Analysis
-
max time kernel
139s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 13:56
Static task
static1
Behavioral task
behavioral1
Sample
48340cc03dead4862f324112f4b6b384_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
48340cc03dead4862f324112f4b6b384_JaffaCakes118.dll
-
Size
708KB
-
MD5
48340cc03dead4862f324112f4b6b384
-
SHA1
f7ed73cdbe0013fd8d0c8602e2b6f782396ae8b3
-
SHA256
5fb55797b544665fdc2b3bc35dc4b3170217e83f1cef2935223e37a01d6eaf7d
-
SHA512
0a9d0b339a1de87b199693ef7adfdf03302d1bba5b06589c8a32fadcf3c09fa470fd1642f4178c017f5790e43531f723256ffcb92469e30f430530d8986744d1
-
SSDEEP
12288:TpbAcis08s7gQFMWC24/MFS+AWmdnWJIjJ5F3+DpEFs3H6v/+1oTNb:TZDis0dFA24/MFSptIJKnx+NE23a3+1e
Malware Config
Extracted
qakbot
402.363
obama106
1632905607
37.210.152.224:995
120.151.47.189:443
105.198.236.99:443
122.11.220.212:2222
199.27.127.129:443
41.251.41.14:995
216.201.162.158:443
124.123.42.115:2078
181.118.183.94:443
120.150.218.241:995
185.250.148.74:443
217.17.56.163:443
182.181.78.18:995
140.82.49.12:443
105.159.144.186:995
89.101.97.139:443
217.17.56.163:0
27.223.92.142:995
95.77.223.148:443
109.190.253.11:2222
81.250.153.227:2222
190.198.206.189:2222
81.241.252.59:2078
136.232.34.70:443
47.22.148.6:443
93.8.66.216:443
124.123.42.115:2222
217.17.56.163:2222
217.17.56.163:2078
217.17.56.163:465
41.228.22.180:443
76.25.142.196:443
71.74.12.34:443
71.80.168.245:443
75.188.35.168:443
173.21.10.71:2222
73.151.236.31:443
45.46.53.140:2222
67.165.206.193:993
38.10.201.211:443
72.252.201.69:443
71.60.246.5:443
92.148.59.207:2222
92.157.171.41:2222
24.139.72.117:443
186.18.205.199:995
24.229.150.54:995
47.40.196.233:2222
24.55.112.61:443
177.130.82.197:2222
109.12.111.14:443
68.204.7.158:443
186.87.135.68:995
80.6.192.58:443
103.148.120.144:443
75.66.88.33:443
173.25.166.81:443
187.156.138.172:443
82.77.137.101:995
173.234.155.233:443
2.178.108.147:61202
73.77.87.137:443
182.176.112.182:443
96.37.113.36:993
162.244.227.34:443
92.59.35.196:2222
196.218.227.241:995
68.207.102.78:443
2.188.27.77:443
189.210.115.207:443
181.163.96.53:443
75.107.26.196:465
185.250.148.74:2222
68.186.192.69:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Arduayrv = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Rvxcldvib = "0" reg.exe -
Loads dropped DLL 1 IoCs
pid Process 3000 regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Modifies data under HKEY_USERS 10 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Aoxonwryc\aa5e5eb8 = 8def5a8521dfb110d92e8cd987da5f25b3765517c6ecf5eae6bbf1430fce29f42037e2b8 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Aoxonwryc\d7561132 = 26bc0532ec71ecb3b7afb93a3c448cb5afdabb5014898dc1f10dede493f3cdba9506447b2b8addb24611289bf069ccc46633f588c524becaa84f898f685b03af0e178439eb03c49d5035038a549dceb669629fac692c792d88751c1ee3bbe42a785e5d7241de369f2b0aa0 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Aoxonwryc\6fea7657 = 1e10a9e882d6616d2b6aa409aecd9e52a57e3eddaa4b87f2226402db3f4c1681b0ea1b7716d6560087770a3e1555470287f8d4a850634c1870ff7802182007c2136aa19244f261bc0e0ac552ac67a8fefac2b9896083796c1bc6f62aad77eacab0b38a050759f577ee5e6315859da8d211 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Aoxonwryc\a81f7ec4 = fc8862713b46a2db10b0cce532d66ed6fa386b7a78a3efdb explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Aoxonwryc\253cc9ef = 010d535753c7c5b14d17112fb048f55249fd31541e118a2e48457be7ce40167cf728113bc99b4b0d274553bc988326f1e82c8a7bfaa461e33dcdcc8b3f17b8eac7497a761ff62287d1ccca19d59e4f5748774f8a12d8 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Aoxonwryc\253cc9ef = 010d445753c7f057a4b5c7723c1bef56a8c2fda077a98bfde435be6a4a48c5a5a7bac1f5afda8874a877401b1e76f31347fdc2399ba1704bf9bc6e5d5beec330c6 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Aoxonwryc\10a319a1 = be135c1ac26d0bb0d39165cf1ec4834879af6bcf2088198e3bb467d0f2dc8c6df99be29fc56661426f229dff0c74d2573ad9965604dc7051b4e26f8eb4a73b6dea2ede00978680c87c5b2ab2cd31ed215e42194e7954eae9a154bb424018afafd517c970a8f7fc448f6d95ae9282e14498fd8dd064793cbc0cf651555ccf226d4f29136ae81b034f8b5b149566e09b19474e061ea01f0dd4c3de2d8192364a60925210653bd98303896824da3bdba854a9dc3b6e5cdb0dfb0c7d202589 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Aoxonwryc\5a75a619 = bc547d9304d6c8864076ab0cb915d9bb66a4fabcf01ac39b85d375e8d90d9f303d9b8093850ea0b5606184052d583301429e6ebf34 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Aoxonwryc explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Aoxonwryc\12e239dd = 6bfef7daef01ef05a0e94c86b2d37e539870ab8a9778feb47b5167c06e322eacb2030695f86bed5aebb381ee3ef42d731688548f592a1fa8639660c577e8408c54f9d6ce2d2478d2a706 explorer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2180 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 372 rundll32.exe 3000 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 372 rundll32.exe 3000 regsvr32.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2068 wrote to memory of 372 2068 rundll32.exe 31 PID 2068 wrote to memory of 372 2068 rundll32.exe 31 PID 2068 wrote to memory of 372 2068 rundll32.exe 31 PID 2068 wrote to memory of 372 2068 rundll32.exe 31 PID 2068 wrote to memory of 372 2068 rundll32.exe 31 PID 2068 wrote to memory of 372 2068 rundll32.exe 31 PID 2068 wrote to memory of 372 2068 rundll32.exe 31 PID 372 wrote to memory of 2228 372 rundll32.exe 33 PID 372 wrote to memory of 2228 372 rundll32.exe 33 PID 372 wrote to memory of 2228 372 rundll32.exe 33 PID 372 wrote to memory of 2228 372 rundll32.exe 33 PID 372 wrote to memory of 2228 372 rundll32.exe 33 PID 372 wrote to memory of 2228 372 rundll32.exe 33 PID 2228 wrote to memory of 2180 2228 explorer.exe 34 PID 2228 wrote to memory of 2180 2228 explorer.exe 34 PID 2228 wrote to memory of 2180 2228 explorer.exe 34 PID 2228 wrote to memory of 2180 2228 explorer.exe 34 PID 1904 wrote to memory of 1964 1904 taskeng.exe 37 PID 1904 wrote to memory of 1964 1904 taskeng.exe 37 PID 1904 wrote to memory of 1964 1904 taskeng.exe 37 PID 1904 wrote to memory of 1964 1904 taskeng.exe 37 PID 1904 wrote to memory of 1964 1904 taskeng.exe 37 PID 1964 wrote to memory of 3000 1964 regsvr32.exe 38 PID 1964 wrote to memory of 3000 1964 regsvr32.exe 38 PID 1964 wrote to memory of 3000 1964 regsvr32.exe 38 PID 1964 wrote to memory of 3000 1964 regsvr32.exe 38 PID 1964 wrote to memory of 3000 1964 regsvr32.exe 38 PID 1964 wrote to memory of 3000 1964 regsvr32.exe 38 PID 1964 wrote to memory of 3000 1964 regsvr32.exe 38 PID 3000 wrote to memory of 2940 3000 regsvr32.exe 39 PID 3000 wrote to memory of 2940 3000 regsvr32.exe 39 PID 3000 wrote to memory of 2940 3000 regsvr32.exe 39 PID 3000 wrote to memory of 2940 3000 regsvr32.exe 39 PID 3000 wrote to memory of 2940 3000 regsvr32.exe 39 PID 3000 wrote to memory of 2940 3000 regsvr32.exe 39 PID 2940 wrote to memory of 1088 2940 explorer.exe 40 PID 2940 wrote to memory of 1088 2940 explorer.exe 40 PID 2940 wrote to memory of 1088 2940 explorer.exe 40 PID 2940 wrote to memory of 1088 2940 explorer.exe 40 PID 2940 wrote to memory of 2948 2940 explorer.exe 42 PID 2940 wrote to memory of 2948 2940 explorer.exe 42 PID 2940 wrote to memory of 2948 2940 explorer.exe 42 PID 2940 wrote to memory of 2948 2940 explorer.exe 42
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\48340cc03dead4862f324112f4b6b384_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\48340cc03dead4862f324112f4b6b384_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn nwcljxv /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\48340cc03dead4862f324112f4b6b384_JaffaCakes118.dll\"" /SC ONCE /Z /ST 13:58 /ET 14:104⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2180
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {64393723-97F0-48EF-9370-C7C9DAFF9136} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\48340cc03dead4862f324112f4b6b384_JaffaCakes118.dll"2⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\48340cc03dead4862f324112f4b6b384_JaffaCakes118.dll"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Arduayrv" /d "0"5⤵
- Windows security bypass
PID:1088
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Rvxcldvib" /d "0"5⤵
- Windows security bypass
PID:2948
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
708KB
MD548340cc03dead4862f324112f4b6b384
SHA1f7ed73cdbe0013fd8d0c8602e2b6f782396ae8b3
SHA2565fb55797b544665fdc2b3bc35dc4b3170217e83f1cef2935223e37a01d6eaf7d
SHA5120a9d0b339a1de87b199693ef7adfdf03302d1bba5b06589c8a32fadcf3c09fa470fd1642f4178c017f5790e43531f723256ffcb92469e30f430530d8986744d1