Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19/06/2024, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
01132c2907ff7c7dbe22dc481ff3cc2f_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
01132c2907ff7c7dbe22dc481ff3cc2f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
01132c2907ff7c7dbe22dc481ff3cc2f_JaffaCakes118.exe
-
Size
51KB
-
MD5
01132c2907ff7c7dbe22dc481ff3cc2f
-
SHA1
5577d2717071bcd54025d280bd37acd4d5004abf
-
SHA256
3ff58c6d73a166df5ab7b9a34b01b3e8643e39814d630e8b6f89fa256747cdc6
-
SHA512
aa8d0e10e948b3e67180fc4f7052d3ef600770aeb69ba78c422849ff260f137f724f3f87d83e84d1df7e5fcd894fa7072ebf2061e46083819b727ec630e01353
-
SSDEEP
768:dwxr9lVQ+7eFIAbNCgRPmAbDC9vKDQvVFtyLsvjBhH2xROa30FToI7Ng8cr:C7euAbNfPmAKU2FtygvSjOO0FkI5g8cr
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 01132c2907ff7c7dbe22dc481ff3cc2f_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation inl667A.tmp -
Executes dropped EXE 1 IoCs
pid Process 3656 inl667A.tmp -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\WinRAR\rarExts32.dat 01132c2907ff7c7dbe22dc481ff3cc2f_JaffaCakes118.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\LOGS\DPX\setupact.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setuperr.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setupact.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setuperr.log expand.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078f1237f04e5404da848d5bad8ef862600000000020000000000106600000001000020000000754af97ca24e22ae7a5096fc3c44ef4ec737dacb5a9279a5db5b17d5dc10fc1c000000000e8000000002000020000000b8feb009de3ef1955d6c65f1e7165ef998f52a8f76c2cd7ebff9c716464ab11b20000000c767e7e3ce7e87d177e60b8bc43837bca4b07caebe509d4203080750aba54645400000006ae2605be0047b8f99bf4f1dc44b77e3c5340c00dbdcdcfb7d788ed75928f0871151e9c34f8194ffbb4573c3c60756b3764828f21bd021853b6d202c7e9164e8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0fc9c0b9ec2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1016910b9ec2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078f1237f04e5404da848d5bad8ef8626000000000200000000001066000000010000200000004d1d9da5c7b2479ad2efc0b7c2e7bdc0951bbb337676a86dd08b03bf4707491f000000000e800000000200002000000009197f9c069438810d0b629d24ff98d8911a8a2a81efbe41b28e45af92472a7a20000000774e021fac4e3cf67e55193105dbd002d5a6df33ad949bf7d8752f5974158bfb40000000c3de8a070b3bde7b0195df7229e09486157862faa50be9f426a26b12128f0c3bc501a71e3e1a226347edd0fd4884c37de41457cbeee7503be3e2e2befc9c3c7a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{2FD801AB-2E91-11EF-9519-66D3FDB32ECD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425000536" iexplore.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 788 01132c2907ff7c7dbe22dc481ff3cc2f_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3656 inl667A.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3588 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3588 iexplore.exe 3588 iexplore.exe 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 788 wrote to memory of 3100 788 01132c2907ff7c7dbe22dc481ff3cc2f_JaffaCakes118.exe 85 PID 788 wrote to memory of 3100 788 01132c2907ff7c7dbe22dc481ff3cc2f_JaffaCakes118.exe 85 PID 788 wrote to memory of 3100 788 01132c2907ff7c7dbe22dc481ff3cc2f_JaffaCakes118.exe 85 PID 788 wrote to memory of 3696 788 01132c2907ff7c7dbe22dc481ff3cc2f_JaffaCakes118.exe 86 PID 788 wrote to memory of 3696 788 01132c2907ff7c7dbe22dc481ff3cc2f_JaffaCakes118.exe 86 PID 788 wrote to memory of 3696 788 01132c2907ff7c7dbe22dc481ff3cc2f_JaffaCakes118.exe 86 PID 788 wrote to memory of 1928 788 01132c2907ff7c7dbe22dc481ff3cc2f_JaffaCakes118.exe 89 PID 788 wrote to memory of 1928 788 01132c2907ff7c7dbe22dc481ff3cc2f_JaffaCakes118.exe 89 PID 788 wrote to memory of 1928 788 01132c2907ff7c7dbe22dc481ff3cc2f_JaffaCakes118.exe 89 PID 3696 wrote to memory of 3228 3696 cmd.exe 91 PID 3696 wrote to memory of 3228 3696 cmd.exe 91 PID 3696 wrote to memory of 3228 3696 cmd.exe 91 PID 1928 wrote to memory of 3632 1928 cmd.exe 92 PID 1928 wrote to memory of 3632 1928 cmd.exe 92 PID 1928 wrote to memory of 3632 1928 cmd.exe 92 PID 3100 wrote to memory of 3656 3100 cmd.exe 93 PID 3100 wrote to memory of 3656 3100 cmd.exe 93 PID 3100 wrote to memory of 3656 3100 cmd.exe 93 PID 788 wrote to memory of 3588 788 01132c2907ff7c7dbe22dc481ff3cc2f_JaffaCakes118.exe 95 PID 788 wrote to memory of 3588 788 01132c2907ff7c7dbe22dc481ff3cc2f_JaffaCakes118.exe 95 PID 788 wrote to memory of 4868 788 01132c2907ff7c7dbe22dc481ff3cc2f_JaffaCakes118.exe 96 PID 788 wrote to memory of 4868 788 01132c2907ff7c7dbe22dc481ff3cc2f_JaffaCakes118.exe 96 PID 788 wrote to memory of 4868 788 01132c2907ff7c7dbe22dc481ff3cc2f_JaffaCakes118.exe 96 PID 3588 wrote to memory of 2284 3588 iexplore.exe 98 PID 3588 wrote to memory of 2284 3588 iexplore.exe 98 PID 3588 wrote to memory of 2284 3588 iexplore.exe 98 PID 3656 wrote to memory of 2508 3656 inl667A.tmp 99 PID 3656 wrote to memory of 2508 3656 inl667A.tmp 99 PID 3656 wrote to memory of 2508 3656 inl667A.tmp 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\01132c2907ff7c7dbe22dc481ff3cc2f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\01132c2907ff7c7dbe22dc481ff3cc2f_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\run_dws_file.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\inl667A.tmpC:\Users\Admin\AppData\Local\Temp\inl667A.tmp ojj-gmlpo.tmp3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inl667A.tmp > nul4⤵PID:2508
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext_favurl_cab.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\SysWOW64\expand.exeexpand.exe "C:\Users\Admin\AppData\Local\Temp\favorites_url.cab" -F:*.* "C:\Users\Admin\Favorites"3⤵
- Drops file in Windows directory
PID:3228
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext_deskurl_cab.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\expand.exeexpand.exe "C:\Users\Admin\AppData\Local\Temp\desktop_url.cab" -F:*.* "C:\Users\Admin\Desktop"3⤵
- Drops file in Windows directory
PID:3632
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://tc.92mh.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3588 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2284
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\01132C~1.EXE > nul2⤵PID:4868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
827B
MD56af2bb403abe2507dbe4544cd3da167e
SHA13e3d8610765761db0c0c9596764228395d82bd21
SHA256e6b475685c514276691436256a1aa0463a500465a8602f0093e215a5c612cf8b
SHA51285e58c25978b4de667cdb2343edabd30b3e7b59528a7f6efce0c19b1fb452d33a7f0f586fbf0b580893b5fc8cddee07bba8c065154224862a7e905b54ef6a419
-
Filesize
59B
MD5d23854dd62bbe723ae72e15951884b5b
SHA1c3d8cca8db6a68589aca1aa22d19b6632ff7a01f
SHA256ec72f4926c2735ed48eaf66746c349ec158423e072237a5bd176656bed02fad2
SHA512720c47a425f0294712af5233e9aa7e549d70fceaa37759e7512358dd475ce24eb45a58c244ddccc603aebeec50e5c24c03f21c99295e305b4927b11e7f04813a
-
Filesize
94B
MD5d5fc3a9ec15a6302543438928c29e284
SHA1fd4199e543f683a8830a88f8ac0d0f001952b506
SHA256b2160315eb2f3bcb2e7601e0ce7fbb4ed72094b891d3db3b5119b07eeccc568d
SHA5124d0378480f1e7d5bee5cf8f8cd3495745c05408785ab687b92be739cd64c077f0e3ee26d6d96e27eb6e2c3dec5f39a2766c45854dc2d6a5b6defc672aeafa0f9
-
Filesize
98B
MD58663de6fce9208b795dc913d1a6a3f5b
SHA1882193f208cf012eaf22eeaa4fef3b67e7c67c15
SHA2562909ea8555f2fc19097c1070a1da8fcfd6dc6886aa1d99d7e0c05e53feeb5b61
SHA5129381063e0f85e874be54ae22675393b82c6ab54b223090148e4acbeff6f22393c96c90b83d6538461b695528af01d1f1231cf5dc719f07d6168386974b490688
-
Filesize
154B
MD58d681a59ea75e91f730bd9ce3c42e514
SHA19d426029daeebf03c9053761e0e5a9f447f98e9c
SHA256afd3d42faa66d6703a32f2f5b41e0d679dd8210aacb284d1e46854207087cac7
SHA512ffece212187fb127e98a612a59e7f2df7e9ebc6fee600644e2eef80d62fcc7d411ffba435b48981c4d75ba0ca34f85ff57091f4098104651710220a28a13ba8d
-
Filesize
155B
MD55a17106c27138df10448c2c3be95f399
SHA156acc2ed4fea4171127a13dcdee08bdd39d674d6
SHA256c544ab13bd785ea3d5792873dedb102e87ea9a3b28fb1283be2eaac363ce360c
SHA5121d8839f36323dfb4458745dbf31a98bc676121db3e4ccda59ca8e177437c85a5811125119fbfa3b5bcde6c2fbf25ae910109e785e276c32fbfebe6437aea8198
-
Filesize
156B
MD58a275b261afcc166671132b6f03831e4
SHA103ac21edc1de2df748ee3a301a6b3de989c423c3
SHA2560296e167f4cfe36275cf1a705a6c56b30b15c0712ec5904b4ed3299f07beee8e
SHA512269cf3d57201d9c390cef3a8e74d63036d300ff464d20b419324d4575c04e004655179ac29da5e3b2b52a5e2b6f37ecbf6e512fa0c2c5d5af0c5a359af51d739
-
Filesize
158B
MD5d645085ab92574a2a17abd323415dde5
SHA149ebaa4499cacd9256f270f35f31684b7cd195b1
SHA25641ef37f97f886f32ec9e4d9ebf58079442d8bc8b102e9487de2f3f7da36e8058
SHA512a726352ef7725eb8f94609dc3b80b5314387416513e654487e6a0b96bab922412b15bfbc07f1643bc104543be7c4c8a1b1472374d8cfe7fa9a010d28a135d654
-
Filesize
157B
MD5993f72a439a3301caeb969c7faa7a8b9
SHA1176244349a0463cd0fc38cad426d89dc3b055311
SHA256b7ea84a9d48f22c799c3c3b96f29f0ae7c1b274e6402d6fbadae31fc053f2140
SHA512c373b12c16c65e966593990019b3a2fd96f703820976835c7ab3d042a997f617f49c1b5110e77833a18b3d2a2bef8fd3a97e77ea05dd7cdce9053840398320d8
-
Filesize
443B
MD501f8b2509f3844f8c6e8e198555d3ffb
SHA155b531078457f8a5583180b018b178f5294f6fcf
SHA256ab9b1350f19e5c3bcec4b6302ea996a20b07db71cc4f99d46d7b9314f208597e
SHA51298b2e3198935d14a6730d9e1dd22dd9f1c6fc692d5052aef9cde84f6745bde36bec984ea7dca2ada001423416eb6c9eac670dada67fe19c9ccccda83c504bd5d
-
Filesize
425B
MD5da68bc3b7c3525670a04366bc55629f5
SHA115fda47ecfead7db8f7aee6ca7570138ba7f1b71
SHA25673f3605192b676c92649034768378909a19d13883a7ea6f8ba1b096c78ffadb5
SHA5126fee416affcb6a74621479697bca6f14f5429b00de3aa595abe3c60c6b2e094877b59f8783bbe7bdd567fa565d0630bb02def5603f8f0ea92fe8f2c3ac5383c0