Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2024, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
3768a0f4934d3d9f907f2002a67b434d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3768a0f4934d3d9f907f2002a67b434d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3768a0f4934d3d9f907f2002a67b434d_JaffaCakes118.exe
-
Size
568KB
-
MD5
3768a0f4934d3d9f907f2002a67b434d
-
SHA1
d61545256415dc2adf3b8a5c54fbd80aa87a3185
-
SHA256
175632ea5f75d18a938d2a47c1a949e24471b862c18018360ccc9fa763167218
-
SHA512
12ca1f5bf0c58d2c1b59011d4cb5fb08757e87425900ffa7480f3e79190462ae929e211718b6afb5d05b99efb2f550b29569f01248a4267c93c35898e6723906
-
SSDEEP
12288:H/2zQdOdhoMW7k7PMe364ta9GaJoAvNBExA2K5agXTRwWFShQ5qsO8fNb:6yk7PMat
Malware Config
Signatures
-
Executes dropped EXE 8 IoCs
pid Process 4284 w1w9xd29dbjv5abiyo.exe 2580 itmapibroker.exe 4928 otextextractor.exe 3484 itmapibroker.exe 1104 ogleupdatecomregistershell64.exe 496 otextextractor.exe 4368 itmapibroker.exe 3132 otextextractor.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\itmapibroker = "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\plug_ins\\pi_brokers\\itmapibroker.exe" itmapibroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\itmapibroker = "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\plug_ins\\pi_brokers\\itmapibroker.exe" w1w9xd29dbjv5abiyo.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\itmapibroker.exe w1w9xd29dbjv5abiyo.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\otextextractor.exe itmapibroker.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\ogleupdatecomregistershell64.exe otextextractor.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\itmapibroker.exe itmapibroker.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\itmapibroker.exe itmapibroker.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\otextextractor.exe itmapibroker.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\itmapibroker.exe w1w9xd29dbjv5abiyo.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\otextextractor.exe itmapibroker.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\itmapibroker.exe otextextractor.exe File created C:\Program Files (x86)\Google\Update\1.3.36.371\ogleupdatecomregistershell64.exe otextextractor.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4528 2580 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language otextextractor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language otextextractor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w1w9xd29dbjv5abiyo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language otextextractor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language itmapibroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ogleupdatecomregistershell64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language itmapibroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3768a0f4934d3d9f907f2002a67b434d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language itmapibroker.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2580 itmapibroker.exe 2580 itmapibroker.exe 4928 otextextractor.exe 4928 otextextractor.exe 2580 itmapibroker.exe 2580 itmapibroker.exe 4928 otextextractor.exe 4928 otextextractor.exe 2580 itmapibroker.exe 2580 itmapibroker.exe 4928 otextextractor.exe 4928 otextextractor.exe 4928 otextextractor.exe 4928 otextextractor.exe 2580 itmapibroker.exe 2580 itmapibroker.exe 4928 otextextractor.exe 4928 otextextractor.exe 4928 otextextractor.exe 4928 otextextractor.exe 2580 itmapibroker.exe 2580 itmapibroker.exe 4928 otextextractor.exe 4928 otextextractor.exe 4928 otextextractor.exe 4928 otextextractor.exe 2580 itmapibroker.exe 2580 itmapibroker.exe 4928 otextextractor.exe 4928 otextextractor.exe 4928 otextextractor.exe 4928 otextextractor.exe 2580 itmapibroker.exe 2580 itmapibroker.exe 4928 otextextractor.exe 4928 otextextractor.exe 4928 otextextractor.exe 4928 otextextractor.exe 2580 itmapibroker.exe 2580 itmapibroker.exe 4928 otextextractor.exe 4928 otextextractor.exe 4928 otextextractor.exe 4928 otextextractor.exe 2580 itmapibroker.exe 2580 itmapibroker.exe 4928 otextextractor.exe 4928 otextextractor.exe 4928 otextextractor.exe 4928 otextextractor.exe 2580 itmapibroker.exe 2580 itmapibroker.exe 4928 otextextractor.exe 4928 otextextractor.exe 4928 otextextractor.exe 4928 otextextractor.exe 2580 itmapibroker.exe 2580 itmapibroker.exe 4928 otextextractor.exe 4928 otextextractor.exe 4928 otextextractor.exe 4928 otextextractor.exe 2580 itmapibroker.exe 2580 itmapibroker.exe -
Suspicious use of SetWindowsHookEx 27 IoCs
pid Process 1056 3768a0f4934d3d9f907f2002a67b434d_JaffaCakes118.exe 1056 3768a0f4934d3d9f907f2002a67b434d_JaffaCakes118.exe 1056 3768a0f4934d3d9f907f2002a67b434d_JaffaCakes118.exe 4284 w1w9xd29dbjv5abiyo.exe 4284 w1w9xd29dbjv5abiyo.exe 4284 w1w9xd29dbjv5abiyo.exe 2580 itmapibroker.exe 2580 itmapibroker.exe 2580 itmapibroker.exe 4928 otextextractor.exe 4928 otextextractor.exe 4928 otextextractor.exe 3484 itmapibroker.exe 3484 itmapibroker.exe 3484 itmapibroker.exe 1104 ogleupdatecomregistershell64.exe 1104 ogleupdatecomregistershell64.exe 1104 ogleupdatecomregistershell64.exe 496 otextextractor.exe 496 otextextractor.exe 496 otextextractor.exe 4368 itmapibroker.exe 4368 itmapibroker.exe 4368 itmapibroker.exe 3132 otextextractor.exe 3132 otextextractor.exe 3132 otextextractor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1056 wrote to memory of 4284 1056 3768a0f4934d3d9f907f2002a67b434d_JaffaCakes118.exe 85 PID 1056 wrote to memory of 4284 1056 3768a0f4934d3d9f907f2002a67b434d_JaffaCakes118.exe 85 PID 1056 wrote to memory of 4284 1056 3768a0f4934d3d9f907f2002a67b434d_JaffaCakes118.exe 85 PID 1056 wrote to memory of 1128 1056 3768a0f4934d3d9f907f2002a67b434d_JaffaCakes118.exe 87 PID 1056 wrote to memory of 1128 1056 3768a0f4934d3d9f907f2002a67b434d_JaffaCakes118.exe 87 PID 1056 wrote to memory of 1128 1056 3768a0f4934d3d9f907f2002a67b434d_JaffaCakes118.exe 87 PID 1128 wrote to memory of 4876 1128 cmd.exe 89 PID 1128 wrote to memory of 4876 1128 cmd.exe 89 PID 1128 wrote to memory of 4876 1128 cmd.exe 89 PID 4284 wrote to memory of 2580 4284 w1w9xd29dbjv5abiyo.exe 90 PID 4284 wrote to memory of 2580 4284 w1w9xd29dbjv5abiyo.exe 90 PID 4284 wrote to memory of 2580 4284 w1w9xd29dbjv5abiyo.exe 90 PID 4284 wrote to memory of 4748 4284 w1w9xd29dbjv5abiyo.exe 91 PID 4284 wrote to memory of 4748 4284 w1w9xd29dbjv5abiyo.exe 91 PID 4284 wrote to memory of 4748 4284 w1w9xd29dbjv5abiyo.exe 91 PID 4748 wrote to memory of 2292 4748 cmd.exe 93 PID 4748 wrote to memory of 2292 4748 cmd.exe 93 PID 4748 wrote to memory of 2292 4748 cmd.exe 93 PID 2580 wrote to memory of 4928 2580 itmapibroker.exe 94 PID 2580 wrote to memory of 4928 2580 itmapibroker.exe 94 PID 2580 wrote to memory of 4928 2580 itmapibroker.exe 94 PID 4928 wrote to memory of 3484 4928 otextextractor.exe 95 PID 4928 wrote to memory of 3484 4928 otextextractor.exe 95 PID 4928 wrote to memory of 3484 4928 otextextractor.exe 95 PID 4928 wrote to memory of 1104 4928 otextextractor.exe 96 PID 4928 wrote to memory of 1104 4928 otextextractor.exe 96 PID 4928 wrote to memory of 1104 4928 otextextractor.exe 96 PID 1104 wrote to memory of 496 1104 ogleupdatecomregistershell64.exe 97 PID 1104 wrote to memory of 496 1104 ogleupdatecomregistershell64.exe 97 PID 1104 wrote to memory of 496 1104 ogleupdatecomregistershell64.exe 97 PID 4928 wrote to memory of 4368 4928 otextextractor.exe 104 PID 4928 wrote to memory of 4368 4928 otextextractor.exe 104 PID 4928 wrote to memory of 4368 4928 otextextractor.exe 104 PID 4368 wrote to memory of 3132 4368 itmapibroker.exe 105 PID 4368 wrote to memory of 3132 4368 itmapibroker.exe 105 PID 4368 wrote to memory of 3132 4368 itmapibroker.exe 105 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4876 attrib.exe 2292 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3768a0f4934d3d9f907f2002a67b434d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3768a0f4934d3d9f907f2002a67b434d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\w1w9xd29dbjv5abiyo.exeC:\Users\Admin\AppData\Local\Temp\w1w9xd29dbjv5abiyo.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\itmapibroker.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\itmapibroker.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\otextextractor.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\otextextractor.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\itmapibroker.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\itmapibroker.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3484
-
-
C:\Program Files (x86)\Google\Update\1.3.36.371\ogleupdatecomregistershell64.exe"C:\Program Files (x86)\Google\Update\1.3.36.371\ogleupdatecomregistershell64.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\otextextractor.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\otextextractor.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:496
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\itmapibroker.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\itmapibroker.exe"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\otextextractor.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\otextextractor.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3132
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 24604⤵
- Program crash
PID:4528
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\sc7kiydup.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\attrib.exeattrib -a -r -s -h "C:\Users\Admin\AppData\Local\Temp\w1w9xd29dbjv5abiyo.exe"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2292
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\sc7kiydup.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\attrib.exeattrib -a -r -s -h "C:\Users\Admin\AppData\Local\Temp\3768a0f4934d3d9f907f2002a67b434d_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4876
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2580 -ip 25801⤵PID:3496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD539c9e39c12b68f21838c59a07486d354
SHA138beb9b66616bef0882c40adc5caed0659a24e8f
SHA256823d033109289b60ab9521b7ee4403ccc159b170b49187acc83cb479e923a89f
SHA51277f279e15c66dc1180ad10389314de2f57f0949a37a1ac41f32605786e9cb7b233d9730ed7414a05fe95dc2aad34af06b3e56cd16853589825d78bdbb637d535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_A3FC0BC6A75F11C789144CCDE90F5957
Filesize471B
MD591a82d2422caa27027533fca4f889295
SHA15b3a8f523c672ba63e44e81533d793fd764ea1d6
SHA256a54112db60b54e85ca8c98f625a521d1d08511c9ee412226b06e66a61a48b00f
SHA5129e8df55d3f5a0c4adb89eb38c799f52c4640e3671ff0bcddb7a3f3b103057fbd9e7de2c244fb517d6bd0766e8ddd1c18c66ea108a6731ce942d5c7940f023b56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5e05a54d87779a7b5a18a76de6ee75aac
SHA1a1bc2daf41b2771653082ba9d0cba255bc2611cb
SHA2564d0f6f1b067a1df60acce1476197d3d25b50726c21d5dfdb6ab369c6d5b673a8
SHA5123879540a27c657a73bf6027915f97429c76c75209b88d93ebf9c7b50a5b9598c4b9539d6ac5d866b3d0c98f527069db923347abce6ae32a71c477de5c8cddb52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD536cef80d181badfaf00197dcb610628f
SHA12641a6455c78250a4452c8d3a81a0834ced7f60c
SHA2569aa67e99bdd156d0b480bdbda11aaa7236e040987b3b998f295c8b7177a1981e
SHA51273f4f402021ea126573e5881d23cdefbe3f77a9b53699031c2dc7c26d2c7e9a6ec455570ba03a7b7ed0c8baaf89b8d5c379d880bda7ecab833240259f5f977e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_A3FC0BC6A75F11C789144CCDE90F5957
Filesize414B
MD5ad634dabc18896f0e7b2fb2d87490067
SHA120549e4356eb6592d2a261ec0de2ff76668c43db
SHA256d957986beb6de32e6bd55724ce09f89d187159757bd979f24eeefd9eb4ea4a55
SHA512873a1077d5400d2e2f15da73d5f997ab5af6f15c788c66838fccd3b5ab16d12dfecebf5c6b6927d886b276025e624f0c3f9500adc12aaee4e5c7dcedaf9778db
-
Filesize
20KB
MD56b643a983169fb83d5053cb469013e89
SHA1fdef34b5abdecadc03192787800fa4dea59b800d
SHA2564a7e9f7a1af71bce7dd15e7d40525d848564c72c87590aaa907d13344a102994
SHA51291a83705ee2768e1e38619c1e01ba97884c9834a9f90342e810176c7a3148bd05e803b17af107d4a1516492094ec67df698d5bad9b3fca8e166e435c7e720fdd
-
Filesize
5KB
MD5898b876ca1dfe89c5d04e2766c351cae
SHA15d4886e0031d7156a21b14d11a0001659f350132
SHA25693e93e21b9c1a99972aea3a35050d9d1bbe5d37fe8219171eefbacd10f3a362b
SHA5129adf12addc0d7a50be839640fe5991f0355052ad55f360c012ec116c452cb9583620de5b35c0473ffce80044b9def99491cc404f17e840eee8c1fdde9c66c414
-
Filesize
268B
MD599982c80a600a39feeef23da1fdb89ac
SHA1514e998a016d4589227706aa4332f3ecb73523bf
SHA2562e40b6e72b5afee1b508e17f6848674d564698c93a47524aaee232a1484ca192
SHA51206233b277622ee2559ddf3b1765d74d39851de39003f929c9db958ca70ecb375344b41809807ee1fa3d5f97f5db0dd087f2b4fc52b90041a1cdf32a98b9d5696
-
Filesize
352B
MD5006a95b66be786609c38f67c8dea3ea8
SHA1b4095ed2736d113348241d620a278716c7f37cca
SHA25697bed3cfa33625d815a7f4304027664329c57a199c2e03f3f21981775a361a05
SHA512f5cc05903efc42aacddb361623a9996dcf8ce65c6eaf9f0cf8ea00c4c3e0816abb949026a4166edb14ee21bcb6ef82b7bd782fbd9f947639ead157d0acc9717c
-
Filesize
568KB
MD53768a0f4934d3d9f907f2002a67b434d
SHA1d61545256415dc2adf3b8a5c54fbd80aa87a3185
SHA256175632ea5f75d18a938d2a47c1a949e24471b862c18018360ccc9fa763167218
SHA51212ca1f5bf0c58d2c1b59011d4cb5fb08757e87425900ffa7480f3e79190462ae929e211718b6afb5d05b99efb2f550b29569f01248a4267c93c35898e6723906