Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 02:53
Static task
static1
Behavioral task
behavioral1
Sample
298b2ebc55fa47339c6f4f05ca54e421_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
298b2ebc55fa47339c6f4f05ca54e421_JaffaCakes118.exe
-
Size
766KB
-
MD5
298b2ebc55fa47339c6f4f05ca54e421
-
SHA1
217b3338bac08f4324f4ed02bd8d91f86e60b94e
-
SHA256
1ec188c0d0fb8dab2cd418c309e690f474ed6a29cd4070626ae7c55ec559fda9
-
SHA512
1b2fa5bf882162d752880681cc7730206ef86104d0cdc997bfc2ff6802466f8ce278a0924d443c4ef4f836628c8edc1ce3d5d8762b292352c3d16a18c22be376
-
SSDEEP
12288:Ezxp5cJwY+ZuoCvYDMHaGKCt3DIi0S80hrRZaqWR40rHeluRuzA1uWat3JUt+:EzxjcD3ozDM6GvNJvhjyR4kKsYAw/Z2+
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0008000000015d75-4.dat acprotect behavioral1/files/0x0008000000015d7f-23.dat acprotect -
Deletes itself 1 IoCs
pid Process 1964 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3036 Boercservice.exe -
Loads dropped DLL 6 IoCs
pid Process 2624 298b2ebc55fa47339c6f4f05ca54e421_JaffaCakes118.exe 2624 298b2ebc55fa47339c6f4f05ca54e421_JaffaCakes118.exe 2624 298b2ebc55fa47339c6f4f05ca54e421_JaffaCakes118.exe 2624 298b2ebc55fa47339c6f4f05ca54e421_JaffaCakes118.exe 3036 Boercservice.exe 3036 Boercservice.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\Boercservice.exe 298b2ebc55fa47339c6f4f05ca54e421_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Boercservice.exe 298b2ebc55fa47339c6f4f05ca54e421_JaffaCakes118.exe File created C:\Windows\SysWOW64\Boercservice.dll Boercservice.exe File opened for modification C:\Windows\SysWOW64\Boercservice.dll Boercservice.exe -
resource yara_rule behavioral1/files/0x0008000000015d75-4.dat upx behavioral1/memory/2624-6-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/memory/3036-27-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/files/0x0008000000015d7f-23.dat upx behavioral1/memory/2624-43-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/memory/3036-49-0x0000000010000000-0x000000001012A000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\IJL15.DLL Boercservice.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\4f73067947b8fd21e3f43f22006d2297.dat Boercservice.exe File opened for modification C:\Windows\Fonts\4f73067947b8fd21e3f43f22006d2297.dat Boercservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 298b2ebc55fa47339c6f4f05ca54e421_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Boercservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434633585" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "NO" Boercservice.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E6DA76F1-862D-11EF-848B-7694D31B45CA} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2624 298b2ebc55fa47339c6f4f05ca54e421_JaffaCakes118.exe 3036 Boercservice.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2660 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2624 298b2ebc55fa47339c6f4f05ca54e421_JaffaCakes118.exe 3036 Boercservice.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2624 wrote to memory of 3036 2624 298b2ebc55fa47339c6f4f05ca54e421_JaffaCakes118.exe 30 PID 2624 wrote to memory of 3036 2624 298b2ebc55fa47339c6f4f05ca54e421_JaffaCakes118.exe 30 PID 2624 wrote to memory of 3036 2624 298b2ebc55fa47339c6f4f05ca54e421_JaffaCakes118.exe 30 PID 2624 wrote to memory of 3036 2624 298b2ebc55fa47339c6f4f05ca54e421_JaffaCakes118.exe 30 PID 3036 wrote to memory of 2660 3036 Boercservice.exe 31 PID 3036 wrote to memory of 2660 3036 Boercservice.exe 31 PID 3036 wrote to memory of 2660 3036 Boercservice.exe 31 PID 3036 wrote to memory of 2660 3036 Boercservice.exe 31 PID 2660 wrote to memory of 1764 2660 IEXPLORE.EXE 32 PID 2660 wrote to memory of 1764 2660 IEXPLORE.EXE 32 PID 2660 wrote to memory of 1764 2660 IEXPLORE.EXE 32 PID 2660 wrote to memory of 1764 2660 IEXPLORE.EXE 32 PID 2624 wrote to memory of 1964 2624 298b2ebc55fa47339c6f4f05ca54e421_JaffaCakes118.exe 33 PID 2624 wrote to memory of 1964 2624 298b2ebc55fa47339c6f4f05ca54e421_JaffaCakes118.exe 33 PID 2624 wrote to memory of 1964 2624 298b2ebc55fa47339c6f4f05ca54e421_JaffaCakes118.exe 33 PID 2624 wrote to memory of 1964 2624 298b2ebc55fa47339c6f4f05ca54e421_JaffaCakes118.exe 33 PID 3036 wrote to memory of 2660 3036 Boercservice.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\298b2ebc55fa47339c6f4f05ca54e421_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\298b2ebc55fa47339c6f4f05ca54e421_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\Boercservice.exeC:\Windows\system32\Boercservice.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2660 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1764
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c c:\del_1.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bf3b8b609c900528c97c5b5387d3972
SHA163690d2d59915949495d32f2489eed3cb4e27082
SHA2565de0cc74e007138e69d100c4ec2eb8d196152fbe2ae598c3211e97db67dfc574
SHA51283a34496abf8b0a5673cfcf1976e7befa6b91331c835502a8c96267769056cc8bf40804e82e10f6927067268c35dc22d11fcf2bd7f8f07e6c76e78f1f640af9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c31a9ce97344925aaaf6b625e430ada
SHA1b7a3a883942145e9497eb0b346d34708fd2966a5
SHA256003bbd6a11ff4b8139c07cd68104f5bb0aedfe9d153c98b5092499b486466b33
SHA5124b40a02fd5db8dcb75cc48e9099e5595eec816e8c7ef47549fdad09514e2e7ca6991dd969764fed631a335d2efaf0018f5998ad01abe66efb04709ae9a2f2912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e54139f5c52291773a0d762acef9aaec
SHA1bcf5d69f56c97c371a2ec6ff03b9fc5f9ce7ab7d
SHA25679859f53844b3d973c882c46dea77ec163911609e31a0da7ebf0ce23fcf1ac05
SHA51268edca53776f80fc9f7a5f055b2d32bba8cad7a1d697dd12cfbb8b483f4d50cc040cde8ab9b93fe5dda299818e6fd07c383d981d275f95bae4be29accdf03274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3d618849578873e0c4957e955b917d0
SHA17aafbf2cfe5d2616e863ad448638d14d94e0505e
SHA256e80547e6aca89f703ab8255e862e41f8905994e9d9f84d1ee3bd8d4c8de242a7
SHA512eb2041b2ac54d76c9b83a139ba5863a25a5cb617d23f1a3d90a8b2574440d5cb5f677e8edd20c4a064f7689e0fc67c2defbbe5e466fd20cd96de3ed6b7c5dcb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599a5d454735c65fd2099e5a07880a7dd
SHA12971709a8162c01f4d720e323f7b924ca44bbef1
SHA256d05376760d1dd501cf7cfcc849139a4b2f291e32ffa119afffd3a4799c21e376
SHA5120f55e1e7d7a699071395b55cb193551171a6ea1aa72fcaa8d871967aa38117d5534bb5685cd1f187d90bbdd61e16e475eda534a2b10740ad661637ebe84123b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b83a228763e0be50480eaff9da1d8b76
SHA102c8c151035e278012ac7379b5c79d0eeab8fc82
SHA256831c8b515806131d2e993bc933543a295e149a2ae3b8a33d950514dc88a18309
SHA5123fdd1508d7e4d490fa3eb1b2a743cd4787657c36fa83c62f298cb0f0040d80735a7700e2704d25c37bf7b469b4a835d2989519642c763364858bfc1e72cefa84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d33981b657a7fedf25f522571903068
SHA1a614e2f0c6c02de454167949dba7acc3765f062f
SHA2563fd5fb7bd5e3c20e514e13d1250c82da5f80868e1a13d9fa87180637907ac365
SHA512f24dce8d0c21c013a8b7ccc7048bda0805a6ee9fd6888203fab745d6796d3148fe8de33b2d4f48ef6b1ba296c621107de9b570f115dd27186d882914eed53a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cc0b59af5126abcfc3fe129bf6a8824
SHA1a8285d914f1df61aac62cd8279dc2a08dd2a9e6f
SHA256e041314a587619aea8d5a1ab95e8f97c2170bfc3dffaa90658ab50221c3e4fca
SHA5129994dbf9a49d132df6041e15235cc56c879cfdb6b41274edaa26b7b559145ccfba10dd551eff065dbe0a2ff7ab6e45138caaec24357487480069574009616e81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5057e946edd13c82b0f7569dbbbbdfc51
SHA1c5e1d1582b29ac33a8328762cb2de924b4739cc1
SHA2560f9d4b836480fa0590311a53026e0c5b3a257a0130ba87cc18d2a66517d78490
SHA51220197282c6f3cc9a0ddf3e887b522429f1af84529f8c188b2301f45495e59ccd7fc744d13aa36b65a838358074422643a841b86dd91fd779b2e12f12c58af0cb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
34KB
MD5387cf1d2f17aff6967f3107773764513
SHA1b971bcd44988bee744f8133acb032e07d9dcd1db
SHA25674c55aaee905be674763d679ca05a6baaf93f456b5d8935d6293e523766968c6
SHA51219a4fb39b2f9863c92d76016290e701fd6bb1aa5d889896666922fd862d5b72b95a97aa27d3d0b3218233ba9dbcb3db147efbf9e61e5be853d4d3672e87bfd5c
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
230B
MD59fb410bc1b353525d39d74c6a83e714b
SHA1e99bc6e4f8d006c0903567bb4a9ff034341cadfa
SHA256a1ffcb30b9c87b0200796e4ad7fc7900e45cf8bb09566e4bbbbcf33895063f9e
SHA5120348faf183efc96500f571866798fb1ed70787b97da3c84012a5831eea6746a7e1ce22450644b0472fb1f3d9a43d23476ddb0bb53c5e79a4824e65cb23918a43
-
Filesize
112KB
MD52706bbdce10ad3b0d1dafc85a0668678
SHA194474aabe849670a09a8c29198a6c47092d60920
SHA25605a3305b9d05ae5e7b8adc8cc55a80f9061af2159242ae7774e84020fad6fd6c
SHA5127da270c6f1fceb90afec7a110216a023e6fda81bdec2c3aa0c6884c4c891e7aeedb698e3c24392723647e79d88df87e5c1eb867fbe75f09372ab1a052b8727a7
-
Filesize
406KB
MD5e79169d47394020f7c893abb840b61bb
SHA1c5b9c2cbef3d5458b52ebb67461e84432673fb1b
SHA25611c25cdeb02ac401d913dc48b935a087e32c2d9b7b7c4a5cfdf36e4947e959dc
SHA51221ca64559082a31e46e28513de762fa2239c521f60b3485bf99926f895f0bf6f63fe2162c3e2eb25705efad22d351e24b8283442f4954ac88bc8c56ef5dc529a
-
Filesize
766KB
MD5298b2ebc55fa47339c6f4f05ca54e421
SHA1217b3338bac08f4324f4ed02bd8d91f86e60b94e
SHA2561ec188c0d0fb8dab2cd418c309e690f474ed6a29cd4070626ae7c55ec559fda9
SHA5121b2fa5bf882162d752880681cc7730206ef86104d0cdc997bfc2ff6802466f8ce278a0924d443c4ef4f836628c8edc1ce3d5d8762b292352c3d16a18c22be376