Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 11:54
Behavioral task
behavioral1
Sample
574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe
-
Size
194KB
-
MD5
574c40ba13597e802a141ffe7abfd2fb
-
SHA1
938e8a794d54e03568d39827449bc14181a20fc8
-
SHA256
e18466dfd6868d88db92edd49d45a65933df6ec4c3813e5a04b319f712d71503
-
SHA512
914af9a7f7bc08c71d2d78c2b1ea0b234d48c66f12b4a352ff81712f68e5865a50967f719a6f2339129d8f40f61ba956ca4b8630614e24c0e030ab9eef3ec947
-
SSDEEP
1536:7+yFe8bF79mMlgpgZ+NFV602N9N/UZr97qw90r26A/9nHGjCxlu:62DFYMXZ+NFU0oqZr97TeKgCxlu
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000023c9b-12.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 2236 svchost.exe -
Loads dropped DLL 4 IoCs
pid Process 4860 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe 4860 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe 2236 svchost.exe 2236 svchost.exe -
Enumerates connected drives 3 TTPs 17 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe File opened (read-only) \??\N: 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe File opened (read-only) \??\P: 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe File opened (read-only) \??\R: 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe File opened (read-only) \??\S: 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe File opened (read-only) \??\E: 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe File opened (read-only) \??\I: 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe File opened (read-only) \??\K: 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe File opened (read-only) \??\Q: 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe File opened (read-only) \??\T: 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe File opened (read-only) \??\H: 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe File opened (read-only) \??\L: 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe File opened (read-only) \??\O: 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe File opened (read-only) \??\V: 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe File opened (read-only) \??\G: 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe File opened (read-only) \??\J: 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe File opened (read-only) \??\U: 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4860-0-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/files/0x0007000000023c9b-12.dat upx behavioral2/memory/4860-10-0x0000000000B10000-0x0000000000B2F000-memory.dmp upx behavioral2/files/0x000b000000023bc3-15.dat upx behavioral2/memory/4860-8-0x0000000000B10000-0x0000000000B2F000-memory.dmp upx behavioral2/memory/4860-20-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/memory/2236-23-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/memory/2236-35-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/memory/2236-37-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/memory/2236-38-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\OXPQS.dll 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe File created C:\Program Files (x86)\svchost.exe 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe File created C:\Program Files (x86)\OXPQS.dll 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies registry class 26 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BFWorkFile1007PV svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{78E611A2-E484-4A0D-811E-C40100A3F452}\ = "Maihook1007" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{78E611A2-E484-4A0D-811E-C40100A3F452}\InprocServer32\ = "C:\\PROGRA~2\\OXPQS.dll" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{78E611A2-E484-4A0D-811E-C40100A3F452}\InprocServer32\ThreadingModel = "Apartment" 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OXPQS.ShellExecuteHook1007\Clsid 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{78E611A2-E484-4A0D-811E-C40100A3F452}\InprocServer32 svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OXPQS.ShellExecuteHook1007\ = "Maihook1007" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OXPQS.ShellExecuteHook1007\Clsid\ = "{78E611A2-E484-4A0D-811E-C40100A3F452}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OXPQS.ShellExecuteHook1007\Clsid\ = "{78E611A2-E484-4A0D-811E-C40100A3F452}" 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{78E611A2-E484-4A0D-811E-C40100A3F452}\ProgID 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{78E611A2-E484-4A0D-811E-C40100A3F452}\InprocServer32 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{78E611A2-E484-4A0D-811E-C40100A3F452}\ProgID\ = "OXPQS.ShellExecuteHook1007" 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{78E611A2-E484-4A0D-811E-C40100A3F452} svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OXPQS.ShellExecuteHook1007\Clsid svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{78E611A2-E484-4A0D-811E-C40100A3F452}\ProgID svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{78E611A2-E484-4A0D-811E-C40100A3F452}\ProgID\ = "OXPQS.ShellExecuteHook1007" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{78E611A2-E484-4A0D-811E-C40100A3F452} 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{78E611A2-E484-4A0D-811E-C40100A3F452}\ = "Maihook1007" 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{78E611A2-E484-4A0D-811E-C40100A3F452}\InprocServer32\ = "C:\\PROGRA~2\\OXPQS.dll" 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OXPQS.ShellExecuteHook1007 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OXPQS.ShellExecuteHook1007\ = "Maihook1007" 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BFWorkFile1007PV\DFile = "052039069052044072098162050038086188235066128212212079012049227249025032094041058138237219036087024161172239055062008042085020255006010" 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{78E611A2-E484-4A0D-811E-C40100A3F452}\InprocServer32\ThreadingModel = "Apartment" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OXPQS.ShellExecuteHook1007 svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BFWorkFile1007PV 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BFWorkFile1007PV\EFile = "051044068052044077103249050039095165067066232180051245074042055233032055113159254236089220215227238014035136125109111108048196032167245114219" 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4860 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe 4860 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2236 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4860 wrote to memory of 2236 4860 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe 87 PID 4860 wrote to memory of 2236 4860 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe 87 PID 4860 wrote to memory of 2236 4860 574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\574c40ba13597e802a141ffe7abfd2fb_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Program Files (x86)\svchost.exe"C:\Program Files (x86)\svchost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
237KB
MD5e05dee27ccec8bc1a53aa2d52ee38145
SHA1a59e632d8155e8e790b9d5d91bc1ba7a10b60a02
SHA25622fb17f045624174e330492380dcdfe1f1255f7c4e463e23d4311013ccd99765
SHA5128b65f7521337b4aa6b295e86fc13807e77e26e0c31b213d801c4103e9d152d088173b872f0c1ffaac8cc24f122967b9a6477cf4f06945390bbc296f0e5e593c8
-
Filesize
194KB
MD536a4c055e17a50041be001751a289205
SHA16de77edb362a8b5fed357ab1da4fb4d13a303b07
SHA25675285d4be4db48e7ff890d22812bf4c56df7aabf9e6beb55d7eb268c66d63fc8
SHA512e2b2f23ec932af770fc06a2469ec0c6ec0199e1f0635914e2807d97593a83388a368dbbfeee5fad33ffde13dd8d8254e168da32ff48d438d0d7cca84b97c7de0