Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 13:02
Behavioral task
behavioral1
Sample
JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe
-
Size
78KB
-
MD5
8aafd50aac3e9730d337421060bbd201
-
SHA1
aaab5812392d7e620736211d47c02ca0793a3e3f
-
SHA256
268fc2013b2620acbfa8a726b3b78ff584bf7b067e7bbe15ccc85e671a6745e9
-
SHA512
83c1bf5cacc7059bb2b7ad44d041e1cf1e3afeda6487a5c4a967229780fc54573fed17dc1ff413ed86f372d31c59a76696aa79df3ec78749b0405676ec9d80cd
-
SSDEEP
1536:26mrbxxuzuCTChMLJUK3bRPr1mb0KdeWbdTTo:2vbLQ5kgUGbRDsmGdTTo
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe -
Executes dropped EXE 2 IoCs
pid Process 1648 smss.exe 1896 smss.exe -
Loads dropped DLL 1 IoCs
pid Process 3736 regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{533DA319-AD1D-43BB-94C3-CB651A8F712C} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{533DA319-AD1D-43BB-94C3-CB651A8F712C}\ = "??????" regedit.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\userid.txt JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe File opened for modification C:\Windows\tao.ico JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe File opened for modification C:\Windows\t.ico JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe File opened for modification C:\Windows\ZJS\CJS.vbe JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe File opened for modification C:\Windows\CHO\VIFXSXFHEV.dll JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe File opened for modification C:\Windows\F\smss.exe JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe File created C:\Windows\Survival_0.txt smss.exe File opened for modification C:\Windows\Survival_0.txt smss.exe File created C:\Windows\reg.reg JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0164A626-C205-475A-AE30-25442BF5B95F}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0164A626-C205-475A-AE30-25442BF5B95F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{533DA319-AD1D-43BB-94C3-CB651A8F712C}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{533DA319-AD1D-43BB-94C3-CB651A8F712C}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{533DA319-AD1D-43BB-94C3-CB651A8F712C}\VERSION regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0164A626-C205-475A-AE30-25442BF5B95F}\ = "Qvod" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{02F9CB9B-2A26-4817-AA60-42F14AF98C1C}\1.0\HELPDIR\ = "C:\\Windows\\CHO" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0164A626-C205-475A-AE30-25442BF5B95F}\ = "_Qvod" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{02F9CB9B-2A26-4817-AA60-42F14AF98C1C}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{02F9CB9B-2A26-4817-AA60-42F14AF98C1C}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{533DA319-AD1D-43BB-94C3-CB651A8F712C}\InprocServer32\ = "C:\\Windows\\CHO\\VIFXSXFHEV.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QvodAdBlocker.Qvod\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0164A626-C205-475A-AE30-25442BF5B95F}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{02F9CB9B-2A26-4817-AA60-42F14AF98C1C}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{02F9CB9B-2A26-4817-AA60-42F14AF98C1C}\1.0\ = "QvodAdBlocker" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0164A626-C205-475A-AE30-25442BF5B95F}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{533DA319-AD1D-43BB-94C3-CB651A8F712C}\TypeLib\ = "{02F9CB9B-2A26-4817-AA60-42F14AF98C1C}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QvodAdBlocker.Qvod regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QvodAdBlocker.Qvod\ = "QvodAdBlocker.Qvod" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QvodAdBlocker.Qvod\Clsid\ = "{533DA319-AD1D-43BB-94C3-CB651A8F712C}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{533DA319-AD1D-43BB-94C3-CB651A8F712C}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{02F9CB9B-2A26-4817-AA60-42F14AF98C1C}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{02F9CB9B-2A26-4817-AA60-42F14AF98C1C}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{02F9CB9B-2A26-4817-AA60-42F14AF98C1C}\1.0\0\win32\ = "C:\\Windows\\CHO\\VIFXSXFHEV.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0164A626-C205-475A-AE30-25442BF5B95F}\TypeLib\ = "{02F9CB9B-2A26-4817-AA60-42F14AF98C1C}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{533DA319-AD1D-43BB-94C3-CB651A8F712C}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{533DA319-AD1D-43BB-94C3-CB651A8F712C}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0164A626-C205-475A-AE30-25442BF5B95F}\ProxyStubClsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0164A626-C205-475A-AE30-25442BF5B95F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0164A626-C205-475A-AE30-25442BF5B95F}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{533DA319-AD1D-43BB-94C3-CB651A8F712C}\ProgID\ = "QvodAdBlocker.Qvod" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{533DA319-AD1D-43BB-94C3-CB651A8F712C}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{533DA319-AD1D-43BB-94C3-CB651A8F712C}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0164A626-C205-475A-AE30-25442BF5B95F}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{533DA319-AD1D-43BB-94C3-CB651A8F712C}\ = "QvodAdBlocker.Qvod" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{02F9CB9B-2A26-4817-AA60-42F14AF98C1C} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0164A626-C205-475A-AE30-25442BF5B95F}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0164A626-C205-475A-AE30-25442BF5B95F}\ = "_Qvod" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0164A626-C205-475A-AE30-25442BF5B95F}\TypeLib\ = "{02F9CB9B-2A26-4817-AA60-42F14AF98C1C}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0164A626-C205-475A-AE30-25442BF5B95F}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{02F9CB9B-2A26-4817-AA60-42F14AF98C1C}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0164A626-C205-475A-AE30-25442BF5B95F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0164A626-C205-475A-AE30-25442BF5B95F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{533DA319-AD1D-43BB-94C3-CB651A8F712C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{533DA319-AD1D-43BB-94C3-CB651A8F712C}\VERSION\ = "1.0" regsvr32.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1960 regedit.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 4256 JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe 4256 JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe 4256 JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe 1648 smss.exe 1648 smss.exe 1648 smss.exe 1896 smss.exe 1896 smss.exe 1896 smss.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4256 wrote to memory of 3588 4256 JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe 92 PID 4256 wrote to memory of 3588 4256 JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe 92 PID 4256 wrote to memory of 3588 4256 JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe 92 PID 4256 wrote to memory of 3736 4256 JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe 93 PID 4256 wrote to memory of 3736 4256 JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe 93 PID 4256 wrote to memory of 3736 4256 JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe 93 PID 4256 wrote to memory of 1972 4256 JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe 94 PID 4256 wrote to memory of 1972 4256 JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe 94 PID 4256 wrote to memory of 1972 4256 JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe 94 PID 4256 wrote to memory of 1648 4256 JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe 95 PID 4256 wrote to memory of 1648 4256 JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe 95 PID 4256 wrote to memory of 1648 4256 JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe 95 PID 1972 wrote to memory of 1960 1972 cmd.exe 97 PID 1972 wrote to memory of 1960 1972 cmd.exe 97 PID 1972 wrote to memory of 1960 1972 cmd.exe 97 PID 4256 wrote to memory of 1896 4256 JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe 98 PID 4256 wrote to memory of 1896 4256 JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe 98 PID 4256 wrote to memory of 1896 4256 JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8aafd50aac3e9730d337421060bbd201.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\ZJS\CJS.vbe" 02⤵
- System Location Discovery: System Language Discovery
PID:3588
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Windows\CHO\VIFXSXFHEV.dll"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3736
-
-
C:\Windows\SysWOW64\cmd.execmd /c regedit.exe /s C:\Windows\reg.reg2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\reg.reg3⤵
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1960
-
-
-
C:\Windows\F\smss.exeC:\Windows\F\smss.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1648
-
-
C:\Windows\F\smss.exeC:\Windows\F\smss.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5d0ec02e209177721338a56ae287dd4fa
SHA1e530343fd2686bd1556b4f91a566d9e2cb9beb28
SHA256dbb9afefe97ea701c7438b96c484fcab79fb0c74774b2dfeabd5b4077d6974df
SHA512d098dc406c6d5a299de344bff1a29782353a9a4f264cb2c005084f709f7413d4c39234216beec8a7528fbe55dac4b57e02d928c09e7f7f57d190fb0bf59d3d52
-
Filesize
7.8MB
MD5aff51071ca47e3610e398345d92dc0d6
SHA13ff3eff1c495930611d27383aa573a6eb551a0cb
SHA25617535669337f7ce33c8bf4fa7bba206e03ec81c5f96efe275c72ce2c7dcb99d6
SHA512ce5f5403228f0d863497a65195ccc18b009c4630b1fa23e011c5702747a51b357da1e286384ecfd89e4e86318d168bc001b06000d36e7b8bd48d8402d53f0c02
-
Filesize
3B
MD5a5ea0ad9260b1550a14cc58d2c39b03d
SHA1f0aedf295071ed34ab8c6a7692223d22b6a19841
SHA256f1b2f662800122bed0ff255693df89c4487fbdcf453d3524a42d4ec20c3d9c04
SHA5127c735c613ece191801114785c1ee26a0485cbf1e8ee2c3b85ba1ad290ef75eec9fede5e1a5dc26d504701f3542e6b6457818f4c1d62448d0db40d5f35c357d74
-
Filesize
1.4MB
MD5d5def5a3bf2c5852124a7ad61c1bb570
SHA1f116aef31e3f71b50c92165fd3c8d67db14c840c
SHA25620f75b6128f0b69cb17e90535881c7312f1c86646e11543aeb8683ee02dfda0f
SHA512f94eeed41ad1ce2e9abc688962e9a2c0226669cc1d2827f2ad28002f57b9911de4dbefae1a458a00662369cb5f9445841988b303fc2efc994169df59de02bf20
-
Filesize
185B
MD5d786c602ee4d1c98f13347b1421563da
SHA131726c39ffe4da9ebaf71cd1033ed88909006697
SHA25662b603de263f2f1a0cde4c17ede80e935aff6ef0df2f03d90aee896f497ff616
SHA51261a218d9bf1d6dd3e137fa048a5b343ebffd82eef93cff7852f9e47dc05d3cf50fb04834e97329135244af6e1975d7b6df57d9797a99bf210813f7ff7c2acb4e
-
Filesize
5B
MD53719bc4d13977453b5d8c9d8f1e7462a
SHA1c24505bcdb2b09980198730cd4791acad1796dcc
SHA256197a4e2a0db3b79c8240827c9ea2ed1476c8a5ad7e22c02c832ba3a0a8bff9a1
SHA5129bebfe9c377389f34afd15c2f4e2b027edfec3ec4883f0df09c8a0e4d22dbb9692eb8b4264c89165bc336c458e5488a7cd743bd5f99ae5d4b71a8b3c2805f1a5