Analysis
-
max time kernel
142s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
2a65061fa559d41238775ac3189e271e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2a65061fa559d41238775ac3189e271e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2a65061fa559d41238775ac3189e271e_JaffaCakes118.exe
-
Size
429KB
-
MD5
2a65061fa559d41238775ac3189e271e
-
SHA1
e0d9738db0f9acb1f5e1dd33a8ba37bd054bc890
-
SHA256
0db637d3ba640cd0659b4c03b6e516b6644d0c352ae7e7fa331d318308306ae0
-
SHA512
21f81538b7aabebfdd27e7d0342eb5398e33e263ea8ca5e2024aecd743a31939e02d601861fa3425fce045df11d2b9b360f1949c32b20adb0f2bef5dd7ba5696
-
SSDEEP
12288:eUQ6fxZ5iqxSTuKJ+Ayjr1rqtZ/lffliurT5M42:FfxPTlHAEpqb/Lius
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 24 1960 rundll32.exe -
resource yara_rule behavioral2/files/0x000b000000023b67-6.dat aspack_v212_v242 -
Loads dropped DLL 6 IoCs
pid Process 2432 2a65061fa559d41238775ac3189e271e_JaffaCakes118.exe 2432 2a65061fa559d41238775ac3189e271e_JaffaCakes118.exe 2432 2a65061fa559d41238775ac3189e271e_JaffaCakes118.exe 2432 2a65061fa559d41238775ac3189e271e_JaffaCakes118.exe 2432 2a65061fa559d41238775ac3189e271e_JaffaCakes118.exe 1960 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\{0c5f55bc-8ea3-686f-489e-662ff1b1867b} = "C:\\Windows\\System32\\Rundll32.exe \"C:\\Windows\\system32\\{aaef255f-83b1-ec14-6a65-7502e9df7357}.dll\" DllStart" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\{0c5f55bc-8ea3-686f-489e-662ff1b1867b} = "C:\\Windows\\System32\\Rundll32.exe \"C:\\Windows\\system32\\{aaef255f-83b1-ec14-6a65-7502e9df7357}.dll\" DllStart" 2a65061fa559d41238775ac3189e271e_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5f511883-6d71-a6de-e7f4-862d5ee40780} 2a65061fa559d41238775ac3189e271e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5f511883-6d71-a6de-e7f4-862d5ee40780}\NoExplorer = "\"\"" 2a65061fa559d41238775ac3189e271e_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\{aaef255f-83b1-ec14-6a65-7502e9df7357}.dll-uninst.exe 2a65061fa559d41238775ac3189e271e_JaffaCakes118.exe File created C:\Windows\SysWOW64\{aaef255f-83b1-ec14-6a65-7502e9df7357}.dll 2a65061fa559d41238775ac3189e271e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a65061fa559d41238775ac3189e271e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ielowutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 704693514a1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{7BBD0DBE-863D-11EF-A4B7-C67090DD1599} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1343456345" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31136330" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000028e76085f1f7640a0643881d549bbfc000000000200000000001066000000010000200000001cb41c6973dc9b1c0b6cf1b68cd078d43e28652551069d30576e424a49083b6d000000000e800000000200002000000055dde5a16a27bbc11017c0be8d554d9bf6747020cf50e6900118e9314422402220000000a5737bb756e4e0b8dcc3579e181fad0128b48ba57e5197ffcb06f0525737bbc040000000b7704747b290bf9403b134aa4f36b228e4caa6ca1de2c38a33b81281b5301f3a47bf73406c317e8efc0eb3e15c4c032b9f09425aa1d23c5e5eb8261b5352d399 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80fc90514a1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31136330" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1343456345" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31136330" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1345801070" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000028e76085f1f7640a0643881d549bbfc0000000002000000000010660000000100002000000047af89c54a4f2b73c04d2972da68083ba49f13623a0830a431b706c2af2e695e000000000e80000000020000200000001aab27b3af6988d750a0a29b1db197b3a1b2e1593dceda15c4830d3b4d3ab7c520000000e9db73455eedbd0e73da26ba0d496bcca4ca8614aae5d04aad314f79c3bbdbb64000000082ab5680d34627c3aed5c1d0f2e1a7ebd811f9b0031ce39a54585e1e961f0a7abb870ac336c37b7d14bfcc1ef6eee64ed5565d378d257618a16b3609062c76a3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435243384" iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5f511883-6d71-a6de-e7f4-862d5ee40780} 2a65061fa559d41238775ac3189e271e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5f511883-6d71-a6de-e7f4-862d5ee40780}\ = "gooochi browser optimizer" 2a65061fa559d41238775ac3189e271e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5f511883-6d71-a6de-e7f4-862d5ee40780}\InProcServer32 2a65061fa559d41238775ac3189e271e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5f511883-6d71-a6de-e7f4-862d5ee40780}\InProcServer32\ = "C:\\Windows\\SysWow64\\{aaef255f-83b1-ec14-6a65-7502e9df7357}.dll" 2a65061fa559d41238775ac3189e271e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5f511883-6d71-a6de-e7f4-862d5ee40780}\InProcServer32\ThreadingModel = "Apartment" 2a65061fa559d41238775ac3189e271e_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3428 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3428 iexplore.exe 3428 iexplore.exe 5096 IEXPLORE.EXE 5096 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2432 wrote to memory of 1960 2432 2a65061fa559d41238775ac3189e271e_JaffaCakes118.exe 86 PID 2432 wrote to memory of 1960 2432 2a65061fa559d41238775ac3189e271e_JaffaCakes118.exe 86 PID 2432 wrote to memory of 1960 2432 2a65061fa559d41238775ac3189e271e_JaffaCakes118.exe 86 PID 3428 wrote to memory of 5096 3428 iexplore.exe 89 PID 3428 wrote to memory of 5096 3428 iexplore.exe 89 PID 3428 wrote to memory of 5096 3428 iexplore.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a65061fa559d41238775ac3189e271e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2a65061fa559d41238775ac3189e271e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\{aaef255f-83b1-ec14-6a65-7502e9df7357}.dll" DllStart2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1960
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:852
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3428 CREDAT:17410 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5096
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
14KB
MD52bb3a180348b2b3d155cd12b9eda0712
SHA11f3e94f5457502ce59aee891275288f88739f367
SHA256944bc80b57670eb187bdd59250f77af6ab657a2cb6ede3621139d8c04d57eec3
SHA512d555b890910a8a729e37cd69fb612d5d7efe76f2821995b3c7b532d663d5993688692d8d5be6f97f683daaaf02683a134c69f9ae6710a7e005dc7cd47cce0c55
-
Filesize
10KB
MD50bbcbaee7b703ebd55cd8658a0e8dcd3
SHA16ed448b8b67cea36eb45bfbc67fed9a6da9623e4
SHA256e67277ecc4f6c7beb3c7e586ce508677269db056c7541eacfecf6c719f559da6
SHA512604c524bd00313f6411cc9878d5c9a1db77588049feeb5bb02c971df44f8becbd18d251cc20e551b878173eb2a78be61f31352769597c6334cffc0bc2326b008
-
Filesize
362KB
MD52a86bcc1ed9158ed416ec68f5abb882c
SHA165a8c481467305940291a31ec5b7148e330411ef
SHA25626182251f50751f38c5059580268ec556ebc5482c258d514230ee09ed2f9651c
SHA512e1d4e9b5f9ac7e6402f2dc921a9a2792e7b549354c93c9fb48c093971059353c25bf59a14a7f4a7659f58e6c2530b85d776fc5f9e1edad0d1e1ec70a4c42df6b