Analysis
-
max time kernel
139s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2024 17:17
Static task
static1
Behavioral task
behavioral1
Sample
490c585ede21201a9046ff10ae62411e_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
490c585ede21201a9046ff10ae62411e_JaffaCakes118.dll
-
Size
378KB
-
MD5
490c585ede21201a9046ff10ae62411e
-
SHA1
096dc722950a1827df58e97474b43174700474bc
-
SHA256
585e9a5e42724ce79e7cb016add54a730f6682f172a48e0a40592625d981dbcb
-
SHA512
5222dce1ecfc8fc352bb49fb5ecb31ab575dc041212312547e77de13570df0dd5a6422f6465244efc57c0e1cdec13f5e6af09331d4bcb1933353926199ba23fc
-
SSDEEP
3072:Do6vBnby4Yx0XjFFzPQ0MslzERfQB24hLxBVi/b/9+PdpiWC35ol/uwfTuT2b2M6:vs6Xpq0H3Jhds/9+qC/zfTPLc
Malware Config
Extracted
qakbot
402.343
obama104
1632729661
95.77.223.148:443
47.22.148.6:443
89.101.97.139:443
27.223.92.142:995
120.151.47.189:443
136.232.34.70:443
120.150.218.241:995
185.250.148.74:443
181.118.183.94:443
140.82.49.12:443
67.165.206.193:993
103.148.120.144:443
71.74.12.34:443
76.25.142.196:443
73.151.236.31:443
173.21.10.71:2222
75.188.35.168:443
2.178.88.145:61202
71.80.168.245:443
45.46.53.140:2222
109.12.111.14:443
105.198.236.99:443
73.77.87.137:443
41.248.239.221:995
182.176.112.182:443
96.37.113.36:993
75.66.88.33:443
162.244.227.34:443
24.229.150.54:995
216.201.162.158:443
92.59.35.196:2222
196.218.227.241:995
24.139.72.117:443
68.207.102.78:443
72.252.201.69:443
2.188.27.77:443
177.130.82.197:2222
68.204.7.158:443
189.210.115.207:443
181.163.96.53:443
24.55.112.61:443
75.107.26.196:465
185.250.148.74:2222
68.186.192.69:443
24.152.219.253:995
50.29.166.232:995
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Uaonwayg = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Edhevymb = "0" reg.exe -
Loads dropped DLL 1 IoCs
pid Process 4140 regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Modifies data under HKEY_USERS 10 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ywxzybdqemmtl\4aabb739 = 7678adad9cc53136b3c8bcd1238e4e019b3e29751a750de6fd99070726b37495646fee12a323 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ywxzybdqemmtl\35e2d8cf = 6e58496057a971c226d5914edb61d655f204206ae1e88c67849d7e48269c1156753f1d3078040e66115bd464696473be12b99a0090c31b67a15edaa75f77f02adbf1bf561597ce016eeddf0f127c08cbbf3745e9b0f5 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ywxzybdqemmtl\7d0881 = 3b148d5a831f153f64b34ca1aceca60b6c178696c80d3df8e8a2badd681962929a4036f63c5466e7fdebc1964482a70b1895f94b3fc004418c5841f7814f35e6f672a8ac52a4329c3319b73b16b196df8306bff7463e5118ee07a1a0cbfb8521353f3164a2 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ywxzybdqemmtl\c7880012 = c403fdf846ac4a21fd7ac49581b64495f69d585d85e3386026c80080513d39579526bb8915f32f472aa0200980762f4b3b2bf56abfc118a67592c66069986a62b9faf1f1a09d explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ywxzybdqemmtl\b8c16fe4 = 54b0117ad174be30010f12ebb47d18199a11b0be698a1b1d4e553792790f26c7f9a43fa28349ca1dc1b0a127e67ca6e16755af20214f0260b419e6331b2b1d749fa13db3e907f8092e0e6c6ac8379cd17bea42a1f531f6b7d1 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ywxzybdqemmtl\ba804f98 = 31de064d64dd61d7983440ec42000fec2991f8017f9173e786adccf74f60b20e462f344713e05e9d695816e981699c80a9ea80d902b39c71c6839f342f9db94092e8862f541fa1450e explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ywxzybdqemmtl\7f346777 = bbffcfd5cdac8968f4a037e548835a7523fb5cb2805bda174f96f24423c54fabe3714b636fbc365bc3669175d58068c0e4a0f7596d148348ce197ad1da3c6c61d8b1ce2b5f explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ywxzybdqemmtl explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ywxzybdqemmtl\35e2d8cf = 6e585e6057a9440c3be9b1fc19f05ffa55888b7cddb37d744dd48cf303c586048d960b794443fb3bafb0b545837f0569c7205b9a63761f27d5123008aee4bf957d explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ywxzybdqemmtl\23c28fd = b58b5b30857c7769a84acb368ba94caee1b0572a96db2e3e37d36af8ce1ee0458e69f72d explorer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4152 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1532 rundll32.exe 1532 rundll32.exe 4140 regsvr32.exe 4140 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1532 rundll32.exe 4140 regsvr32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2456 wrote to memory of 1532 2456 rundll32.exe 84 PID 2456 wrote to memory of 1532 2456 rundll32.exe 84 PID 2456 wrote to memory of 1532 2456 rundll32.exe 84 PID 1532 wrote to memory of 4476 1532 rundll32.exe 88 PID 1532 wrote to memory of 4476 1532 rundll32.exe 88 PID 1532 wrote to memory of 4476 1532 rundll32.exe 88 PID 1532 wrote to memory of 4476 1532 rundll32.exe 88 PID 1532 wrote to memory of 4476 1532 rundll32.exe 88 PID 4476 wrote to memory of 4152 4476 explorer.exe 89 PID 4476 wrote to memory of 4152 4476 explorer.exe 89 PID 4476 wrote to memory of 4152 4476 explorer.exe 89 PID 4316 wrote to memory of 4140 4316 regsvr32.exe 119 PID 4316 wrote to memory of 4140 4316 regsvr32.exe 119 PID 4316 wrote to memory of 4140 4316 regsvr32.exe 119 PID 4140 wrote to memory of 3840 4140 regsvr32.exe 120 PID 4140 wrote to memory of 3840 4140 regsvr32.exe 120 PID 4140 wrote to memory of 3840 4140 regsvr32.exe 120 PID 4140 wrote to memory of 3840 4140 regsvr32.exe 120 PID 4140 wrote to memory of 3840 4140 regsvr32.exe 120 PID 3840 wrote to memory of 3676 3840 explorer.exe 121 PID 3840 wrote to memory of 3676 3840 explorer.exe 121 PID 3840 wrote to memory of 2436 3840 explorer.exe 123 PID 3840 wrote to memory of 2436 3840 explorer.exe 123
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\490c585ede21201a9046ff10ae62411e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\490c585ede21201a9046ff10ae62411e_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn gcniuxhk /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\490c585ede21201a9046ff10ae62411e_JaffaCakes118.dll\"" /SC ONCE /Z /ST 17:19 /ET 17:314⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4152
-
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\490c585ede21201a9046ff10ae62411e_JaffaCakes118.dll"1⤵
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\490c585ede21201a9046ff10ae62411e_JaffaCakes118.dll"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Uaonwayg" /d "0"4⤵
- Windows security bypass
PID:3676
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Edhevymb" /d "0"4⤵
- Windows security bypass
PID:2436
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
378KB
MD5490c585ede21201a9046ff10ae62411e
SHA1096dc722950a1827df58e97474b43174700474bc
SHA256585e9a5e42724ce79e7cb016add54a730f6682f172a48e0a40592625d981dbcb
SHA5125222dce1ecfc8fc352bb49fb5ecb31ab575dc041212312547e77de13570df0dd5a6422f6465244efc57c0e1cdec13f5e6af09331d4bcb1933353926199ba23fc