Analysis
-
max time kernel
2s -
max time network
3s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 07:09
Static task
static1
Behavioral task
behavioral1
Sample
fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe
-
Size
398KB
-
MD5
fbc2c420abf78cac67f0ad1b699d498a
-
SHA1
6d8b9ca17a5c7ce312108a7a8ea36c5052bc0c05
-
SHA256
ac4b37a2facba94ee05030e6ef3a0898b6078a96bbb798ae9c1e6d075827beb2
-
SHA512
8a131e3bc8d86c9a97c7b749eea520561a92d05a2c7fb02f18facf9be246ad508ba1a73b0ea1779573a800c336b3c3a8265e6532fefa473756d2fcb15f25a569
-
SSDEEP
12288:0BZHH6OfVl9JvtJ5mVicCocaC+jbDEdzknOhzEvboE:8aOdltJ5mVqMlbarhgvsE
Malware Config
Signatures
-
Executes dropped EXE 7 IoCs
pid Process 2532 cb.exe 2796 1EuroP.exe 596 2IC.exe 2832 3E4U - Bucks.exe 2660 IR.exe 2724 6tbp.exe 1920 7bsxzxl.exe -
Loads dropped DLL 38 IoCs
pid Process 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 2532 cb.exe 2532 cb.exe 2532 cb.exe 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 2796 1EuroP.exe 2796 1EuroP.exe 2796 1EuroP.exe 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 2832 3E4U - Bucks.exe 2832 3E4U - Bucks.exe 2832 3E4U - Bucks.exe 596 2IC.exe 596 2IC.exe 596 2IC.exe 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 2660 IR.exe 2660 IR.exe 2660 IR.exe 2724 6tbp.exe 2724 6tbp.exe 2724 6tbp.exe 856 rundll32.exe 856 rundll32.exe 856 rundll32.exe 856 rundll32.exe 2660 IR.exe 2660 IR.exe 1920 7bsxzxl.exe 1920 7bsxzxl.exe 1920 7bsxzxl.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Nxulatofok = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\ondlat.dll\",Startup" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\46f2 = "C:\\Users\\Admin\\AppData\\Roaming\\7bsxzxl.exe" IR.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IR.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\physicaldrive0 2IC.exe -
resource yara_rule behavioral1/memory/2660-70-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral1/files/0x0005000000019c3c-68.dat upx behavioral1/memory/1920-100-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral1/memory/1920-106-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral1/memory/2660-119-0x0000000000400000-0x0000000000430000-memory.dmp upx -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2584 sc.exe 1880 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2IC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1EuroP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3E4U - Bucks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6tbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7bsxzxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IR.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2832 3E4U - Bucks.exe 2832 3E4U - Bucks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 596 2IC.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2724 6tbp.exe 2660 IR.exe 2660 IR.exe 2660 IR.exe 856 rundll32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2532 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2532 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2532 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2532 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2532 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2532 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2532 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2796 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 31 PID 2232 wrote to memory of 2796 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 31 PID 2232 wrote to memory of 2796 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 31 PID 2232 wrote to memory of 2796 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 31 PID 2232 wrote to memory of 2796 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 31 PID 2232 wrote to memory of 2796 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 31 PID 2232 wrote to memory of 2796 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 31 PID 2232 wrote to memory of 596 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 32 PID 2232 wrote to memory of 596 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 32 PID 2232 wrote to memory of 596 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 32 PID 2232 wrote to memory of 596 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 32 PID 2232 wrote to memory of 596 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 32 PID 2232 wrote to memory of 596 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 32 PID 2232 wrote to memory of 596 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 32 PID 2232 wrote to memory of 2832 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 33 PID 2232 wrote to memory of 2832 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 33 PID 2232 wrote to memory of 2832 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 33 PID 2232 wrote to memory of 2832 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 33 PID 2232 wrote to memory of 2832 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 33 PID 2232 wrote to memory of 2832 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 33 PID 2232 wrote to memory of 2832 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 33 PID 2232 wrote to memory of 2724 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 34 PID 2232 wrote to memory of 2724 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 34 PID 2232 wrote to memory of 2724 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 34 PID 2232 wrote to memory of 2724 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 34 PID 2232 wrote to memory of 2724 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 34 PID 2232 wrote to memory of 2724 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 34 PID 2232 wrote to memory of 2724 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 34 PID 2232 wrote to memory of 2660 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 35 PID 2232 wrote to memory of 2660 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 35 PID 2232 wrote to memory of 2660 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 35 PID 2232 wrote to memory of 2660 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 35 PID 2232 wrote to memory of 2660 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 35 PID 2232 wrote to memory of 2660 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 35 PID 2232 wrote to memory of 2660 2232 fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe 35 PID 2724 wrote to memory of 856 2724 6tbp.exe 36 PID 2724 wrote to memory of 856 2724 6tbp.exe 36 PID 2724 wrote to memory of 856 2724 6tbp.exe 36 PID 2724 wrote to memory of 856 2724 6tbp.exe 36 PID 2724 wrote to memory of 856 2724 6tbp.exe 36 PID 2724 wrote to memory of 856 2724 6tbp.exe 36 PID 2724 wrote to memory of 856 2724 6tbp.exe 36 PID 2660 wrote to memory of 1480 2660 IR.exe 38 PID 2660 wrote to memory of 1480 2660 IR.exe 38 PID 2660 wrote to memory of 1480 2660 IR.exe 38 PID 2660 wrote to memory of 1480 2660 IR.exe 38 PID 2660 wrote to memory of 1480 2660 IR.exe 38 PID 2660 wrote to memory of 1480 2660 IR.exe 38 PID 2660 wrote to memory of 1480 2660 IR.exe 38 PID 2660 wrote to memory of 2584 2660 IR.exe 40 PID 2660 wrote to memory of 2584 2660 IR.exe 40 PID 2660 wrote to memory of 2584 2660 IR.exe 40 PID 2660 wrote to memory of 2584 2660 IR.exe 40 PID 2660 wrote to memory of 2584 2660 IR.exe 40 PID 2660 wrote to memory of 2584 2660 IR.exe 40 PID 2660 wrote to memory of 2584 2660 IR.exe 40 PID 2660 wrote to memory of 2024 2660 IR.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fbc2c420abf78cac67f0ad1b699d498a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\nsjC979.tmp\cb.exe"C:\Users\Admin\AppData\Local\Temp\nsjC979.tmp\cb.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2532
-
-
C:\Users\Admin\AppData\Local\Temp\nsjC979.tmp\1EuroP.exe"C:\Users\Admin\AppData\Local\Temp\nsjC979.tmp\1EuroP.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\nsjC979.tmp\2IC.exe"C:\Users\Admin\AppData\Local\Temp\nsjC979.tmp\2IC.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:596
-
-
C:\Users\Admin\AppData\Local\Temp\nsjC979.tmp\3E4U - Bucks.exe"C:\Users\Admin\AppData\Local\Temp\nsjC979.tmp\3E4U - Bucks.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\nsjC979.tmp\6tbp.exe"C:\Users\Admin\AppData\Local\Temp\nsjC979.tmp\6tbp.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\ondlat.dll",Startup3⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:856
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsjC979.tmp\IR.exe"C:\Users\Admin\AppData\Local\Temp\nsjC979.tmp\IR.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"3⤵PID:1480
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED3⤵
- Launches sc.exe
PID:2584
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"3⤵PID:2024
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED3⤵
- Launches sc.exe
PID:1880
-
-
C:\Users\Admin\AppData\Roaming\7bsxzxl.exeC:\Users\Admin\AppData\Roaming\7bsxzxl.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1920
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32.exe setupapi,InstallHinfSection DefaultInstall 128 C:\Users\Admin\AppData\Roaming\mdinstall.inf3⤵PID:1100
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Roaming\80e81bi6.bat3⤵PID:2300
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5b4060ce0c8f8a3bad7a63b9fa95c1464
SHA1f77bb4306747258219f2b97693d62eedc438ccae
SHA256cd964af4e62c9007c4aaedd9ccab5cf84a78b51e11332ded2b591c81b23872d6
SHA51235eb45b85f3166a5f007465911e04669e8182df1cf23815ab109868507c95479561950faf918afe8d3664a6f0f04492d6742b74369d7e85f1090f964ecb9544e
-
Filesize
154B
MD52561161141dd563d0442abc4537e43c5
SHA1b8ee9873152ed080e6c9cffca2c1ae70e5bd20d8
SHA2566ea0e7f01c74c94f9d58283744fab2561d7ab8e727b8d14159dbb6dce5ac8d56
SHA5122a5cf9be7c427928c6ba750b2fad59bd8b1c8c698b687b89c3d60d1c44441f28938065fb9455bd7fe0104835e67184ebfc55dd5e7231a09dfd26b36896c35637
-
Filesize
75KB
MD587fb5442c7843acf787ea54f50d27ef3
SHA1e2c0bc89abdf1cc14f030633b8520fa488c2ee7c
SHA25640abf4fe2142f94b0a9b6ebf933423b47a975b4b6a67332545e9dc7afcfbd1e2
SHA51209307d21725976717bd162c019ffccd3f7667eee0506de009df99ce52d220b56452530df51275638a5298ac11ca6ab3b11ce29270e5f8b66c8547f34c407488c
-
Filesize
168KB
MD584d7956209c39cde3b9b02d1b6c64113
SHA19feb8cb82f178be3180d033d9b1715b0d5114c58
SHA25628e120376e926940dc45f8cc2f9193457bf8b89671901453d30e996ca617a29a
SHA51203a55ad0b5ec4913b3a53b6cb67afbf661c0321a6e059a6e01272c9e7fc10935c2f9297640d905eeb3d00a1b5154269052be4b6bf74627c3577722ea7c91ee18
-
Filesize
29KB
MD5bc1e9eefab202aa96ca36e2de9e0d167
SHA12a7f254e2ede629db228f95075eaa9c74f5f7586
SHA256e5775cc832c611d33bae42484d318e62b374fcf8786f11d5ae8087e5fb6d011f
SHA5128e8c00acae442246de1aaf821d7f0a5a3d77c64f3946ad48caebdf841b790472be2f4bdc6027103ca695f10101869382e5a43aec023164d0fac136bb8528a773
-
Filesize
112KB
MD5e9f63abc82ffabfaa4c325da1554af7c
SHA19bd51f5695225f7a13a44a03d0eac2b1339dab5f
SHA2567ff56015fd3fe7ccec00eb198318d8647c0c3386974f1889abc632a55ceafa80
SHA5122721a5cdae7c0a066defe65b7e9e4f15bab7b0ffbffe0eb72e2c3d21c0f2fe547def37df3ec1c7ccdae7a89383d9514d44f386e0c0ab8f14b69c666f9c8b8ee2
-
Filesize
3KB
MD546e07fd3a40760fda18cf6b4fc691742
SHA153ee1a754bf5e94fa88a6ab8bb6120b4011afcfa
SHA256bd7ca609d2fb63e14d08acab1091579c23e298b4fa2ac1e8d2daaff94fc107be
SHA512ce13f6527cbd13002dca00b71ab38ab12e3f3f7138ada0780ad3f40e7c49946c018a00782ec957b1fd123fb439aabc0d9b3660829dabf10ddcebba08d6e2fbbd
-
Filesize
112KB
MD57131c18f90b51938fbe7f4e5744a82b6
SHA13c69d3e7b45bd4a6d2aaf8096a6448b93fd4f550
SHA2560fff9ca615a9371402721e8b3a4c99ef846bff7e5e663b764660edae138f5fa7
SHA512dc982b471b0bc27e5358bb5ca3fa948a76d407251f66c040e8499a07e104f41d53a85db398b6bf2e709347dda55dee062005adfd2bc19263051a05ef0382135b