Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 04:37
Static task
static1
Behavioral task
behavioral1
Sample
e93c38c107a6bbc06ef10acf04366aca_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e93c38c107a6bbc06ef10acf04366aca_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e93c38c107a6bbc06ef10acf04366aca_JaffaCakes118.exe
-
Size
61KB
-
MD5
e93c38c107a6bbc06ef10acf04366aca
-
SHA1
5649eab95ca67bd709db9f9bf9eb5857617d14b4
-
SHA256
cb547f21e903e686c56f0e5df567ccc65462e85b3802adce66bc9c081d818a3f
-
SHA512
aed050ca9e7fa0b957463de4c6d2123a5aca020cf7a45415914863ceb9497b7a16b43c08bd8da89ad3049dffdb968e07951ad1a4a6ea49211149b36871662db2
-
SSDEEP
768:iM7O0GTipbBNcJ1wjHQwUPdKAZbyAD4ZVAuEPTeWq6umT/9O3x+DUYh3zXp2F5ke:iDVBwviKAJyAD4ZVAHPTc6uSo82Iot
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 5092 e93c38c107a6bbc06ef10acf04366aca_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSSMSGS = "rundll32.exe winwgp32.rom,IydzOmxxpBRr" e93c38c107a6bbc06ef10acf04366aca_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winwgp32.rom e93c38c107a6bbc06ef10acf04366aca_JaffaCakes118.exe File created C:\Windows\SysWOW64\winwgp32.rom e93c38c107a6bbc06ef10acf04366aca_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4192 5092 WerFault.exe 92 -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31099447" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2876522281" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2870428299" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31099447" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419402409" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{D6B27A8B-F62A-11EE-9846-F2C20ACFDC46} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31099447" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2870428299" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1680 iexplore.exe 1680 iexplore.exe 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 5092 wrote to memory of 5044 5092 e93c38c107a6bbc06ef10acf04366aca_JaffaCakes118.exe 96 PID 5092 wrote to memory of 5044 5092 e93c38c107a6bbc06ef10acf04366aca_JaffaCakes118.exe 96 PID 5092 wrote to memory of 5044 5092 e93c38c107a6bbc06ef10acf04366aca_JaffaCakes118.exe 96 PID 5044 wrote to memory of 1680 5044 cmd.exe 98 PID 5044 wrote to memory of 1680 5044 cmd.exe 98 PID 1680 wrote to memory of 1952 1680 iexplore.exe 100 PID 1680 wrote to memory of 1952 1680 iexplore.exe 100 PID 1680 wrote to memory of 1952 1680 iexplore.exe 100 PID 5092 wrote to memory of 1680 5092 e93c38c107a6bbc06ef10acf04366aca_JaffaCakes118.exe 98 PID 5092 wrote to memory of 1680 5092 e93c38c107a6bbc06ef10acf04366aca_JaffaCakes118.exe 98 PID 5092 wrote to memory of 1388 5092 e93c38c107a6bbc06ef10acf04366aca_JaffaCakes118.exe 105 PID 5092 wrote to memory of 1388 5092 e93c38c107a6bbc06ef10acf04366aca_JaffaCakes118.exe 105 PID 5092 wrote to memory of 1388 5092 e93c38c107a6bbc06ef10acf04366aca_JaffaCakes118.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\e93c38c107a6bbc06ef10acf04366aca_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e93c38c107a6bbc06ef10acf04366aca_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1952
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fig5BCC.bat"2⤵PID:1388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 4922⤵
- Program crash
PID:4192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5092 -ip 50921⤵PID:2052
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1420 --field-trial-handle=3136,i,3192284747741020952,1225278682167953346,262144 --variations-seed-version /prefetch:81⤵PID:4488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD539dd625b01652b616f218d3ddd2cf208
SHA1d743d761bbfcb8cfc9b197bf3e903154f0255113
SHA256885889906cf0a34f41de313074d706b129d988dc1d8b944dbdcf4e1d4e460b77
SHA512b9f61ef3bbf3f7324ac0852c1c49a7a1c576b9168238eb16a15023916cbf1370d49787e8d05e58dbcc6ee8b23427f12a50d203de0ab3226eb6e1a80ee9637f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD59b7bf61200f3ff1cc462c09eeffa7362
SHA1a13aadaa87ca4d62d78810f8a03488646d752ec3
SHA256a376c414cef69243ad87a455dae5d5579320a0c2dd6f0fc67250905c560c62c2
SHA512a79cd27594353955aa904631966da45e865f4580e49def86da042237232bcd97e5b09f96c26f70e1557aeca8a154ad993863d453d155a064d8dfa08e951c97db
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
188B
MD56c8bbc41c21d495ae9fbb12eacc83f40
SHA144ef01de7fd48dc0cd7be7f66eb8a10676935cd0
SHA256d7e5a65badf6ff490c87cd4912550db8223165b3361ddb3e068a185a9d2b02b7
SHA5126367c21820ff2b27ffdf9ff5fc700021afdae879050585a3a1f8600f2e7f7c1b33bea85210fc9a0c2b1f6c12fdee8f00635e5010a932d453f045840d71ebb865
-
Filesize
37KB
MD5f6393fd79b14d643dbd422cf5a3bf414
SHA173fe444cad30d51eba92fc3ed0c1ba2b90b768c5
SHA256ddf5e708f09784dcb0ff00a4db400e552dee8b44bdc0a28c0f88a522b340b893
SHA5127b069a772734ee9e7943686bde8b207f3d5a21b673954d64835c82baebc3d56ae956587c3c0b80a64c387dded2c4fd06bc38daa790bb6dc01687eb6199801f57