Analysis
-
max time kernel
121s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 14:26
Static task
static1
Behavioral task
behavioral1
Sample
405b15dfc1d55c3781f0f08d9f9b0f5f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
405b15dfc1d55c3781f0f08d9f9b0f5f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
405b15dfc1d55c3781f0f08d9f9b0f5f_JaffaCakes118.exe
-
Size
55KB
-
MD5
405b15dfc1d55c3781f0f08d9f9b0f5f
-
SHA1
0a7bab92891cbb90a8c6bb060552f0f2caee0b5a
-
SHA256
e089c21df831153fadaa1984c8163fdf23a3136060e5972685160806de02e1cc
-
SHA512
21134446c0a7ece63abde2e85cd3b36544fc359739cc55151157720d98869129c8ae91eca45d88759136f6aa8733a00501d0ce07ba3d66b5afb139e9e2fd9533
-
SSDEEP
1536:+qs2zkx5UuwwsGtTVk/iFZQykcvhno8uT5Gbm/sSt2:+qs2zkxyupdEcvj+5p
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 405b15dfc1d55c3781f0f08d9f9b0f5f_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate popinstall.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate winpop.exe -
Executes dropped EXE 2 IoCs
pid Process 2444 popinstall.exe 1168 winpop.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinPop = "C:\\Program Files (x86)\\WinPop\\winpop.exe" popinstall.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\InetGet2\popinstall.exe 405b15dfc1d55c3781f0f08d9f9b0f5f_JaffaCakes118.exe File created C:\Program Files (x86)\WinPop\winpop.exe.lzma popinstall.exe File created C:\Program Files (x86)\WinPop\winpop.exe popinstall.exe File created C:\Program Files (x86)\WinPop\UnInstall.exe.lzma popinstall.exe File created C:\Program Files (x86)\WinPop\UnInstall.exe popinstall.exe File created C:\Program Files (x86)\InetGet2\popinstall.exe.lzma 405b15dfc1d55c3781f0f08d9f9b0f5f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 405b15dfc1d55c3781f0f08d9f9b0f5f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language popinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winpop.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 winpop.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz winpop.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 405b15dfc1d55c3781f0f08d9f9b0f5f_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz 405b15dfc1d55c3781f0f08d9f9b0f5f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 popinstall.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz popinstall.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosDate 405b15dfc1d55c3781f0f08d9f9b0f5f_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosDate popinstall.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosDate winpop.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\New Windows\Allow winpop.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow\*.starsdoor.com winpop.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\WOW6432Node\CLSID\{FB950BC3-1060-1033-0401-1401140001} 405b15dfc1d55c3781f0f08d9f9b0f5f_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\WOW6432Node\CLSID\{FB950BC3-1060-1033-0401-1401140001}\b122 = "yes" 405b15dfc1d55c3781f0f08d9f9b0f5f_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\WOW6432Node\CLSID\{2B950BC3-1060-1033-0401-1401140001}\Param1 = "MTMzNzMyODAwMDAwMDAwMDAw" winpop.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\WOW6432Node\CLSID\{2B950BC3-1060-1033-0401-1401140001} winpop.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\WOW6432Node\CLSID\{2B950BC3-1060-1033-0401-1401140001}\Param3 = "MTA=" winpop.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\WOW6432Node\CLSID\{2B950BC3-1060-1033-0401-1401140001}\Param4 = "MzAw" winpop.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\WOW6432Node\CLSID\{2B950BC3-1060-1033-0401-1401140001}\Param2 = "MA==" winpop.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2444 popinstall.exe 2444 popinstall.exe 2444 popinstall.exe 2444 popinstall.exe 2444 popinstall.exe 2444 popinstall.exe 2444 popinstall.exe 2444 popinstall.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1524 wrote to memory of 2444 1524 405b15dfc1d55c3781f0f08d9f9b0f5f_JaffaCakes118.exe 83 PID 1524 wrote to memory of 2444 1524 405b15dfc1d55c3781f0f08d9f9b0f5f_JaffaCakes118.exe 83 PID 1524 wrote to memory of 2444 1524 405b15dfc1d55c3781f0f08d9f9b0f5f_JaffaCakes118.exe 83 PID 2444 wrote to memory of 1168 2444 popinstall.exe 84 PID 2444 wrote to memory of 1168 2444 popinstall.exe 84 PID 2444 wrote to memory of 1168 2444 popinstall.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\405b15dfc1d55c3781f0f08d9f9b0f5f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\405b15dfc1d55c3781f0f08d9f9b0f5f_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Program Files (x86)\InetGet2\popinstall.exe"C:\Program Files (x86)\InetGet2\popinstall.exe" -install2⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Program Files (x86)\WinPop\winpop.exe"C:\Program Files (x86)\WinPop\winpop.exe" -install3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
PID:1168
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD59c10e98d3b1f078d02fe978b4cc82c1c
SHA1402de3dc59ef2c649c376e5821f4935f2584e640
SHA256f8631c4794993b549bc8a988b23f724e5a4562e72a95255ddd50343965c0bc1b
SHA51266e77e3e0c32233f0150757c41bd1ee62cde06b8ce56e0ebcea2f04dcd153f5c43e467cfcbf030ad2c791c00347455324e330c9c73a09ed2968a0da5f34c613f
-
Filesize
48KB
MD557111181049ea4a2baab8bb5582de754
SHA152a51ad5adc7eb736cb3db156b1ddf9f65c985c7
SHA2568e9e0e023ef0c630054923adaffa6d38db9dee697b76954fc33c9bd821b635ce
SHA5123ecf277b8ebdb481f38a54422817a50878c3c72903fbbbcbf1fe4edec57a624d2ca49bab293fd210e8e67ea8c0f01197aa0d1e5e6d8dcd5b92cdcee0081d521e