Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 23:51
Static task
static1
Behavioral task
behavioral1
Sample
44ca0b0f1454a660ea658426d645e6c4_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
44ca0b0f1454a660ea658426d645e6c4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
DownloadManager.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
DownloadManager.exe
Resource
win10v2004-20241007-en
General
-
Target
44ca0b0f1454a660ea658426d645e6c4_JaffaCakes118.exe
-
Size
566KB
-
MD5
44ca0b0f1454a660ea658426d645e6c4
-
SHA1
920d5ae86aeb0a3f07c45a828f3d1705ab063de9
-
SHA256
f5296993d015c1c23a6c34144497291d2d1651c9b44577eef540a82d2dea524b
-
SHA512
27d9336b8e2d651342be4c0d814a8ba87cac01fa32d38c2cdd5c0122be8eb1f2d966681d2a9bb8e616a9bf20cd2d5fcddc05b69b3ecf57e27ffdfebc9dff54f6
-
SSDEEP
12288:bZP2ArFBW4zcfmQT5XxrxuiABXpf3PKk9hxsesWj7TlalYAyBMJc:b93rFB5jK5XdlAbfXhllalhyai
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2704 DownloadManager.exe -
Loads dropped DLL 10 IoCs
pid Process 3052 44ca0b0f1454a660ea658426d645e6c4_JaffaCakes118.exe 3052 44ca0b0f1454a660ea658426d645e6c4_JaffaCakes118.exe 2704 DownloadManager.exe 2716 WerFault.exe 2716 WerFault.exe 2716 WerFault.exe 2716 WerFault.exe 2716 WerFault.exe 2716 WerFault.exe 2716 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2716 2704 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44ca0b0f1454a660ea658426d645e6c4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DownloadManager.exe -
Modifies registry class 34 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D3388703-5092-487C-8217-11ADA1CA68B5}\Programmable DownloadManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DCABB943-792E-44C4-9029-ECBEE6265AF9}\1.0\0 DownloadManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3408AC0D-510E-4808-8F7B-6B70B1F88534}\TypeLib\Version = "1.0" DownloadManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D3388703-5092-487C-8217-11ADA1CA68B5}\ = "CBrowserExternal Class" DownloadManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DCABB943-792E-44C4-9029-ECBEE6265AF9}\1.0 DownloadManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3408AC0D-510E-4808-8F7B-6B70B1F88534}\ = "IBrowserExternals" DownloadManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3408AC0D-510E-4808-8F7B-6B70B1F88534}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" DownloadManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D3388703-5092-487C-8217-11ADA1CA68B5}\TypeLib DownloadManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D3388703-5092-487C-8217-11ADA1CA68B5}\Version DownloadManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DCABB943-792E-44C4-9029-ECBEE6265AF9}\1.0\0\win32 DownloadManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3408AC0D-510E-4808-8F7B-6B70B1F88534}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" DownloadManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D3388703-5092-487C-8217-11ADA1CA68B5} DownloadManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D3388703-5092-487C-8217-11ADA1CA68B5}\LocalServer32 DownloadManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DCABB943-792E-44C4-9029-ECBEE6265AF9}\1.0\HELPDIR DownloadManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3408AC0D-510E-4808-8F7B-6B70B1F88534}\TypeLib DownloadManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3408AC0D-510E-4808-8F7B-6B70B1F88534}\TypeLib\ = "{DCABB943-792E-44C4-9029-ECBEE6265AF9}" DownloadManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3408AC0D-510E-4808-8F7B-6B70B1F88534}\ = "IBrowserExternals" DownloadManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D3388703-5092-487C-8217-11ADA1CA68B5}\LocalServer32\ServerExecutable = "C:\\Users\\Admin\\AppData\\Local\\Temp\\DownloadManager.exe" DownloadManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DCABB943-792E-44C4-9029-ECBEE6265AF9}\1.0\FLAGS DownloadManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DCABB943-792E-44C4-9029-ECBEE6265AF9}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\DownloadManager.exe" DownloadManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DCABB943-792E-44C4-9029-ECBEE6265AF9}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp" DownloadManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3408AC0D-510E-4808-8F7B-6B70B1F88534}\ProxyStubClsid32 DownloadManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3408AC0D-510E-4808-8F7B-6B70B1F88534}\TypeLib DownloadManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3408AC0D-510E-4808-8F7B-6B70B1F88534}\TypeLib\ = "{DCABB943-792E-44C4-9029-ECBEE6265AF9}" DownloadManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3408AC0D-510E-4808-8F7B-6B70B1F88534}\ProxyStubClsid32 DownloadManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D3388703-5092-487C-8217-11ADA1CA68B5}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\DownloadManager.exe\"" DownloadManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D3388703-5092-487C-8217-11ADA1CA68B5}\Version\ = "1.0" DownloadManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DCABB943-792E-44C4-9029-ECBEE6265AF9} DownloadManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3408AC0D-510E-4808-8F7B-6B70B1F88534} DownloadManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3408AC0D-510E-4808-8F7B-6B70B1F88534}\TypeLib\Version = "1.0" DownloadManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DCABB943-792E-44C4-9029-ECBEE6265AF9}\1.0\ = "SmartInstallerLib" DownloadManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DCABB943-792E-44C4-9029-ECBEE6265AF9}\1.0\FLAGS\ = "0" DownloadManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D3388703-5092-487C-8217-11ADA1CA68B5}\TypeLib\ = "{DCABB943-792E-44C4-9029-ECBEE6265AF9}" DownloadManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3408AC0D-510E-4808-8F7B-6B70B1F88534} DownloadManager.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2704 3052 44ca0b0f1454a660ea658426d645e6c4_JaffaCakes118.exe 30 PID 3052 wrote to memory of 2704 3052 44ca0b0f1454a660ea658426d645e6c4_JaffaCakes118.exe 30 PID 3052 wrote to memory of 2704 3052 44ca0b0f1454a660ea658426d645e6c4_JaffaCakes118.exe 30 PID 3052 wrote to memory of 2704 3052 44ca0b0f1454a660ea658426d645e6c4_JaffaCakes118.exe 30 PID 2704 wrote to memory of 2716 2704 DownloadManager.exe 31 PID 2704 wrote to memory of 2716 2704 DownloadManager.exe 31 PID 2704 wrote to memory of 2716 2704 DownloadManager.exe 31 PID 2704 wrote to memory of 2716 2704 DownloadManager.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\44ca0b0f1454a660ea658426d645e6c4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\44ca0b0f1454a660ea658426d645e6c4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\DownloadManager.exe"C:\Users\Admin\AppData\Local\Temp\DownloadManager.exe" /PID=380 /SUBPID=0 /DISTID=1093 /NETWORKID=1 /CID=0 /PRODUCT_ID=1007 /SERVER_URL=http://installer.ppdownload.com2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 7523⤵
- Loads dropped DLL
- Program crash
PID:2716
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5882b0ec8e60ebab0fdfc33346cf30f5d
SHA11fa09bd72a748392a733f4b02e3919fa8da7b454
SHA256e777ade0e2af9d6e593d081d4f64834324b57056be7006ea6240ad90339e6e95
SHA5126539e2017450ead838969164921ecf618be8a8cd33ca395c892b3b3e8b77b39ee54ec73d95b24dac51a67d24b773b7e7fad30227a15a9c43edc6d6904d05a016
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f