Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 04:50
Static task
static1
Behavioral task
behavioral1
Sample
f74d1031511b6aa62d1639132c8ccbc2_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f74d1031511b6aa62d1639132c8ccbc2_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f74d1031511b6aa62d1639132c8ccbc2_JaffaCakes118.exe
-
Size
30KB
-
MD5
f74d1031511b6aa62d1639132c8ccbc2
-
SHA1
c1a57f94a5b77ce3019a84d6ce37af26e254b6a9
-
SHA256
90ca76a7986edef28c7d78dc46d7610370b1cb5824eadd2439353290fad6d02e
-
SHA512
0e023343524c4be05ad591356ea42ec05e18ee009a66977233c6cb0ef6d1cf0cd2db02f2dc1a12a18ac93c557ad26ff249d7d8d3b94767e7c539d6f6c29b909c
-
SSDEEP
768:1qa4/tG4fexLDlpCtxs7qvUPq97q2mUtoOnRTfSU:zsexLvCtxnvdq7UtoOnRTa
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2792 f74d1031511b6aa62d1639132c8ccbc2_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\winhwc32.dll f74d1031511b6aa62d1639132c8ccbc2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\winhwc32.dll f74d1031511b6aa62d1639132c8ccbc2_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{2CE07AB7-FD3F-11EE-AD03-6E00C7B2A603} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "28025125" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "27713268" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "23337654" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{2CCD3F35-FD3F-11EE-AD03-6E00C7B2A603} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31101260" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "57087910" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "23337654" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "28025125" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420180802" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31101260" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31101260" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31101260" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31101260" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31101260" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2392 iexplore.exe 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2392 iexplore.exe 2392 iexplore.exe 2872 iexplore.exe 2872 iexplore.exe 4128 IEXPLORE.EXE 4128 IEXPLORE.EXE 4316 IEXPLORE.EXE 4316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2792 wrote to memory of 744 2792 f74d1031511b6aa62d1639132c8ccbc2_JaffaCakes118.exe 83 PID 2792 wrote to memory of 744 2792 f74d1031511b6aa62d1639132c8ccbc2_JaffaCakes118.exe 83 PID 2792 wrote to memory of 744 2792 f74d1031511b6aa62d1639132c8ccbc2_JaffaCakes118.exe 83 PID 744 wrote to memory of 2392 744 cmd.exe 88 PID 744 wrote to memory of 2392 744 cmd.exe 88 PID 2792 wrote to memory of 5016 2792 f74d1031511b6aa62d1639132c8ccbc2_JaffaCakes118.exe 89 PID 2792 wrote to memory of 5016 2792 f74d1031511b6aa62d1639132c8ccbc2_JaffaCakes118.exe 89 PID 2792 wrote to memory of 5016 2792 f74d1031511b6aa62d1639132c8ccbc2_JaffaCakes118.exe 89 PID 5016 wrote to memory of 2872 5016 cmd.exe 92 PID 5016 wrote to memory of 2872 5016 cmd.exe 92 PID 2392 wrote to memory of 4316 2392 iexplore.exe 94 PID 2392 wrote to memory of 4316 2392 iexplore.exe 94 PID 2392 wrote to memory of 4316 2392 iexplore.exe 94 PID 2872 wrote to memory of 4128 2872 iexplore.exe 95 PID 2872 wrote to memory of 4128 2872 iexplore.exe 95 PID 2872 wrote to memory of 4128 2872 iexplore.exe 95 PID 2792 wrote to memory of 2872 2792 f74d1031511b6aa62d1639132c8ccbc2_JaffaCakes118.exe 92 PID 2792 wrote to memory of 2872 2792 f74d1031511b6aa62d1639132c8ccbc2_JaffaCakes118.exe 92 PID 2792 wrote to memory of 2872 2792 f74d1031511b6aa62d1639132c8ccbc2_JaffaCakes118.exe 92 PID 2792 wrote to memory of 2872 2792 f74d1031511b6aa62d1639132c8ccbc2_JaffaCakes118.exe 92 PID 2792 wrote to memory of 1596 2792 f74d1031511b6aa62d1639132c8ccbc2_JaffaCakes118.exe 97 PID 2792 wrote to memory of 1596 2792 f74d1031511b6aa62d1639132c8ccbc2_JaffaCakes118.exe 97 PID 2792 wrote to memory of 1596 2792 f74d1031511b6aa62d1639132c8ccbc2_JaffaCakes118.exe 97 PID 2792 wrote to memory of 3748 2792 f74d1031511b6aa62d1639132c8ccbc2_JaffaCakes118.exe 98 PID 2792 wrote to memory of 3748 2792 f74d1031511b6aa62d1639132c8ccbc2_JaffaCakes118.exe 98 PID 2792 wrote to memory of 3748 2792 f74d1031511b6aa62d1639132c8ccbc2_JaffaCakes118.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\f74d1031511b6aa62d1639132c8ccbc2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f74d1031511b6aa62d1639132c8ccbc2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4316
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4128
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\gos6784.bat"2⤵PID:1596
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f74d1031511b6aa62d1639132c8ccbc2_JaffaCakes118.bat"2⤵PID:3748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{2CCD3F35-FD3F-11EE-AD03-6E00C7B2A603}.dat
Filesize5KB
MD511c9d1812ce1b7e77bad5f187ddb1770
SHA170ea4d628f56264754c1b31191cf0122d50b058b
SHA256e056000b75235b6f8680528b2854cc2ca2c948fbd077d6eebaa04da494c0ba2b
SHA5121163d047747a8d5fbe052dcc72be04ccc775d6d9d69f8a6f60689a9b88ecf587e2ae2421ab1bd7e9a8d3bd92c42cbb8bde0a2024f0586be083d04fe930a09dc0
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{2CE07AB7-FD3F-11EE-AD03-6E00C7B2A603}.dat
Filesize5KB
MD56d1b623da2386c755d119f7703707a5c
SHA1d2f326c75852feee233add073102b39a165a605e
SHA256ae49a83b215ce700b4209efe854fe6849696a049b31388f2738e8ba23540f2d7
SHA51241e6ac058e18a7e6674fd58081531a2b14b723c68f858a8dfaa7a3640a3b321560c2fa5b800f826d036fa65f16ae61aaa572f3ba502d98bc6c9aebb6e9ef69b1
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
307B
MD56bc91bf707f40cbbf39950e426a03e22
SHA1127e1e974524a78445220e9e0cc7c013f44ffbcd
SHA256bcba26450d133aa9c613fdab6b1efc8237ee7a07dbfcd2251a6fd28eb61a98e2
SHA512afb69ce0d1f1cd8e4b62e15c21d6003003f9be86ea9aa7c58d57464433de8b5b12ba0eb046bb15266051d3fe972502f6862ea0ee1bb60d864071a106825cc649
-
Filesize
190B
MD501bf0d6b83d7ef5cb9c7be2147e04d13
SHA1ff6cff5ea36d5ce3849d8432199a2f96fe78e767
SHA256b5768e7737ac91ff86cce4558152f6fe14515e0579ed9049941515a0806a0efc
SHA51279d291ae2c90de700f5415ea4e58b8cd44dec927ad5db045bb6b1e2b5b986c82569434697012cfc56e5c681371d48f380cff20f8b7e4915f81d937854dc33b2d
-
Filesize
21KB
MD54fbb0caa9d2d58fcba705997b9f4b101
SHA14f49d8ef409b5ba8de43c78a95eb0deae70a840d
SHA256f7058cca7a2ba7f06dc22ee74c8f6c772838f0965acf5f5c83f7bba413033a22
SHA512a307f71ea960b003a14d89701d49f66c209a0af6f3d76f588467c8b46ec79c0345ff115958ebde4e2842e07a170b4b9321e1ec8147bedde121fcbb73d8507ed5