Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 01:06
Behavioral task
behavioral1
Sample
282ef99b6eb61cee00223678d599851b_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
282ef99b6eb61cee00223678d599851b_JaffaCakes118.exe
-
Size
281KB
-
MD5
282ef99b6eb61cee00223678d599851b
-
SHA1
a27f9b4aef41147b04874e944d0c9bf3b8dc42a7
-
SHA256
db9e5139d623452d9d765bd3b5d5718469fe9ae7acadf72215f997d12044d903
-
SHA512
61f28cf81ff50e90ed938e965737c875030302dacd31b903bed990b78955215be42e06e96fa34c683170754a794524e65935872b8e8591ca8a21623aed852169
-
SSDEEP
6144:3eRowJ8c90lALqkUpIvZ0ZMA151oIrlosM2saGoSp:uRowJ8g1qTg0ZR1t1MdloSp
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 5 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000a000000023c14-9.dat acprotect behavioral2/memory/5040-11-0x0000000010000000-0x0000000010009000-memory.dmp acprotect behavioral2/memory/4828-14-0x0000000010000000-0x0000000010009000-memory.dmp acprotect behavioral2/memory/4828-17-0x0000000010000000-0x0000000010009000-memory.dmp acprotect behavioral2/memory/5040-19-0x0000000010000000-0x0000000010009000-memory.dmp acprotect -
Executes dropped EXE 2 IoCs
pid Process 5040 DZ606314.TMP 4828 DZ606314.TMP -
Loads dropped DLL 3 IoCs
pid Process 5040 DZ606314.TMP 4828 DZ606314.TMP 4828 DZ606314.TMP -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B69F34DD-F0F9-42DC-9EDD-957187DA688D}\NoExplorer = "1" DZ606314.TMP Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B69F34DD-F0F9-42DC-9EDD-957187DA688D} DZ606314.TMP -
resource yara_rule behavioral2/memory/3092-0-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral2/files/0x000a000000023c14-9.dat upx behavioral2/memory/5040-11-0x0000000010000000-0x0000000010009000-memory.dmp upx behavioral2/memory/4828-14-0x0000000010000000-0x0000000010009000-memory.dmp upx behavioral2/memory/4828-17-0x0000000010000000-0x0000000010009000-memory.dmp upx behavioral2/memory/5040-19-0x0000000010000000-0x0000000010009000-memory.dmp upx behavioral2/memory/3092-20-0x0000000000400000-0x0000000000447000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\system\DirectX428777.dll 282ef99b6eb61cee00223678d599851b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 282ef99b6eb61cee00223678d599851b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DZ606314.TMP Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DZ606314.TMP -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1\ColumnProp\25 282ef99b6eb61cee00223678d599851b_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1\ColumnProp\25\Visible = "0" 282ef99b6eb61cee00223678d599851b_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\MAO Settings\Category\1\ColumnProp\25 282ef99b6eb61cee00223678d599851b_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings 282ef99b6eb61cee00223678d599851b_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category 282ef99b6eb61cee00223678d599851b_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1 282ef99b6eb61cee00223678d599851b_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\Category\1\ColumnProp 282ef99b6eb61cee00223678d599851b_JaffaCakes118.exe -
Modifies registry class 42 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3ADCD351-7F41-4D06-A1D9-7F8EEC48F498}\1.0\FLAGS\ = "0" DZ606314.TMP Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{269EADEF-9DF6-40BF-8EF0-13A9FF9DED1D}\TypeLib\Version = "1.0" DZ606314.TMP Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B69F34DD-F0F9-42DC-9EDD-957187DA688D}\ = "FlashPlayer.Class" DZ606314.TMP Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{269EADEF-9DF6-40BF-8EF0-13A9FF9DED1D}\ProxyStubClsid DZ606314.TMP Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B69F34DD-F0F9-42DC-9EDD-957187DA688D} DZ606314.TMP Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B69F34DD-F0F9-42DC-9EDD-957187DA688D}\InprocServer32 DZ606314.TMP Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3ADCD351-7F41-4D06-A1D9-7F8EEC48F498} DZ606314.TMP Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3ADCD351-7F41-4D06-A1D9-7F8EEC48F498}\1.0 DZ606314.TMP Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B69F34DD-F0F9-42DC-9EDD-957187DA688D}\ProgID DZ606314.TMP Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3ADCD351-7F41-4D06-A1D9-7F8EEC48F498}\1.0\0\win32 DZ606314.TMP Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{269EADEF-9DF6-40BF-8EF0-13A9FF9DED1D}\ProxyStubClsid32 DZ606314.TMP Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{269EADEF-9DF6-40BF-8EF0-13A9FF9DED1D}\TypeLib\Version = "1.0" DZ606314.TMP Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FlashPlayer.Class\Clsid DZ606314.TMP Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FlashPlayer.Class DZ606314.TMP Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FlashPlayer.Class\Clsid\ = "{B69F34DD-F0F9-42DC-9EDD-957187DA688D}" DZ606314.TMP Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{269EADEF-9DF6-40BF-8EF0-13A9FF9DED1D}\ = "Class" DZ606314.TMP Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3ADCD351-7F41-4D06-A1D9-7F8EEC48F498}\1.0\ = "FlashPlayer" DZ606314.TMP Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3ADCD351-7F41-4D06-A1D9-7F8EEC48F498}\1.0\0 DZ606314.TMP Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3ADCD351-7F41-4D06-A1D9-7F8EEC48F498}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Common Files\\system" DZ606314.TMP Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{269EADEF-9DF6-40BF-8EF0-13A9FF9DED1D} DZ606314.TMP Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B69F34DD-F0F9-42DC-9EDD-957187DA688D}\InprocServer32\ = "C:\\Program Files (x86)\\Common Files\\system\\DirectX428777.dll" DZ606314.TMP Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{269EADEF-9DF6-40BF-8EF0-13A9FF9DED1D}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" DZ606314.TMP Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3ADCD351-7F41-4D06-A1D9-7F8EEC48F498}\1.0\HELPDIR DZ606314.TMP Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{269EADEF-9DF6-40BF-8EF0-13A9FF9DED1D}\ = "_Class" DZ606314.TMP Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{269EADEF-9DF6-40BF-8EF0-13A9FF9DED1D}\ProxyStubClsid32 DZ606314.TMP Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B69F34DD-F0F9-42DC-9EDD-957187DA688D}\InprocServer32\ThreadingModel = "Apartment" DZ606314.TMP Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B69F34DD-F0F9-42DC-9EDD-957187DA688D}\TypeLib\ = "{3ADCD351-7F41-4D06-A1D9-7F8EEC48F498}" DZ606314.TMP Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{269EADEF-9DF6-40BF-8EF0-13A9FF9DED1D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" DZ606314.TMP Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{269EADEF-9DF6-40BF-8EF0-13A9FF9DED1D}\TypeLib DZ606314.TMP Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B69F34DD-F0F9-42DC-9EDD-957187DA688D}\TypeLib DZ606314.TMP Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3ADCD351-7F41-4D06-A1D9-7F8EEC48F498}\1.0\FLAGS DZ606314.TMP Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{269EADEF-9DF6-40BF-8EF0-13A9FF9DED1D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" DZ606314.TMP Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{269EADEF-9DF6-40BF-8EF0-13A9FF9DED1D}\TypeLib DZ606314.TMP Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{269EADEF-9DF6-40BF-8EF0-13A9FF9DED1D}\TypeLib\ = "{3ADCD351-7F41-4D06-A1D9-7F8EEC48F498}" DZ606314.TMP Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{269EADEF-9DF6-40BF-8EF0-13A9FF9DED1D}\ = "_Class" DZ606314.TMP Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FlashPlayer.Class\ = "FlashPlayer.Class" DZ606314.TMP Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B69F34DD-F0F9-42DC-9EDD-957187DA688D}\VERSION\ = "1.0" DZ606314.TMP Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3ADCD351-7F41-4D06-A1D9-7F8EEC48F498}\1.0\0\win32\ = "C:\\Program Files (x86)\\Common Files\\system\\DirectX428777.dll" DZ606314.TMP Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{269EADEF-9DF6-40BF-8EF0-13A9FF9DED1D} DZ606314.TMP Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{269EADEF-9DF6-40BF-8EF0-13A9FF9DED1D}\TypeLib\ = "{3ADCD351-7F41-4D06-A1D9-7F8EEC48F498}" DZ606314.TMP Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B69F34DD-F0F9-42DC-9EDD-957187DA688D}\ProgID\ = "FlashPlayer.Class" DZ606314.TMP Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B69F34DD-F0F9-42DC-9EDD-957187DA688D}\VERSION DZ606314.TMP -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\2740BE0CB97A22380960230E8F45FE5ABB8BB501\Blob = 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 DZ606314.TMP Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\2740BE0CB97A22380960230E8F45FE5ABB8BB501 DZ606314.TMP -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3092 282ef99b6eb61cee00223678d599851b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3092 wrote to memory of 5040 3092 282ef99b6eb61cee00223678d599851b_JaffaCakes118.exe 84 PID 3092 wrote to memory of 5040 3092 282ef99b6eb61cee00223678d599851b_JaffaCakes118.exe 84 PID 3092 wrote to memory of 5040 3092 282ef99b6eb61cee00223678d599851b_JaffaCakes118.exe 84 PID 5040 wrote to memory of 4828 5040 DZ606314.TMP 85 PID 5040 wrote to memory of 4828 5040 DZ606314.TMP 85 PID 5040 wrote to memory of 4828 5040 DZ606314.TMP 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\282ef99b6eb61cee00223678d599851b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\282ef99b6eb61cee00223678d599851b_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\DZ606314.TMPC:\Users\Admin\AppData\Local\Temp\DZ606314.TMP 1 2 "C:\Program Files (x86)\Common Files\system\DirectX428777.dll" {B69F34DD-F0F9-42DC-9EDD-957187DA688D}2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\DZ606314.TMP"C:\Users\Admin\AppData\Local\Temp\DZ606314.TMP" 2 "2" "C:\Program Files (x86)\Common Files\system\DirectX428777.dll" "{B69F34DD-F0F9-42DC-9EDD-957187DA688D}"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
- Modifies system certificate store
PID:4828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD50294aa91bb3bc157d06cde328996fd87
SHA1efaed75fb9823758a69b86ad8ed15d347611f17f
SHA25625480fb8ce1bdb8987bcc99a38ac5709a21df0d301e53003901941147c970976
SHA51265a418ca5a67d8c87d8d5af6082707d03cc54bfb84bd85cdcfc4ca1c4111268aa42615371a8d310d9ed4ad1c41bb3214b3689048c4f0073dd7cd88ec05c7c5d6
-
Filesize
57KB
MD54967412e78ac07cbcef236fdff0a585a
SHA1c331355f7d2b5250e7b9cdf775b7289521fbf2c7
SHA256a1bbbfd75f07187c839d8310f273b893f8926375ff6648b774847559bd88a9d4
SHA512f923fb4cf000257c5babc83989956407ead3f0213bc13c16327baaa29200ffd62d803ee800b3aa14f540348c9d351a5822f94d9134a085c7b060c544b9f4efd3
-
Filesize
9KB
MD58a57d07872366600c5aa172c6d39a02f
SHA1acc5853d3102fa3192f450e8354fbe8ac5a546b7
SHA256d83e40d529ec8b2742adf62f7816b584d47dd96b358b404b8cefe5b817239487
SHA512c49de70e67e72e2047a6ac2bb2a03160aaf5ff196bfc6aecc8a0ff6b616bedf5b51701a4c1479f0afbf56f8c6eb0feecce97d3697baaebe93f29ff3ac9f388fd