Analysis
-
max time kernel
131s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 05:30
Static task
static1
Behavioral task
behavioral1
Sample
04878737071b22a2c2ca138defb34cd6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
04878737071b22a2c2ca138defb34cd6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
04878737071b22a2c2ca138defb34cd6_JaffaCakes118.exe
-
Size
108KB
-
MD5
04878737071b22a2c2ca138defb34cd6
-
SHA1
d09d2f7565c888272af4180aaa84dab444fd1b7c
-
SHA256
b838a44f3df6cf6d09e9ef42f25d3139ee4cb96dcfb1047a689c7836d201c90f
-
SHA512
ea479e9f17d182de471c7e08d55dd14ccc7589ceb0541941d70de9704b055738386457d8010a451eee5ca9e0b6db04a48afb6b43930974a8052b93cfd3ca5f24
-
SSDEEP
1536:eaWDboVghDhHy/PqZBQ0jFjWq0Wn0gMT7fuDSMCd1oQPR2oz:90M6hDhHy/PIDjFj90gdSNd1oQPR2oz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2028 SMSvcHost.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Microsoft.KuaiLeKuangBen\SMSvcHost.exe cmd.exe File opened for modification C:\Program Files\Microsoft.KuaiLeKuangBen\SMSvcHost.exe cmd.exe File opened for modification C:\Program Files\Microsoft.KuaiLeKuangBen\SMSvcHost.bat SMSvcHost.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04878737071b22a2c2ca138defb34cd6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSvcHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2728 PING.EXE 1804 PING.EXE -
Kills process with taskkill 2 IoCs
pid Process 4708 taskkill.exe 3424 taskkill.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{44B7CCF4-7FB6-11EF-A2A4-4A4A300BA5D9} = "0" IEXPLORE.EXE -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2728 PING.EXE 1804 PING.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4708 taskkill.exe Token: SeDebugPrivilege 3424 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 920 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2516 04878737071b22a2c2ca138defb34cd6_JaffaCakes118.exe 2028 SMSvcHost.exe 920 IEXPLORE.EXE 920 IEXPLORE.EXE 4588 IEXPLORE.EXE 4588 IEXPLORE.EXE 920 IEXPLORE.EXE 920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2604 2516 04878737071b22a2c2ca138defb34cd6_JaffaCakes118.exe 89 PID 2516 wrote to memory of 2604 2516 04878737071b22a2c2ca138defb34cd6_JaffaCakes118.exe 89 PID 2516 wrote to memory of 2604 2516 04878737071b22a2c2ca138defb34cd6_JaffaCakes118.exe 89 PID 2604 wrote to memory of 2728 2604 cmd.exe 91 PID 2604 wrote to memory of 2728 2604 cmd.exe 91 PID 2604 wrote to memory of 2728 2604 cmd.exe 91 PID 2604 wrote to memory of 2028 2604 cmd.exe 92 PID 2604 wrote to memory of 2028 2604 cmd.exe 92 PID 2604 wrote to memory of 2028 2604 cmd.exe 92 PID 2604 wrote to memory of 1804 2604 cmd.exe 93 PID 2604 wrote to memory of 1804 2604 cmd.exe 93 PID 2604 wrote to memory of 1804 2604 cmd.exe 93 PID 2028 wrote to memory of 920 2028 SMSvcHost.exe 98 PID 2028 wrote to memory of 920 2028 SMSvcHost.exe 98 PID 920 wrote to memory of 4588 920 IEXPLORE.EXE 99 PID 920 wrote to memory of 4588 920 IEXPLORE.EXE 99 PID 920 wrote to memory of 4588 920 IEXPLORE.EXE 99 PID 2028 wrote to memory of 4708 2028 SMSvcHost.exe 104 PID 2028 wrote to memory of 4708 2028 SMSvcHost.exe 104 PID 2028 wrote to memory of 4708 2028 SMSvcHost.exe 104 PID 2028 wrote to memory of 4980 2028 SMSvcHost.exe 106 PID 2028 wrote to memory of 4980 2028 SMSvcHost.exe 106 PID 2028 wrote to memory of 4980 2028 SMSvcHost.exe 106 PID 4980 wrote to memory of 2212 4980 iexplore.exe 107 PID 4980 wrote to memory of 2212 4980 iexplore.exe 107 PID 920 wrote to memory of 3920 920 IEXPLORE.EXE 108 PID 920 wrote to memory of 3920 920 IEXPLORE.EXE 108 PID 920 wrote to memory of 3920 920 IEXPLORE.EXE 108 PID 2028 wrote to memory of 3424 2028 SMSvcHost.exe 109 PID 2028 wrote to memory of 3424 2028 SMSvcHost.exe 109 PID 2028 wrote to memory of 3424 2028 SMSvcHost.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\04878737071b22a2c2ca138defb34cd6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\04878737071b22a2c2ca138defb34cd6_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\\nResurrection.bat2⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\PING.EXEping -a 127.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2728
-
-
C:\Program Files\Microsoft.KuaiLeKuangBen\SMSvcHost.exe"C:\Program Files\Microsoft.KuaiLeKuangBen\SMSvcHost.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" ?mac=4A-4A-30-0B-A5-D9&mdx=c6f2f93133905f75da4b02ccc19ab66aadb7bf1cff0c81595de38f51cd60c62c&ver=53-10-34-65-64⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:920 CREDAT:17410 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4588
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:920 CREDAT:82948 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:3920
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 9204⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4708
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\download.html4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" C:\Users\Admin\AppData\Local\Temp\download.html5⤵
- Modifies Internet Explorer settings
PID:2212
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 49804⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3424
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1804
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=2692,i,4174666705242427184,7333705955694532165,262144 --variations-seed-version --mojo-platform-channel-handle=4100 /prefetch:81⤵PID:624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD504878737071b22a2c2ca138defb34cd6
SHA1d09d2f7565c888272af4180aaa84dab444fd1b7c
SHA256b838a44f3df6cf6d09e9ef42f25d3139ee4cb96dcfb1047a689c7836d201c90f
SHA512ea479e9f17d182de471c7e08d55dd14ccc7589ceb0541941d70de9704b055738386457d8010a451eee5ca9e0b6db04a48afb6b43930974a8052b93cfd3ca5f24
-
Filesize
4KB
MD5294fc8f4558aeb3b17a439c7ac73a3b0
SHA115664cd150f9e493c4998ac8d343d841f38071fd
SHA25698a5654e84231c5aa13139049a6c6d0a6a2f8c433cbae4ccda96829aed9f9d86
SHA5129e64b9455eb0f07cd18df2532583fccf26d6282fed364664912f23eb1bbd7f17c0571695cc222796492775531abeb20f75debbaab4759b566d9e32fc67303eb6
-
Filesize
4KB
MD55879b2763fc53367a29f1e64721976db
SHA1edee687feb0438fbb4fdf6e0b9bc941f2a0c464d
SHA256b5f794efdee46f6e8759441cfb2bdc36640f50e47cad9f11cea18bed48e6c43b
SHA5126b04809dad6d927b7c9fe0d674b8e14c9bb374ea069558e53468e33da76be44c8de6221f90f719462bcea90bec1a90ece58a706e440229ec78d81ba9063ad0f1
-
Filesize
339B
MD55a98d5d2215c0ccd886a044cd89d9858
SHA114f5e6416dfd8cc6c8957b38f9b9ce494d215917
SHA256fdbe8534c2667ed467ab87c09ca74d98bacbccd3509c991161187d7d42041490
SHA512ef89962d86628d6c2f3144ef6e16bb56d4c97ae67d9d8df62c6d9f69cbcad642dd6ee5a5242cfaf44c95d717aaea1709acedac4ecad2eb849534aa600a476e24