Malware Analysis Report

2025-08-06 02:47

Sample ID 241031-bjyvnswckh
Target 80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118
SHA256 c9c5673f51113ac6e5fb74a477ff1b8b59e2382da935367facf882d25f64f0fc
Tags
defense_evasion discovery persistence
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

c9c5673f51113ac6e5fb74a477ff1b8b59e2382da935367facf882d25f64f0fc

Threat Level: Likely malicious

The file 80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

defense_evasion discovery persistence

Server Software Component: Terminal Services DLL

Checks BIOS information in registry

Deletes itself

Loads dropped DLL

Indicator Removal: File Deletion

Drops file in System32 directory

System Location Discovery: System Language Discovery

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Modifies registry class

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-10-31 01:11

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-10-31 01:11

Reported

2024-10-31 02:12

Platform

win7-20241010-en

Max time kernel

144s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe"

Signatures

Server Software Component: Terminal Services DLL

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\idestong\Parameters\ServiceDll = "C:\\Windows\\system32\\idestong.dll" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\svchost.exe N/A

Indicator Removal: File Deletion

defense_evasion

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\idestong.dll C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
File opened for modification C:\Windows\SysWOW64\idestong.dll C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\svchost.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\Implemented Categories\{000C0118-0000-0000-C000-000000000046} C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\Printable C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\Typelib\ = "{00020813-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\Version\ = "1.2" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\MiscStatus\ = "1" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\DefaultExtension C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\InprocServer32\14.0.0.0\Class = "Microsoft.Office.Interop.Excel.ChartClass" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\Conversion\Readwritable\Main C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\Verb\0 C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\Conversion\Readable C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\InprocHandler32 C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\LocalServer32\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\Typelib C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\Version C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\ = "Microsoft Excel Chart" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\InprocServer32\RuntimeVersion = "v2.0.50727" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\Verb\0\ = "&Edit,0,2" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\DataFormats\GetSet\4\ = "NoteshNote,-1,1,1" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\Conversion\Readable\Main\ = "Biff8,Biff5,ExcelChart" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\DataFormats\GetSet\0 C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\DefaultIcon\ = "C:\\Windows\\Installer\\{90140000-0011-0000-0000-0000000FF1CE}\\xlicons.exe,3" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\InprocServer32\14.0.0.0\Assembly = "Microsoft.Office.Interop.Excel, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\PersistentHandler C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\ProgID\ = "Excel.Chart.8" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\AuxUserType\2 C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\DataFormats\GetSet\0\ = "3,1,32,1" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\Verb\1\ = "&Open,0,2" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\DataFormats\DefaultFile\ = "Biff8" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\DocObject\ = "16" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\InprocHandler32\ = "ole32.dll" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\InprocServer32\14.0.0.0\RuntimeVersion = "v2.0.50727" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\ProgID C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\VersionIndependentProgID\ = "Excel.Chart" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\DataFormats\GetSet\3 C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\DataFormats\GetSet\1\ = "2,1,16,1" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\DataFormats\GetSet\3\ = "NotesDocInfo,1,1,1" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\DataFormats\GetSet\4 C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\DefaultExtension\ = ".xls, Excel Workbook (*.xls)" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\DefaultIcon C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\DocObject C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\InprocServer32\14.0.0.0 C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965} C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\VersionIndependentProgID C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\PersistentHandler\ = "{98de59a0-d175-11cd-a7bd-00006b827d94}" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\AuxUserType\2\ = "Chart" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\Conversion C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\Conversion\Readwritable\Main\ = "Biff8" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\LocalServer32\LocalServer32 = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510000000000 C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\MiscStatus C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\IPersistStorageType = "1" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\Verb C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\DataFormats\GetSet C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\Verb\1 C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\Implemented Categories C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\DataFormats\GetSet\1 C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\InprocServer32 C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\Insertable C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\AuxUserType\3\ = "Microsoft Excel 2003" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\AuxUserType\3 C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\Conversion\Readable\Main C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\DataFormats\DefaultFile C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\DataFormats\GetSet\2\ = "1,1,1,1" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\InprocServer32\Assembly = "Microsoft.Office.Interop.Excel, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\AuxUserType C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe"

C:\Windows\SysWOW64\svchost.exe

C:\Windows\SysWOW64\svchost.exe -k netsvcs

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 867588.vicp.net udp

Files

memory/2220-0-0x0000000000400000-0x0000000000569000-memory.dmp

memory/2220-1-0x0000000001EC0000-0x0000000001F24000-memory.dmp

memory/2220-6-0x0000000001EC0000-0x0000000001F24000-memory.dmp

memory/2220-10-0x0000000001EC0000-0x0000000001F24000-memory.dmp

memory/2220-9-0x0000000000400000-0x0000000000569000-memory.dmp

memory/2220-7-0x0000000000400000-0x0000000000569000-memory.dmp

memory/2220-8-0x0000000000400000-0x0000000000569000-memory.dmp

\??\c:\windows\SysWOW64\idestong.dll

MD5 15e4bf466469dc7a613ba10b1d5b42cd
SHA1 de4e1a8b59ffe85d0afa5722fc3d5d46a08e62d5
SHA256 c3da1b2a614ca2ecce648b98bbaf802b10a8728b0dadf332206790f33c959963
SHA512 8102335b979b16ab981f919fec3912fcc43c99d11c4c3db8254abd7a7dbd21f07d4f3a11629d987eaefb40d04d6e3418bad07d9b4a0940480f114f06473ecbc0

memory/1040-15-0x0000000001DB0000-0x0000000001E3B000-memory.dmp

memory/2220-16-0x0000000001EC0000-0x0000000001F24000-memory.dmp

memory/2220-17-0x0000000000400000-0x0000000000569000-memory.dmp

memory/1040-18-0x0000000001DB0000-0x0000000001E3B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-10-31 01:11

Reported

2024-10-31 02:32

Platform

win10v2004-20241007-en

Max time kernel

142s

Max time network

144s

Command Line

"C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe"

Signatures

Server Software Component: Terminal Services DLL

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\idestong\Parameters\ServiceDll = "C:\\Windows\\system32\\idestong.dll" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\svchost.exe N/A

Indicator Removal: File Deletion

defense_evasion

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\idestong.dll C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
File created C:\Windows\SysWOW64\idestong.dll C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\svchost.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965} C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\ = "Color Property Page" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\InprocServer32 C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{81BBE965-81BB-E965-81BB-E96581BBE965}\InprocServer32\ = "C:\\Windows\\SysWOW64\\mfc42u.dll" C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe"

C:\Windows\SysWOW64\svchost.exe

C:\Windows\SysWOW64\svchost.exe -k netsvcs

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\80fbd38e5fc7bedb55e4fdcbc3270134_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 68.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 867588.vicp.net udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 867588.vicp.net udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 867588.vicp.net udp
US 8.8.8.8:53 867588.vicp.net udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 867588.vicp.net udp
US 8.8.8.8:53 867588.vicp.net udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 867588.vicp.net udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 867588.vicp.net udp
US 8.8.8.8:53 867588.vicp.net udp
US 8.8.8.8:53 867588.vicp.net udp

Files

memory/1356-0-0x0000000000400000-0x0000000000569000-memory.dmp

memory/1356-2-0x0000000004700000-0x0000000004764000-memory.dmp

memory/1356-7-0x0000000004700000-0x0000000004764000-memory.dmp

memory/1356-8-0x0000000000400000-0x0000000000569000-memory.dmp

memory/1356-9-0x0000000000400000-0x0000000000569000-memory.dmp

memory/1356-10-0x0000000000400000-0x0000000000569000-memory.dmp

memory/1356-11-0x0000000004700000-0x0000000004764000-memory.dmp

\??\c:\windows\SysWOW64\idestong.dll

MD5 15e4bf466469dc7a613ba10b1d5b42cd
SHA1 de4e1a8b59ffe85d0afa5722fc3d5d46a08e62d5
SHA256 c3da1b2a614ca2ecce648b98bbaf802b10a8728b0dadf332206790f33c959963
SHA512 8102335b979b16ab981f919fec3912fcc43c99d11c4c3db8254abd7a7dbd21f07d4f3a11629d987eaefb40d04d6e3418bad07d9b4a0940480f114f06473ecbc0

memory/1356-16-0x0000000004700000-0x0000000004764000-memory.dmp

memory/1356-18-0x0000000000400000-0x0000000000569000-memory.dmp

memory/3768-19-0x0000000000400000-0x000000000048B000-memory.dmp