Analysis
-
max time kernel
96s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 20:02
Static task
static1
Behavioral task
behavioral1
Sample
fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe
-
Size
672KB
-
MD5
fd0bba3758d1222617a1ac9107ab96ee
-
SHA1
7663e0a51ecd65b7d5285f889f653d7d1b6a683c
-
SHA256
a274682f37bd79983e7020ee2da677f74520c31f81dd390790e68c440427cff9
-
SHA512
ebc4738c962c7765345f827dd8275117a4e8350e769d3969b2b3dc7e052e170cc4a3dc1e6fce133019b57506c88eb546cc8468eb379f40b80a844868b3eb6f1a
-
SSDEEP
3072:5A3kRAyKVHAz6o130Sbr7qH7e+TRDDW5n4iAGZupbLbkJOSxhb1cGmx2m:ukRAl4JrGXD+nbAGZul9ehx1
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\win\ImagePath = "C:\\WINDOWS\\SYSTEM32\\WIN.EXE" Regedit.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\win\ImagePath = "C:\\WINDOWS\\SYSTEM32\\WIN.EXE" Regedit.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\WINDOWS\\SYSTEM32\\WIN.EXE" Regedit.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\windows\SysWOW64\win.exe fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe File opened for modification C:\windows\SysWOW64\win.exe fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe File opened for modification C:\windows\SysWOW64\oemlinkicon.ico fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\shdoclc.dll fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3636 cmd.exe 2524 PING.EXE -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{6096E38F-5AC1-4391-8EC4-75DFA92FB32F}\Exec = "http://www.hao123.cn/?hao" Regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{6096E38F-5AC1-4391-8EC4-75DFA92FB32F}\HotIcon = "%windir%\\system32\\oemlinkicon.ico" Regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{6096E38F-5AC1-4391-8EC4-75DFA92FB32F}\Icon = "%windir%\\system32\\oemlinkicon.ico" Regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{6096E38F-5AC1-4391-8EC4-75DFA92FB32F} Regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{6096E38F-5AC1-4391-8EC4-75DFA92FB32F}\CLSID = "{1FBA04EE-3024-11D2-8F1F-0000F87ABD16}" Regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{6096E38F-5AC1-4391-8EC4-75DFA92FB32F}\Default Visible = "Yes" Regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{6096E38F-5AC1-4391-8EC4-75DFA92FB32F}\ButtonText = "电脑首页" Regedit.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.123456.cn" fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\DefaultIcon Regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node Regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\Instance\InitPropertyBag\Command = "电脑首页" Regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\Instance\InitPropertyBag\Param1 = "http://ghost.123456.cn" Regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0} Regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\ = "电脑首页" Regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\InfoTip = "电脑首页" Regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\DefaultIcon\ = "oemlinkicon.ico" Regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\Instance\InitPropertyBag Regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID Regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\Instance Regedit.exe -
Runs .reg file with regedit 1 IoCs
pid Process 3000 Regedit.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2524 PING.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1028 fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1028 wrote to memory of 3000 1028 fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe 83 PID 1028 wrote to memory of 3000 1028 fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe 83 PID 1028 wrote to memory of 3000 1028 fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe 83 PID 1028 wrote to memory of 3636 1028 fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe 88 PID 1028 wrote to memory of 3636 1028 fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe 88 PID 1028 wrote to memory of 3636 1028 fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe 88 PID 3636 wrote to memory of 2524 3636 cmd.exe 90 PID 3636 wrote to memory of 2524 3636 cmd.exe 90 PID 3636 wrote to memory of 2524 3636 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer start page
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\Regedit.exeRegedit.exe /s C:\jnnj.reg2⤵
- Sets service image path in registry
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Runs .reg file with regedit
PID:3000
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 1 && del "C:\Users\Admin\AppData\Local\Temp\fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2524
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD51728f9a2f4cb2635a964b71c7a2d2f49
SHA13f2f122cde78753144bd0207523a9e8b44388182
SHA2565f30bb41ec79bd9c58133e1c57fc25d63d9d16aabe40b8e90748450f4b3f3a45
SHA512a153cf2506ae2b9ccabaebcd51a800d132b6a0fc4192c1ddb65279a6a864131477646a2ac2e9b96142206c4ead6aa3dbb748f06e004da42c6841bc91fb60a0f9