c51176e0bb2ed
-
SHA512
646b07a7636c7abd6f6324ffb62aa32c15e7535dc13d9456ff83a8d544d5692d9bc03d5056a89fbc8b8779f466ab475928cbd80683e552bb2cd3534adf711a7b
-
SSDEEP
768:QLFu1jGZPh+qrH/acGg7TnTiDws0C9liNGd/oZEsvsd2RVrMe2LFu:l1yZPh+qrH/acGiTTiDws0C9liNGd/op
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7243ca350010d1157bfd5be158f635c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe -
Modifies registry class 27 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521}\Shell\Open(&O)\ = "????(&H)" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521}\Shell\??(&R) regedit.exe Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521}\Shell\??(&R) regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521}\ = "Internet Explorer" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521}\Shell\Open(&O)\Command regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521}\DefaultIcon\ = "c:\\Program Files\\Internet Explorer\\IEXPLORE.EXE" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521}\DefaultIcon\ = "c:\\Program Files\\Internet Explorer\\IEXPLORE.EXE" regedit.exe Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521}\DefaultIcon regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521}\Shell\Open(&O)\ = "????(&H)" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521}\Shell regedit.exe Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521}\Shell regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521} regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521}\ShellFolder\Attributes = "10" regedit.exe Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521}\Shell\Open(&O)\Command regedit.exe Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521}\Shell\??(&R)\Command regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521}\Shell\Open(&O)\Command\ = "\"c:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\" http://www.86on.com?cf" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521}\Shell\??(&R)\Command regedit.exe Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521}\ShellFolder regedit.exe Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521}\Shell\??(&R)\Command\ = "Rundll32.exe Shell32.dll,Control_RunDLL Inetcpl.cpl" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521}\ShellFolder regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521}\ = "Internet Explorer" regedit.exe Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521}\Shell\Open(&O) regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521}\Shell\??(&R)\Command\ = "Rundll32.exe Shell32.dll,Control_RunDLL Inetcpl.cpl" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521}\ShellFolder\Attributes = "10" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521}\DefaultIcon regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-775852013521}\Shell\Open(&O) regedit.exe -
Runs .reg file with regedit 1 IoCs
pid Process 4832 regedit.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 808 f7243ca350010d1157bfd5be158f635c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 808 wrote to memory of 4716 808 f7243ca350010d1157bfd5be158f635c_JaffaCakes118.exe 84 PID 808 wrote to memory of 4716 808 f7243ca350010d1157bfd5be158f635c_JaffaCakes118.exe 84 PID 808 wrote to memory of 4716 808 f7243ca350010d1157bfd5be158f635c_JaffaCakes118.exe 84 PID 4716 wrote to memory of 4832 4716 cmd.exe 86 PID 4716 wrote to memory of 4832 4716 cmd.exe 86 PID 4716 wrote to memory of 4832 4716 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7243ca350010d1157bfd5be158f635c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7243ca350010d1157bfd5be158f635c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\cmd.execmd.exe /c regedit /s "C:\Users\Admin\AppData\Local\Temp\QQMain.reg"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\regedit.exeregedit /s "C:\Users\Admin\AppData\Local\Temp\QQMain.reg"3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Runs .reg file with regedit
PID:4832
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD54b18b2c6660a6ee313a65ee597b8834e
SHA140273ed41237a80a720471533a68eeb4cb2a6b64
SHA25600c24d3db533ce52a46a263c0a0efa94bccda61fc4c7d4b3fe24b5626ebb067c
SHA5125966bdb470013697f7ae1df82114ee903801972bbb0a8335a03ad2baf19aaba9103e52d02827554514d1acc59c4bdf4f17831a0e0bf86315c398eac96ec84ba5