Overview
overview
7Static
static
72f2a9ee5ce...18.exe
windows7-x64
72f2a9ee5ce...18.exe
windows10-2004-x64
7$PLUGINSDI...er.exe
windows7-x64
7$PLUGINSDI...er.exe
windows10-2004-x64
7$PLUGINSDI...BI.exe
windows7-x64
7$PLUGINSDI...BI.exe
windows10-2004-x64
7$PLUGINSDI...cc.exe
windows7-x64
7$PLUGINSDI...cc.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ed.htm
windows7-x64
3$PLUGINSDI...ed.htm
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...lp.dll
windows7-x64
3$PLUGINSDI...lp.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...os.dll
windows7-x64
3$PLUGINSDI...os.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...ay.dll
windows7-x64
5$PLUGINSDI...ay.dll
windows10-2004-x64
5$PLUGINSDI...st.dll
windows7-x64
3$PLUGINSDI...st.dll
windows10-2004-x64
3$PLUGINSDIR/xml.dll
windows7-x64
3$PLUGINSDIR/xml.dll
windows10-2004-x64
3Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 10:03
Behavioral task
behavioral1
Sample
2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/$_286_/ProxyInstaller.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/$_286_/ProxyInstaller.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/$_287_/BI.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/$_287_/BI.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/$_288_/DownloadAcc.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/$_288_/DownloadAcc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/BunndleOfferManager.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/BunndleOfferManager.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/Failed.htm
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/Failed.htm
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/FirefoxHandler.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/FirefoxHandler.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/OCSetupHlp.dll
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/OCSetupHlp.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/execDos.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/execDos.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsArray.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/nsArray.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/webapphost.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/webapphost.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/xml.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/xml.dll
Resource
win10v2004-20241007-en
General
-
Target
2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
2f2a9ee5ceaccdd3efb6a100ba525559
-
SHA1
8a69abda6b2f369ca34711ddeb742a89ea97ed3b
-
SHA256
29fd01bde813c1b971846a9c8ef0244709c02b67d8e9e6e3b6da0aaded49fac8
-
SHA512
5dae57e45660a1fbab25003fd0b992127ac523020b21a5c80fcc89747a7d1319691a2fd2041cfea8b437726f906d61190d6e831dad9f30d0c26b4b64c10f6a99
-
SSDEEP
24576:HhrMKYkd/xoAZOQ5suD9KRzTYsJNjHD4B5um4CVxCC5SzeKpNL:BTkAZOAdD2TbNDDA8mlqC5eeeNL
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1440 BI.exe 3496 BI.exe -
Loads dropped DLL 11 IoCs
pid Process 1532 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe 1532 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe 1440 BI.exe 1440 BI.exe 1440 BI.exe 1532 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe 1532 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe 1532 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe 3496 BI.exe 3496 BI.exe 3496 BI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BI.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\IESettingSync 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1532 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe 1532 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe 1532 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe 1532 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe 1532 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe 1532 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe 1532 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe 1532 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe 1532 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe 1532 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe 1532 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe 1532 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe 1532 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1532 wrote to memory of 1440 1532 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe 85 PID 1532 wrote to memory of 1440 1532 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe 85 PID 1532 wrote to memory of 1440 1532 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe 85 PID 1532 wrote to memory of 3496 1532 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe 92 PID 1532 wrote to memory of 3496 1532 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe 92 PID 1532 wrote to memory of 3496 1532 2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2f2a9ee5ceaccdd3efb6a100ba525559_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\nso8416.tmp\BI\BI.exeC:\Users\Admin\AppData\Local\Temp\nso8416.tmp\BI\BI.exe { "json_send_time" : "9/10/2024 24:52:1:718" , "product_id_version" : "" , "product_type" : "" , "product_id" : "" , "offer_id" : "544527" , "user_type" : "NULL" , "result" : "Success" , "user_operating_system_bits" : "" , "current_default_search" : "" , "current_homepage" : "" , "current_toolbars" : "" , "attempt_number" : "1" , "is_silent" : "" , "user_ms_dotnet_framework_ver" : "" , "user_acount_type" : "" , "user_ie_version" : "" , "user_default_browser_version" : "" , "user_default_browser" : "" , "user_service_pack" : "" , "user_operating_system" : "" , "revision_number" : "0" , "build_id" : "00000000" , "dm_version" : "1.3.8.0.130825.01" , "bundle_id" : "50cf3b8d-6a7e-4153-aa8f-0690bb2c80f5" , "machine_user_id" : "{138BC23E-4CC6-45C5-81C7-AF5FB11DD56F}" , "send_attempt" : "0" , "channel_id" : "" , "installation_session_id" : "D24928B8-C291-4779-A760-E900B998CD8B" , "publisher_internal_id" : "1" , "publisher_id" : "Brothersoft" , "publisher_account_id" : "A-1477560" , "order" : "1.0" , "phase" : "Init" , "Is_Test" : "0" }2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1440
-
-
C:\Users\Admin\AppData\Local\Temp\nso8416.tmp\BI\BI.exeC:\Users\Admin\AppData\Local\Temp\nso8416.tmp\BI\BI.exe { "user_ie_security_level" : "Medium-High" , "json_send_time" : "9/10/2024 24:52:50:609" , "internal_error_description" : "HttpPost result: try1- SendRequest Error; try2- SendRequest Error; try3- SendRequest Error" , "internal_error_number" : "3" , "is_parallel" : "0" , "mrs_id" : "" , "vector_id" : "" , "rule_id" : "" , "product_id_version" : "" , "product_type" : "" , "product_id" : "" , "offer_id" : "544527" , "general_status_code" : "2" , "duration_details" : " InitPluginsDir:0 initializeParams:110 load_BITool:0 send_BI_Init:15 load_DownloadACC:16 retrieveUISource:0 unpack_webappfolder:0 unpack_icon:0 RetrieveMainOfferKey:16 unpack_OpenCandyDll:31 unpack_BunndleDll:0 load_webapphost:0 unpack_ProxyInstaller:15 navigate_loadingUI:594 navigateAsync_constMainOffer:0 BuildUserProfile:0 retrieve cid:0 callService1:16110 callService1:16062 callService1:16031 " , "phase_duration" : "" , "error_details" : "Failed communicate with the DistributionEngineService. Inner Error: SendRequest Error. InternalRetryNum: 3" , "result" : "Error" , "user_operating_system_bits" : "64" , "current_default_search" : "" , "current_homepage" : "" , "current_toolbars" : "" , "attempt_number" : "1" , "is_silent" : "" , "user_ms_dotnet_framework_ver" : "4.0" , "user_acount_type" : "" , "user_ie_version" : "9.11.19041.0" , "user_default_browser_version" : "9.11.19041.0" , "user_default_browser" : "IEXPLORE.EXE" , "user_service_pack" : "0.0" , "user_operating_system" : "Windows 10 Enterprise" , "revision_number" : "0" , "build_id" : "00000000" , "dm_version" : "1.3.8.0.130825.01" , "bundle_id" : "50cf3b8d-6a7e-4153-aa8f-0690bb2c80f5" , "machine_user_id" : "{138BC23E-4CC6-45C5-81C7-AF5FB11DD56F}" , "send_attempt" : "0" , "channel_id" : "" , "installation_session_id" : "D24928B8-C291-4779-A760-E900B998CD8B" , "publisher_internal_id" : "1" , "publisher_id" : "Brothersoft" , "publisher_account_id" : "A-1477560" , "order" : "2.0" , "phase" : "InitComplete" , "Is_Test" : "0" }2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD574cb7b0a801435c552d3bfd1517491a1
SHA1a46e6e1b524a608eed9e81fd7e102e280b2e95c1
SHA256fe0af5e14e37fd0b642aa08495ae63a4ed441c92909dfd7a8a25a050b5ed097e
SHA512fce908fce3e9f84740280af53813bcbed29abf3f976a2b6ba1c88a722877ce020241b36bd0cbbb4f793df9d262b413ad30198bb1e8345128b0ac5857209b3260
-
Filesize
17KB
MD5a4f38d1c7a480f5da1bb8097b8b939db
SHA1b3129c2a0e61881381463f5e0cbbffa573daa845
SHA256e1180e1e3344c7536150275e33de53dc1dd1a3ca03be66c4d4875fe5bcd4e436
SHA512fed89f7ee9364fc2f4b9f82c4563713497043947e98dbb03e7d755681adf3ae661aba80d08e59988a23695fc64481b69d9842b7ec7d2b572cc872c4c9957febc
-
Filesize
760KB
MD5ca7f07bcde734c3a3072841e412c45e5
SHA175c03a7b14b2827242447fec95e4869a76518747
SHA25654c6ca5ddcc600bb6ffd283760b843cc0af41b7b9ea1767a9aa4826262c407fc
SHA5122f134f85aaea11eb4dfbbda62efe1ce45c04781da5fb138231c2f62578c80a5cd9cbe45c901fd15c5a85c86f49f70ecf5cd8213e9784bc888f8581c8850ced1e
-
Filesize
29KB
MD5dccdcb124064a1d9a5eb12232348b898
SHA1f294fac154cb1c6c18fe054ac584f767594b93fb
SHA25637adc0183d94ae6ca1895643423dac0c97750d7103e6b00c14299dfc4ad2271e
SHA512bd89bcd513bb7120db80e1115b4caceaa18c4ea863fe29b232002d447c3813133ff2849fcb2d4df45e3ff67e0e0d9d340d61060b9c74045b17efa5b1c1f5b05e