Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 05:28
Static task
static1
Behavioral task
behavioral1
Sample
387d731a37f6ce86ea1b7e3507edacd5_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
387d731a37f6ce86ea1b7e3507edacd5_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
387d731a37f6ce86ea1b7e3507edacd5_JaffaCakes118.exe
-
Size
9.9MB
-
MD5
387d731a37f6ce86ea1b7e3507edacd5
-
SHA1
34a8fe589b8cd90b8f2d7bb6245f4085a742d6e8
-
SHA256
28a21448d2c149184f9e11a3d674eb0d0ce49dc0e2fd63182da2d0aff0be05ad
-
SHA512
a6ca16244fdddfa58f37237571afaa4c5abc51d625f27a505256d2137bbf40036f32e30a89bdd7f8a75158e66a5b0abd22a5b380369f00f991eee5ace5039a8b
-
SSDEEP
196608:O5aFmOjdHFsiKRp8Q0XCEfiuvgxYIdpXcPEY6IR89i2B0vXMeBBjpqj8+19u/3j:O5at3Q0yyp3nFG9iUDzu/z
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 3024 mshta.exe -
Executes dropped EXE 1 IoCs
pid Process 1804 DriverPack.exe -
Loads dropped DLL 4 IoCs
pid Process 872 wscript.exe 1804 DriverPack.exe 1804 DriverPack.exe 1804 DriverPack.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Styles\MaxScriptStatements = "4294967295" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_SSLUX\mshta.exe = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SSLUX reg.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Styles reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Styles\MaxScriptStatements = "4294967295" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_NINPUT_LEGACYMODE reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_SSLUX\mshta.exe = "1" reg.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Styles reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_NINPUT_LEGACYMODE\mshta.exe = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SSLUX reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING reg.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_GPU_RENDERING\mshta.exe = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_NINPUT_LEGACYMODE reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Styles\MaxScriptStatements = "4294967295" reg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Styles reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_GPU_RENDERING\mshta.exe = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_NINPUT_LEGACYMODE\mshta.exe = "0" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Styles\MaxScriptStatements = "4294967295" reg.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Styles reg.exe -
Modifies registry class 16 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.html\Content Type = "text/html" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.css reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\Content Type = "text/html" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\Content Type = "application/javascript" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\Content Type = "text/html" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\Content Type = "application/javascript" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.html reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.css\Content Type = "text/css" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.html reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.css reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.css\Content Type = "text/css" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.html\Content Type = "text/html" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js reg.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1684 387d731a37f6ce86ea1b7e3507edacd5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1684 wrote to memory of 872 1684 387d731a37f6ce86ea1b7e3507edacd5_JaffaCakes118.exe 28 PID 1684 wrote to memory of 872 1684 387d731a37f6ce86ea1b7e3507edacd5_JaffaCakes118.exe 28 PID 1684 wrote to memory of 872 1684 387d731a37f6ce86ea1b7e3507edacd5_JaffaCakes118.exe 28 PID 1684 wrote to memory of 872 1684 387d731a37f6ce86ea1b7e3507edacd5_JaffaCakes118.exe 28 PID 872 wrote to memory of 1804 872 wscript.exe 29 PID 872 wrote to memory of 1804 872 wscript.exe 29 PID 872 wrote to memory of 1804 872 wscript.exe 29 PID 872 wrote to memory of 1804 872 wscript.exe 29 PID 872 wrote to memory of 1804 872 wscript.exe 29 PID 872 wrote to memory of 1804 872 wscript.exe 29 PID 872 wrote to memory of 1804 872 wscript.exe 29 PID 1804 wrote to memory of 2608 1804 DriverPack.exe 30 PID 1804 wrote to memory of 2608 1804 DriverPack.exe 30 PID 1804 wrote to memory of 2608 1804 DriverPack.exe 30 PID 1804 wrote to memory of 2608 1804 DriverPack.exe 30 PID 1804 wrote to memory of 2608 1804 DriverPack.exe 30 PID 1804 wrote to memory of 2608 1804 DriverPack.exe 30 PID 1804 wrote to memory of 2608 1804 DriverPack.exe 30 PID 2608 wrote to memory of 108 2608 cmd.exe 32 PID 2608 wrote to memory of 108 2608 cmd.exe 32 PID 2608 wrote to memory of 108 2608 cmd.exe 32 PID 2608 wrote to memory of 108 2608 cmd.exe 32 PID 2608 wrote to memory of 108 2608 cmd.exe 32 PID 2608 wrote to memory of 108 2608 cmd.exe 32 PID 2608 wrote to memory of 108 2608 cmd.exe 32 PID 2608 wrote to memory of 1644 2608 cmd.exe 33 PID 2608 wrote to memory of 1644 2608 cmd.exe 33 PID 2608 wrote to memory of 1644 2608 cmd.exe 33 PID 2608 wrote to memory of 1644 2608 cmd.exe 33 PID 1804 wrote to memory of 3024 1804 DriverPack.exe 34 PID 1804 wrote to memory of 3024 1804 DriverPack.exe 34 PID 1804 wrote to memory of 3024 1804 DriverPack.exe 34 PID 1804 wrote to memory of 3024 1804 DriverPack.exe 34 PID 1804 wrote to memory of 3024 1804 DriverPack.exe 34 PID 1804 wrote to memory of 3024 1804 DriverPack.exe 34 PID 1804 wrote to memory of 3024 1804 DriverPack.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\387d731a37f6ce86ea1b7e3507edacd5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\387d731a37f6ce86ea1b7e3507edacd5_JaffaCakes118.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\bin\tools\start.js" ""C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DriverPack.exe" --sfx "387d731a37f6ce86ea1b7e3507edacd5_JaffaCakes118.exe""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DriverPack.exe"C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DriverPack.exe" --sfx 387d731a37f6ce86ea1b7e3507edacd5_JaffaCakes118.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c Tools\init.cmd "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\bin\Tools\run.hta" "--sfx" "387d731a37f6ce86ea1b7e3507edacd5_JaffaCakes118.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\reg.exereg import C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\bin\tools\\patch.reg5⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:108
-
-
C:\Windows\system32\reg.exeC:\Windows\sysnative\reg.exe import C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\bin\tools\\patch.reg5⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:1644
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\bin\Tools\run.hta" "--sfx" "387d731a37f6ce86ea1b7e3507edacd5_JaffaCakes118.exe"4⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
PID:3024
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD5bea0e0db0118ad8ad5ebd72b79c5ce4a
SHA15ebd53b83ce9372c8111127109f1270efe6fb524
SHA25678fae8f4014baf3b063d44a46dca6109e7483b3e5ca27187394a68bd959599e7
SHA512dda0fb66c39ca1f9b0837cedfdcb562c68d1d3b8ec81868e5c0d4f98b4a3a0072b7f479bcb2ca598bc01503db1eb9fc0da723dfb4081d7f3bebd5f8d858d8186
-
Filesize
4KB
MD542e912c38ef16cdbc7cb6b1f0de61fde
SHA1d98922fb3f2684b0a418acfc30e128a996311bce
SHA2563d2315de58a5d3c3a4412cec1e426751fb0f7657f27c22254006e23cea3bbad9
SHA512676f72f1ba240a32975ebaecf026fc77623032fd8c68d261333e7b028826f77f037a5f2bec767639a898e20acfaf31d5b103428ee249023ad75ec43c0e6f9b35
-
Filesize
24KB
MD573c365efc22f21785caf62a83c563da0
SHA121880c3e6370cb9c50fbc37e656bf1f755750801
SHA256a0a78539cf3889eaaf2aba62fdc85addf4c31420eebbfb51fc70ff41efadc69a
SHA5123f025bc4db604d631763b73c1b7bb967b3e70696c5b15679d8570f950a474c67bd0686ffec416831c23e877c1ef273644a040e86f2d893b49fb88b5ab44c0cf4
-
Filesize
852B
MD52d07f324a539ade610cd86f3788db114
SHA1c898927fe8eddab9997daefe21241ed211221676
SHA25620692738398af39ee4c65eda97b70f65466baaccd1c12eefc26e632f505b68a5
SHA51212a2e9cb3de9ce4113b85c54bc6a0845f604608a9383ffebba7a3fe00c34b18061865f600f134d35d0ab59cf4fd9f755c8d73c738c255106d53d573d7ea0218a
-
Filesize
1KB
MD50067963efff86f2d5fb4f792cf68021a
SHA1eeb5eb6d94c962bc5cd94bfce7306e8fafb160f4
SHA256f8233bfffe778f8aa2b90856298b84f296b3bf8dc0547b11afa538a3c3081fb3
SHA512d7417e2d35c0894b8fc154b216466522b1b0ae9ea274a63431afbc90e43f026cf647455e885cc767f2d8253693f01c8bdd618e018ddd26bac9b465b1af8b89b7
-
Filesize
147KB
MD5afbb5c813add5d4df9b32419e6a89834
SHA18b1d61ac66c59e7eb581453b2c5a9d20452e7f27
SHA2560d6e11be55def7b6f817cff2738e21de9301ad0836e89d124a46f72a64b18eed
SHA512b0979605cc7898c6fd3435a27b5d2003e5d75c9aa02aac24cc59f755dcbdead55a5a74a1cfe0199479c11e2cf355035bbf7051f1841775e53d955af0877812ca
-
Filesize
641B
MD574e9ebec2b365366755028ac89031400
SHA151e302935661398c53cb3e8fa11d4b874c6df78a
SHA2569a6abb737e513937865aba2d2db103c9baeac030934b522093b7905d4815c332
SHA512837ab265038703b7b0d5333e9e74977d54c58a050a8128a9127a2a4e482ea6623e4e866aa53638c72ec3111dbd1924958c1bad536003715a883e6dab87e5bb57
-
Filesize
15KB
MD52866dec4af17828efaca8596942635ca
SHA12e9faa8a9b5b05d3807daf543e29cf0403e8b969
SHA256cdd2679eaffd10b67894aeec93de1f34dc56038b63feb59c1fcf54d42c590903
SHA512419d8bfb46b6749eb9739e1121ea62764cc1d24ba187e217b8e18b09ed89a5ef7ebe2b114959caad11f21a999151461ffff0a1c3d507a190bf123c49b792e46d
-
Filesize
18KB
MD5a90e737d05ebfa82bf96168def807c36
SHA1ddc76a0c64ebefe5b9a12546c59a37c03d5d1f5b
SHA25624ed9db3eb0d97ecf1f0832cbd30bd37744e0d2b520ccdad5af60f7a08a45b90
SHA512bf1944b5daf9747d98f489eb3edbae84e7bc29ff50436d6b068b85091c95d17fe15b721df0bff08df03232b90b1776a82539d7917599b0a3b2f2f299e7525a51
-
Filesize
127KB
MD528396d494d3c7eafb997e1a46c911381
SHA16365d24ee9f35fe447f794e55f902e47a8cd141b
SHA256f6a61e9413bcfc77cd8a23efc84a96eaa60b769e9cae365dd420e767c629120c
SHA51242e4b6d13a3a3f4f7f2c9e9b07180d9e4c69b3d533998893f89c48d7a1da5fe68fd272eb5316c3789c5a011dc71cf0c08177f040f38caa4a72af560739387ff2
-
Filesize
3KB
MD543be5aa6135f7656e2b9ee162479fde2
SHA1384d58c9712a1d8248c442d596aa604f04c6e028
SHA25671557ad30e5e02aa551ff8edc29deb83aaae949f31da9151d3e476d67d2a1a4b
SHA512c51e80ee9d5ef1de0eb8244670437320e66036fe277afb669721982d23c2578ff4ce28b6f3cabf8256b39ce391df1c7e335008b0abca795d9c0884082ad21f4a
-
Filesize
270KB
MD532dd27de70fca65ac73a1f9835d8f0c3
SHA1989935a10a8b1d7c3f1334ef2db8b57c7fe9bf7b
SHA25662c56826e747553724ce3881eb3f9a367664a8d8172593286e9511496c6640d1
SHA512974461c8ada004d18c12ecc67cb7e075488043cfdd1e7ee5589cb7c1c9d6e85bab31ef5d09a9c3f1aa56e7eb6b8e97774ab9165d097f2ca0c1cba7c7c855cc2c
-
Filesize
2KB
MD5f1f2c06d2d6bba1b321ce0386799b154
SHA1a4b480a399005eaefee6876cf2e6711466db6921
SHA25681224a285ee25bddb07018336a2434d947c572e92a26aee567be0401b7726892
SHA512245f70f9786303cf5ea214ef0e3627dacbf3bcf1eb742c0e9d44210f2bc9f3f7ab4b827600ebafdba6877d712db5489481a142f971cb3f6b0183b1a55b8b4640
-
Filesize
1KB
MD55e520ad7be996e01e1f57a5dcffb0148
SHA1faa0f75bcf42d21250e3aefc5884216d03637dab
SHA2567bb97b440e949b13feaf9e104be287c950cf87a14ea3ba5af4199fd15e2da581
SHA5125ad1657c4de30aa5f97becb0db63ad7e5f5b92ee9ba694cc528203abca974736c6ed3c7d051b6adb9db003caf8b0b8001d8e2dc0b2ebff0f98713f88552f02ae
-
Filesize
137B
MD5efa95ffb77bc168aeac2a61273fe81b3
SHA1f10a049e592245e0441d87ef87a72b13f836ee61
SHA256abb7b821325c0cd80b188f29b4f00e6a669673e5e036379088ef85d164e4c81e
SHA51231ff4c980f6ebfe030c56448da4d14634a13c995dd3e54b173aa712ed9ce831a2fd8911358fcc75dce3ef3150a252f9eee34cffd5becae4e254346fd38914bea