Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
0cb9802d25363248aa1b64a44bb09cc7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0cb9802d25363248aa1b64a44bb09cc7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0cb9802d25363248aa1b64a44bb09cc7_JaffaCakes118.exe
-
Size
501KB
-
MD5
0cb9802d25363248aa1b64a44bb09cc7
-
SHA1
94fab7822332e452a2bb493f8651a4cc24ddf644
-
SHA256
dd77adda6b4f260a9f5ef079e520d58b35abf166b72b63ee5968883b9d7eb440
-
SHA512
9ad547ae5e23683ccc30d9c35bf6695c60fa0bf4abe4ef19ce96b5ca71f6cb5a3e326c2c1de2cb473af3c1a1b1658adae87ab15d98bc365b2b2b2a6c35aa7618
-
SSDEEP
12288:rWlfxLwk9hLMUYoura4RE0m77JWymUgG+6GO/:GJ0uhAUYouu4/K7JWymUD+m
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2820 1324 regedit.exe 84 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation TPlayer.exe -
Executes dropped EXE 1 IoCs
pid Process 3340 TPlayer.exe -
Modifies system executable filetype association 2 TTPs 6 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\{00021401-0000-0000-C000-000000000046} regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\ = "´ò¿ª" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Program Files\\TTPlayer\\TPlayer.exe\" \"%1\"" regedit.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\TTPlayer\TPlayer.exe 0cb9802d25363248aa1b64a44bb09cc7_JaffaCakes118.exe File opened for modification C:\Program Files\TTPlayer\TPlayer.exe 0cb9802d25363248aa1b64a44bb09cc7_JaffaCakes118.exe File opened for modification C:\Program Files\TTPlayer\Config.ini TPlayer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0cb9802d25363248aa1b64a44bb09cc7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TPlayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 36 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\{00021401-0000-0000-C000-000000000046} regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.link regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.link\ = "linkfile" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.link\ShellEx regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.link\ShellEx\{00021500-0000-0000-C000-000000000046} regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.link\ShellEx\{BB2E617C-0920-11d1-9A0B-00C04FC2D6C1} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Program Files\\TTPlayer\\TPlayer.exe\" \"%1\"" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.link\ShellEx\{000214EE-0000-0000-C000-000000000046} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.link\ShellEx\{00021500-0000-0000-C000-000000000046}\ = "{00021401-0000-0000-C000-000000000046}" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\linkfile\shellex\IconHandler\ = "{00021401-0000-0000-C000-000000000046}" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\linkfile\shellex\PropertySheetHandlers\ShimLayer Property Page regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\ = "´ò¿ª" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.link\ShellEx\{000214F9-0000-0000-C000-000000000046} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.link\ShellEx\{BB2E617C-0920-11d1-9A0B-00C04FC2D6C1}\ = "{00021401-0000-0000-C000-000000000046}" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\linkfile\EditFlags = "1" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\linkfile\NeverShowExt regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\linkfile\shellex\ContextMenuHandlers regedit.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings TPlayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\linkfile regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\linkfile\shellex regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\linkfile\shellex\DropHandler regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\linkfile\CLSID regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\linkfile\IsShortcut regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\linkfile\shellex\ContextMenuHandlers\Offline Files\ = "{750fdf0e-2a26-11d1-a3ea-080036587f03}" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\linkfile\shellex\ContextMenuHandlers\{00021401-0000-0000-C000-000000000046} regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\linkfile\shellex\IconHandler regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.link\ShellEx\{000214F9-0000-0000-C000-000000000046}\ = "{00021401-0000-0000-C000-000000000046}" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\linkfile\shellex\PropertySheetHandlers regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\linkfile\shellex\PropertySheetHandlers\ShimLayer Property Page\ = "{513D916F-2A8E-4F51-AEAB-0CBC76FB1AF8}" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.link\ShellEx\{000214EE-0000-0000-C000-000000000046}\ = "{00021401-0000-0000-C000-000000000046}" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\linkfile\CLSID\ = "{00021401-0000-0000-C000-000000000046}" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\linkfile\shellex\ContextMenuHandlers\Offline Files regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\linkfile\shellex\DropHandler\ = "{00021401-0000-0000-C000-000000000046}" regedit.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2820 regedit.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3340 TPlayer.exe 3340 TPlayer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4456 wrote to memory of 3340 4456 0cb9802d25363248aa1b64a44bb09cc7_JaffaCakes118.exe 82 PID 4456 wrote to memory of 3340 4456 0cb9802d25363248aa1b64a44bb09cc7_JaffaCakes118.exe 82 PID 4456 wrote to memory of 3340 4456 0cb9802d25363248aa1b64a44bb09cc7_JaffaCakes118.exe 82 PID 3340 wrote to memory of 216 3340 TPlayer.exe 83 PID 3340 wrote to memory of 216 3340 TPlayer.exe 83 PID 3340 wrote to memory of 216 3340 TPlayer.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cb9802d25363248aa1b64a44bb09cc7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0cb9802d25363248aa1b64a44bb09cc7_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Program Files\TTPlayer\TPlayer.exe"C:\Program Files\TTPlayer\TPlayer.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\49AB2.vbs"3⤵
- System Location Discovery: System Language Discovery
PID:216
-
-
-
C:\Windows\regedit.exeregedit /s "C:\Users\Admin\AppData\Local\Temp\INBGC.reg"1⤵
- Process spawned unexpected child process
- Modifies system executable filetype association
- Modifies registry class
- Runs .reg file with regedit
PID:2820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18.1MB
MD5ac4d37f613405c385bf7bf35dde962fb
SHA1fd9da121f7d31204ae0599362177240a5fef8f78
SHA2567e15de3029f4a1e7ec471b6586942c13483732c5179eff3d10646cdc16beeb99
SHA512817f8199cf6b8c36234314279457699c61811a6b6fd1668836b3cc5a501628e52666b55e957b4a185a08e2a556edd24a04cfcb7996d5bd9a3bd558ad1465a818
-
Filesize
541B
MD5838975c4aa22954a147496c482677667
SHA1f00e7f71f9c920bed98f186fd9ce3e9f93d85415
SHA25608771ca60e5c917b733e132074c9849c93cebed0ee1b33c67f0811648f704fb5
SHA51285117f8abe631612c1af78e34c7c14df2c19158d97c943a5e6ed0a7116fac7f99c9a5f08abfa0ea60463fdfeb620056d178c8d7be76edb13307e449bfcbd94df
-
Filesize
1KB
MD5873a0456fbaa689791a316bd95c4fc9e
SHA1b8bbb098fffec911a760a3520823074d46090157
SHA2564ccc1598bea95fa8476a3765e4c94ffc8005dda5ea1e89491344dd691e6a62e4
SHA5121e48d7150b2610ed71be2bab65dddd395e06ae86f328c8f3f30937db2bb41c2516be35389c48e3d2418c20de56ecd9ed61987d8513fa7e0616c241d0b922a9a2