Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 20:49
Static task
static1
Behavioral task
behavioral1
Sample
e838009e3a929fd62d0a091a31a35a0d_JaffaCakes118.dll
Resource
win7-20241010-en
General
-
Target
e838009e3a929fd62d0a091a31a35a0d_JaffaCakes118.dll
-
Size
378KB
-
MD5
e838009e3a929fd62d0a091a31a35a0d
-
SHA1
77e579a53e08068ff529745954ddd1d09d86f7a6
-
SHA256
679e6ffe4abc97f9ce1a4152daf960ee26545fa68c05e53ef7fcf3fe45e39926
-
SHA512
01123446a9d19beac86731be169358f465d4f7cf79fa56e5fb33d5909c23c39bcc21bb21f47f8a1bb38d3509c50278b277190a1f53a168f94503e810269d599e
-
SSDEEP
3072:Do6vBnby4Yx0XjFFzPQ0MslzERfQB24hLxBVi/b/9+PdpiWC35ol/uwfTuT2b2MW:vs6Xpq0H3Jhds/9+qC/zfTPLTw
Malware Config
Extracted
qakbot
402.343
obama104
1632729661
95.77.223.148:443
47.22.148.6:443
89.101.97.139:443
27.223.92.142:995
120.151.47.189:443
136.232.34.70:443
120.150.218.241:995
185.250.148.74:443
181.118.183.94:443
140.82.49.12:443
67.165.206.193:993
103.148.120.144:443
71.74.12.34:443
76.25.142.196:443
73.151.236.31:443
173.21.10.71:2222
75.188.35.168:443
2.178.88.145:61202
71.80.168.245:443
45.46.53.140:2222
109.12.111.14:443
105.198.236.99:443
73.77.87.137:443
41.248.239.221:995
182.176.112.182:443
96.37.113.36:993
75.66.88.33:443
162.244.227.34:443
24.229.150.54:995
216.201.162.158:443
92.59.35.196:2222
196.218.227.241:995
24.139.72.117:443
68.207.102.78:443
72.252.201.69:443
2.188.27.77:443
177.130.82.197:2222
68.204.7.158:443
189.210.115.207:443
181.163.96.53:443
24.55.112.61:443
75.107.26.196:465
185.250.148.74:2222
68.186.192.69:443
24.152.219.253:995
50.29.166.232:995
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Qakbot family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Wlpjsp = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Bueiyu = "0" reg.exe -
Loads dropped DLL 1 IoCs
pid Process 3060 regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Modifies data under HKEY_USERS 10 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Gritouaj\658a4372 = 70fc5d26c70b3cd96058646c8951fded3717dd5a08a1cedca25bcf499cc506d4dd620ff1bc796497251935033ecac4384a8f791f36c04573eff6835143ca0dfbe2072cc9ec3923884dd543b90aac85f8e15476321ea32148ed296892e0d4e1ca04b43033fa1ea9fcc4b67e7fe998d7b6bbe7e53dc3d5754d explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Gritouaj\67cb630e = 6bfd03331a51b0b8cc7f684b0dccda03ecee8e explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Gritouaj\a27f4be1 = 8fa6ff0ad44c0bdb31bda4996a82780a160da2351eceee137e56c632f78de7012f3d0d93ca02a05f0691a3fca2c03bc59f6eb179a2b901bb11adea2f31009c753e95c796c6f02f8d260be7d741ae470e3120ba9827fdf3b17a947af72735 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Gritouaj\5015933c = b0be5f3900e3df7f2a0c2fcbeeb61c560b1a8c47a5748476fc6e1fe5e21e7709642b14146f12ae15ceffdaa78fa5ea77de346ac9189223f8 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Gritouaj explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Gritouaj\5015933c = b0be483900e3ead2dcdf6eb45d30cb1cae6c704561a19a721c81dad2c76397443e9850 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Gritouaj\df77046b = 711e78e2ab802a0093f582bafc498b1c4205d295bbeb543f3cc538f15996af8cfdba6c1be4ad7519e36cadced822ca081b7649a6adee8c153c18d2f6754cd184840c3b88af34fab050ff7c57e6ed158b55290496fe explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Gritouaj\1ac32c84 = 0dbc17cd8d66e20cf90dc67fab6ca26d37c9ac9e182597 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Gritouaj\dd362417 = 08301c4383c8f5831685949ccc634cae3d2426fe9a3d7188413036561fe86a05687ae1fa71a77b1c5f explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Gritouaj\2f5cfcca = 3ed1c652ea5776bb47b2e03b684b65130d26b8c2056734d62d7a8b04cefa explorer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2764 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2956 rundll32.exe 3060 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2956 rundll32.exe 3060 regsvr32.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2956 2992 rundll32.exe 30 PID 2992 wrote to memory of 2956 2992 rundll32.exe 30 PID 2992 wrote to memory of 2956 2992 rundll32.exe 30 PID 2992 wrote to memory of 2956 2992 rundll32.exe 30 PID 2992 wrote to memory of 2956 2992 rundll32.exe 30 PID 2992 wrote to memory of 2956 2992 rundll32.exe 30 PID 2992 wrote to memory of 2956 2992 rundll32.exe 30 PID 2956 wrote to memory of 2684 2956 rundll32.exe 31 PID 2956 wrote to memory of 2684 2956 rundll32.exe 31 PID 2956 wrote to memory of 2684 2956 rundll32.exe 31 PID 2956 wrote to memory of 2684 2956 rundll32.exe 31 PID 2956 wrote to memory of 2684 2956 rundll32.exe 31 PID 2956 wrote to memory of 2684 2956 rundll32.exe 31 PID 2684 wrote to memory of 2764 2684 explorer.exe 32 PID 2684 wrote to memory of 2764 2684 explorer.exe 32 PID 2684 wrote to memory of 2764 2684 explorer.exe 32 PID 2684 wrote to memory of 2764 2684 explorer.exe 32 PID 2888 wrote to memory of 3036 2888 taskeng.exe 36 PID 2888 wrote to memory of 3036 2888 taskeng.exe 36 PID 2888 wrote to memory of 3036 2888 taskeng.exe 36 PID 2888 wrote to memory of 3036 2888 taskeng.exe 36 PID 2888 wrote to memory of 3036 2888 taskeng.exe 36 PID 3036 wrote to memory of 3060 3036 regsvr32.exe 37 PID 3036 wrote to memory of 3060 3036 regsvr32.exe 37 PID 3036 wrote to memory of 3060 3036 regsvr32.exe 37 PID 3036 wrote to memory of 3060 3036 regsvr32.exe 37 PID 3036 wrote to memory of 3060 3036 regsvr32.exe 37 PID 3036 wrote to memory of 3060 3036 regsvr32.exe 37 PID 3036 wrote to memory of 3060 3036 regsvr32.exe 37 PID 3060 wrote to memory of 2520 3060 regsvr32.exe 38 PID 3060 wrote to memory of 2520 3060 regsvr32.exe 38 PID 3060 wrote to memory of 2520 3060 regsvr32.exe 38 PID 3060 wrote to memory of 2520 3060 regsvr32.exe 38 PID 3060 wrote to memory of 2520 3060 regsvr32.exe 38 PID 3060 wrote to memory of 2520 3060 regsvr32.exe 38 PID 2520 wrote to memory of 1228 2520 explorer.exe 39 PID 2520 wrote to memory of 1228 2520 explorer.exe 39 PID 2520 wrote to memory of 1228 2520 explorer.exe 39 PID 2520 wrote to memory of 1228 2520 explorer.exe 39 PID 2520 wrote to memory of 2540 2520 explorer.exe 41 PID 2520 wrote to memory of 2540 2520 explorer.exe 41 PID 2520 wrote to memory of 2540 2520 explorer.exe 41 PID 2520 wrote to memory of 2540 2520 explorer.exe 41
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e838009e3a929fd62d0a091a31a35a0d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e838009e3a929fd62d0a091a31a35a0d_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn sicmbskb /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\e838009e3a929fd62d0a091a31a35a0d_JaffaCakes118.dll\"" /SC ONCE /Z /ST 20:51 /ET 21:034⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2764
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {DF7B12A0-01CE-49E1-B718-EE804E5798DB} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\e838009e3a929fd62d0a091a31a35a0d_JaffaCakes118.dll"2⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\e838009e3a929fd62d0a091a31a35a0d_JaffaCakes118.dll"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Bueiyu" /d "0"5⤵
- Windows security bypass
PID:1228
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Wlpjsp" /d "0"5⤵
- Windows security bypass
PID:2540
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
378KB
MD5e838009e3a929fd62d0a091a31a35a0d
SHA177e579a53e08068ff529745954ddd1d09d86f7a6
SHA256679e6ffe4abc97f9ce1a4152daf960ee26545fa68c05e53ef7fcf3fe45e39926
SHA51201123446a9d19beac86731be169358f465d4f7cf79fa56e5fb33d5909c23c39bcc21bb21f47f8a1bb38d3509c50278b277190a1f53a168f94503e810269d599e