Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 12:46
Static task
static1
Behavioral task
behavioral1
Sample
3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
3a1707f15c4658bb3d86bee68973601e
-
SHA1
5f1ec3fc0ca776fd79f1dd9c55c07c5b4f765a05
-
SHA256
c990af21846a4704fc2209815cb7974ed68a136b2a0e89c45ce8573a1216fc73
-
SHA512
3e8ca51cf202e0678c5c1125ae77865dec26fe6aa856f2291e5d830f6db55747b77854f3598fd877de5532c8989a9441a99cda5dbec6184b76bafc3ec20a8b21
-
SSDEEP
24576:jhh/dOr0QrpGYLBPx4yvzBXTCkpM1AzywGIDyfJd5Oh/BXyoOCswx:fupBPnvzBSmz2rv5Y/kwx
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2892 setup.exe 3056 Baidu-Toolbar-jytxz.exe -
Loads dropped DLL 9 IoCs
pid Process 2204 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe 2204 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe 2204 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe 2892 setup.exe 2892 setup.exe 2892 setup.exe 3056 Baidu-Toolbar-jytxz.exe 3056 Baidu-Toolbar-jytxz.exe 3056 Baidu-Toolbar-jytxz.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\newiexplore.exe setup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\newiexplore.exe setup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\newicon.ico 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Baidu-Toolbar-jytxz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral1/files/0x0007000000019282-11.dat nsis_installer_1 -
Modifies registry class 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3D6060-5570-4DF6-ABF7-53BA7A91766E}\Shell 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3D6060-5570-4DF6-ABF7-53BA7A91766E}\Shell\Open(&O)\Command\ = "C:\\Program Files (x86)\\Internet Explorer\\IEXPLORE.EXE http://www.7322.com" 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3D6060-5570-4DF6-ABF7-53BA7A91766E}\DefaultIcon 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3D6060-5570-4DF6-ABF7-53BA7A91766E}\Shell\Open(&O) 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3D6060-5570-4DF6-ABF7-53BA7A91766E}\Shell\ÊôÐÔ(&D) 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3D6060-5570-4DF6-ABF7-53BA7A91766E}\ShellFolder 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3D6060-5570-4DF6-ABF7-53BA7A91766E}\Shell\Open(&O)\Command 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3D6060-5570-4DF6-ABF7-53BA7A91766E}\Shell\ÊôÐÔ(&D)\Command 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3D6060-5570-4DF6-ABF7-53BA7A91766E} 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3D6060-5570-4DF6-ABF7-53BA7A91766E}\DefaultIcon\ = "C:\\Windows\\newicon.ico" 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3D6060-5570-4DF6-ABF7-53BA7A91766E}\ = "Internet Explorer" 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3D6060-5570-4DF6-ABF7-53BA7A91766E}\Shell\Open(&O)\ = "Open(&O)" 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3D6060-5570-4DF6-ABF7-53BA7A91766E}\Shell\ÊôÐÔ(&D)\Command\ = "Rundll32.exe Shell32.dll,Control_RunDLL Inetcpl.cpl" 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3D6060-5570-4DF6-ABF7-53BA7A91766E}\ShellFolder\Attributes = "10" 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2892 2204 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe 30 PID 2204 wrote to memory of 2892 2204 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe 30 PID 2204 wrote to memory of 2892 2204 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe 30 PID 2204 wrote to memory of 2892 2204 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe 30 PID 2204 wrote to memory of 2892 2204 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe 30 PID 2204 wrote to memory of 2892 2204 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe 30 PID 2204 wrote to memory of 2892 2204 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe 30 PID 2204 wrote to memory of 3056 2204 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe 31 PID 2204 wrote to memory of 3056 2204 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe 31 PID 2204 wrote to memory of 3056 2204 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe 31 PID 2204 wrote to memory of 3056 2204 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe 31 PID 2204 wrote to memory of 3056 2204 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe 31 PID 2204 wrote to memory of 3056 2204 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe 31 PID 2204 wrote to memory of 3056 2204 3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe 31 PID 2892 wrote to memory of 2852 2892 setup.exe 32 PID 2892 wrote to memory of 2852 2892 setup.exe 32 PID 2892 wrote to memory of 2852 2892 setup.exe 32 PID 2892 wrote to memory of 2852 2892 setup.exe 32 PID 2892 wrote to memory of 2852 2892 setup.exe 32 PID 2892 wrote to memory of 2852 2892 setup.exe 32 PID 2892 wrote to memory of 2852 2892 setup.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a1707f15c4658bb3d86bee68973601e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DelTemp.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2852
-
-
-
C:\Users\Admin\AppData\Local\Temp\Baidu-Toolbar-jytxz.exe"C:\Users\Admin\AppData\Local\Temp\Baidu-Toolbar-jytxz.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69B
MD532f45cd6abc1d26f07b8ddb71871ce05
SHA10cc28dc63d50327a74f8e964cdf23ffed05a8699
SHA256a2023fadce396c9265a61f24b6dcc5e95aaaf2b9efa1eceac2fcc1332322e716
SHA512f18d1ed212bda39f671fe7d7dac6cc6f5012e17149b57c7a121e666f09d5040c75ced09679bef1e630cd69fc03d824ced178be25b275139e4f4e139a0f96ebb9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk
Filesize1KB
MD5085470b431b64adbb8d2c3a7ebd37624
SHA13aa6b5eecced0fc8859b74fac336c30515a5057a
SHA2569ef7de0aabefb19c72920f67da4c617adaa9909854553fabe95dd94fbb30d6af
SHA512bd217cde4bdb826273cefe547bb5cc12048a6ea0b5a3af6719f71e19c12ff77b072da91a2ca95e4c75a0e2cd12b6682e79e64842f836e5cae781f41fb161ba4f
-
Filesize
842KB
MD553313ae428555585f4c4e15311a5af06
SHA1642b4118708b54bc08a353a2fda3645133c4213f
SHA2565acbcbd3d6f353efa0c8d12483646c2a33b76058a0b866ad447dfab9cc9a7eea
SHA5121f6afc216de13dc4dfe2342e579fae74c030383ec45d39339504b0a6487ba0e341196a2c9a91912272915afcece6cac4effb956cacb82d12c968d00af762ccbd
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
Filesize
391KB
MD56360ccc5468219ef2e92598342387a35
SHA17bd1c30f275b1c8304c77909e26cda7fe56ae739
SHA2564f282896dc504b36d547ab45b3967c2a810b26a96aa850809366af9010fb3137
SHA51225b64e063e5b806702c1a1a9dd0b3c11cb001c76b329b731211fbc8594a6abe00c77b4326f1dc7250eff53b9a00027b883d4f32ee318ca682d19ef11fe3faecc