Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
25ae8616ec601286bbbc90aa970526c3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25ae8616ec601286bbbc90aa970526c3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
25ae8616ec601286bbbc90aa970526c3_JaffaCakes118.exe
-
Size
550KB
-
MD5
25ae8616ec601286bbbc90aa970526c3
-
SHA1
eca72e4e970fffebd76cb9640fc4b6bf6ac7325d
-
SHA256
b6f277069904bfa64aa38bd7341292475d497b0886cfa3d3216be717cf1f1b01
-
SHA512
83b78bc21ac073e9f841d4e6e494267b87c557a68ab12268e698b9c5844c64b27a15ce2b2f0370cde12a37fb1aa793a1cd68860a024e63238263bc49f7893012
-
SSDEEP
12288:6GZtguR2iS44BqXjoHB6qe7A1k9NS2tfFkk9vaUJa:LZOuR2kHohLe7AeW2tfaUJ
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1848 netsh.exe 3692 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 232 atlspl.exe 2728 atlspl.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\atlspl.exe.log atlspl.exe File opened for modification C:\Windows\SysWOW64\atlspl.exe.log atlspl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 atlspl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE atlspl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies atlspl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 atlspl.exe File created C:\Windows\SysWOW64\atlspl.exe 25ae8616ec601286bbbc90aa970526c3_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\atlspl.exe 25ae8616ec601286bbbc90aa970526c3_JaffaCakes118.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language atlspl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25ae8616ec601286bbbc90aa970526c3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language atlspl.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" atlspl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" atlspl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" atlspl.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix atlspl.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" atlspl.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" atlspl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ atlspl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" atlspl.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2728 atlspl.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3928 wrote to memory of 232 3928 25ae8616ec601286bbbc90aa970526c3_JaffaCakes118.exe 83 PID 3928 wrote to memory of 232 3928 25ae8616ec601286bbbc90aa970526c3_JaffaCakes118.exe 83 PID 3928 wrote to memory of 232 3928 25ae8616ec601286bbbc90aa970526c3_JaffaCakes118.exe 83 PID 2728 wrote to memory of 3692 2728 atlspl.exe 88 PID 2728 wrote to memory of 3692 2728 atlspl.exe 88 PID 2728 wrote to memory of 3692 2728 atlspl.exe 88 PID 2728 wrote to memory of 1848 2728 atlspl.exe 90 PID 2728 wrote to memory of 1848 2728 atlspl.exe 90 PID 2728 wrote to memory of 1848 2728 atlspl.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\25ae8616ec601286bbbc90aa970526c3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\25ae8616ec601286bbbc90aa970526c3_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\atlspl.exe"C:\Windows\system32\atlspl.exe" /i2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:232
-
-
C:\Windows\SysWOW64\atlspl.exe"C:\Windows\SysWOW64\atlspl.exe" /s /p 270161⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall firewall delete rule name="atlspl.exe"2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3692
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall firewall add rule name="atlspl.exe" dir=in action=allow program="C:\Windows\SysWOW64\atlspl.exe" enable=yes profile=any2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
550KB
MD525ae8616ec601286bbbc90aa970526c3
SHA1eca72e4e970fffebd76cb9640fc4b6bf6ac7325d
SHA256b6f277069904bfa64aa38bd7341292475d497b0886cfa3d3216be717cf1f1b01
SHA51283b78bc21ac073e9f841d4e6e494267b87c557a68ab12268e698b9c5844c64b27a15ce2b2f0370cde12a37fb1aa793a1cd68860a024e63238263bc49f7893012