Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:17
Static task
static1
Behavioral task
behavioral1
Sample
b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
b4f2b7450dbf379990d0322d14b1764a
-
SHA1
db08c17a3bd45226f72d72f3c972df10dfafcef3
-
SHA256
fdf1768bb6fe92be6c1d03ab713fc92e7d0a7ee3f70ade9ac3559178b49c6056
-
SHA512
97ebb8589718625e7c11d3267adeb2b69b428b9fdffa8a2c4920065103e189ea6425fb05eb3ddda1d5c622111e9ef2527bc8cb5191372bbf3e8b8869fa17b31c
-
SSDEEP
24576:T9h/dOr0QrpGYLBPx4yvzBXTCkpM1AzywGIDyfJd5Oh/BXyoOCsw0:TupBPnvzBSmz2rv5Y/kw0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation setup.exe -
Executes dropped EXE 2 IoCs
pid Process 1460 setup.exe 1420 Baidu-Toolbar-jytxz.exe -
Loads dropped DLL 1 IoCs
pid Process 116 b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\newicon.ico b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Baidu-Toolbar-jytxz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023cb7-11.dat nsis_installer_1 -
Modifies registry class 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C55FB1A5-F84C-4A69-A0F4-3C191CC873E5}\DefaultIcon b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C55FB1A5-F84C-4A69-A0F4-3C191CC873E5} b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C55FB1A5-F84C-4A69-A0F4-3C191CC873E5}\DefaultIcon\ = "C:\\Windows\\newicon.ico" b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C55FB1A5-F84C-4A69-A0F4-3C191CC873E5}\Shell\Open(&O)\Command\ = "C:\\Program Files (x86)\\Internet Explorer\\IEXPLORE.EXE http://www.7322.com" b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C55FB1A5-F84C-4A69-A0F4-3C191CC873E5}\ShellFolder b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C55FB1A5-F84C-4A69-A0F4-3C191CC873E5}\ShellFolder\Attributes = "10" b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C55FB1A5-F84C-4A69-A0F4-3C191CC873E5}\ = "Internet Explorer" b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C55FB1A5-F84C-4A69-A0F4-3C191CC873E5}\Shell b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C55FB1A5-F84C-4A69-A0F4-3C191CC873E5}\Shell\Open(&O)\Command b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C55FB1A5-F84C-4A69-A0F4-3C191CC873E5}\Shell\ÊôÐÔ(&D)\Command b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C55FB1A5-F84C-4A69-A0F4-3C191CC873E5}\Shell\ÊôÐÔ(&D) b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C55FB1A5-F84C-4A69-A0F4-3C191CC873E5}\Shell\Open(&O) b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C55FB1A5-F84C-4A69-A0F4-3C191CC873E5}\Shell\ÊôÐÔ(&D)\Command\ = "Rundll32.exe Shell32.dll,Control_RunDLL Inetcpl.cpl" b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C55FB1A5-F84C-4A69-A0F4-3C191CC873E5}\Shell\Open(&O)\ = "Open(&O)" b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 116 wrote to memory of 1460 116 b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe 82 PID 116 wrote to memory of 1460 116 b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe 82 PID 116 wrote to memory of 1460 116 b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe 82 PID 116 wrote to memory of 1420 116 b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe 83 PID 116 wrote to memory of 1420 116 b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe 83 PID 116 wrote to memory of 1420 116 b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe 83 PID 1460 wrote to memory of 788 1460 setup.exe 84 PID 1460 wrote to memory of 788 1460 setup.exe 84 PID 1460 wrote to memory of 788 1460 setup.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4f2b7450dbf379990d0322d14b1764a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DelTemp.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:788
-
-
-
C:\Users\Admin\AppData\Local\Temp\Baidu-Toolbar-jytxz.exe"C:\Users\Admin\AppData\Local\Temp\Baidu-Toolbar-jytxz.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
842KB
MD553313ae428555585f4c4e15311a5af06
SHA1642b4118708b54bc08a353a2fda3645133c4213f
SHA2565acbcbd3d6f353efa0c8d12483646c2a33b76058a0b866ad447dfab9cc9a7eea
SHA5121f6afc216de13dc4dfe2342e579fae74c030383ec45d39339504b0a6487ba0e341196a2c9a91912272915afcece6cac4effb956cacb82d12c968d00af762ccbd
-
Filesize
69B
MD532f45cd6abc1d26f07b8ddb71871ce05
SHA10cc28dc63d50327a74f8e964cdf23ffed05a8699
SHA256a2023fadce396c9265a61f24b6dcc5e95aaaf2b9efa1eceac2fcc1332322e716
SHA512f18d1ed212bda39f671fe7d7dac6cc6f5012e17149b57c7a121e666f09d5040c75ced09679bef1e630cd69fc03d824ced178be25b275139e4f4e139a0f96ebb9
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
Filesize
391KB
MD56360ccc5468219ef2e92598342387a35
SHA17bd1c30f275b1c8304c77909e26cda7fe56ae739
SHA2564f282896dc504b36d547ab45b3967c2a810b26a96aa850809366af9010fb3137
SHA51225b64e063e5b806702c1a1a9dd0b3c11cb001c76b329b731211fbc8594a6abe00c77b4326f1dc7250eff53b9a00027b883d4f32ee318ca682d19ef11fe3faecc