Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 09:53
Static task
static1
Behavioral task
behavioral1
Sample
04ec53a1c638d330d93daf8b7bfaadad_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
04ec53a1c638d330d93daf8b7bfaadad_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
04ec53a1c638d330d93daf8b7bfaadad_JaffaCakes118.exe
-
Size
96KB
-
MD5
04ec53a1c638d330d93daf8b7bfaadad
-
SHA1
c4c17dd3d907e2482abce5577b32b53ced7112b2
-
SHA256
1579be2c9e38abc5bcbeffc11285886aab4c535e83ed002b1866ba4ed79f95fd
-
SHA512
bfb95ed883e813abf582983043845667699b7f131cd6cdc52bd616c009827f490f8157a0610586259af4f91d4763cf5fb9d479e5bcb0e4cc5b057dd04bf2a524
-
SSDEEP
1536:WUsuXxpfTtbrO/A5HN+TOC+eWmcJ9J+r3:6ITtx+R+PJ8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1016 inl5591.tmp -
Loads dropped DLL 2 IoCs
pid Process 2436 04ec53a1c638d330d93daf8b7bfaadad_JaffaCakes118.exe 2436 04ec53a1c638d330d93daf8b7bfaadad_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.app.log rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5BF65FC1-2EEB-11EF-805B-F637117826CF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1500 reg.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 2492 rundll32.exe Token: SeRestorePrivilege 2492 rundll32.exe Token: SeRestorePrivilege 2492 rundll32.exe Token: SeRestorePrivilege 2492 rundll32.exe Token: SeRestorePrivilege 2492 rundll32.exe Token: SeRestorePrivilege 2492 rundll32.exe Token: SeRestorePrivilege 2492 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 1492 IEXPLORE.EXE 1492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2436 wrote to memory of 316 2436 04ec53a1c638d330d93daf8b7bfaadad_JaffaCakes118.exe 31 PID 2436 wrote to memory of 316 2436 04ec53a1c638d330d93daf8b7bfaadad_JaffaCakes118.exe 31 PID 2436 wrote to memory of 316 2436 04ec53a1c638d330d93daf8b7bfaadad_JaffaCakes118.exe 31 PID 2436 wrote to memory of 316 2436 04ec53a1c638d330d93daf8b7bfaadad_JaffaCakes118.exe 31 PID 316 wrote to memory of 768 316 cmd.exe 33 PID 316 wrote to memory of 768 316 cmd.exe 33 PID 316 wrote to memory of 768 316 cmd.exe 33 PID 316 wrote to memory of 768 316 cmd.exe 33 PID 768 wrote to memory of 2248 768 cmd.exe 35 PID 768 wrote to memory of 2248 768 cmd.exe 35 PID 768 wrote to memory of 2248 768 cmd.exe 35 PID 768 wrote to memory of 2248 768 cmd.exe 35 PID 768 wrote to memory of 2492 768 cmd.exe 36 PID 768 wrote to memory of 2492 768 cmd.exe 36 PID 768 wrote to memory of 2492 768 cmd.exe 36 PID 768 wrote to memory of 2492 768 cmd.exe 36 PID 768 wrote to memory of 2492 768 cmd.exe 36 PID 768 wrote to memory of 2492 768 cmd.exe 36 PID 768 wrote to memory of 2492 768 cmd.exe 36 PID 768 wrote to memory of 332 768 cmd.exe 37 PID 768 wrote to memory of 332 768 cmd.exe 37 PID 768 wrote to memory of 332 768 cmd.exe 37 PID 768 wrote to memory of 332 768 cmd.exe 37 PID 2248 wrote to memory of 1492 2248 iexplore.exe 39 PID 2248 wrote to memory of 1492 2248 iexplore.exe 39 PID 2248 wrote to memory of 1492 2248 iexplore.exe 39 PID 2248 wrote to memory of 1492 2248 iexplore.exe 39 PID 332 wrote to memory of 1500 332 cmd.exe 40 PID 332 wrote to memory of 1500 332 cmd.exe 40 PID 332 wrote to memory of 1500 332 cmd.exe 40 PID 332 wrote to memory of 1500 332 cmd.exe 40 PID 332 wrote to memory of 324 332 cmd.exe 41 PID 332 wrote to memory of 324 332 cmd.exe 41 PID 332 wrote to memory of 324 332 cmd.exe 41 PID 332 wrote to memory of 324 332 cmd.exe 41 PID 332 wrote to memory of 324 332 cmd.exe 41 PID 332 wrote to memory of 324 332 cmd.exe 41 PID 332 wrote to memory of 324 332 cmd.exe 41 PID 2436 wrote to memory of 1016 2436 04ec53a1c638d330d93daf8b7bfaadad_JaffaCakes118.exe 42 PID 2436 wrote to memory of 1016 2436 04ec53a1c638d330d93daf8b7bfaadad_JaffaCakes118.exe 42 PID 2436 wrote to memory of 1016 2436 04ec53a1c638d330d93daf8b7bfaadad_JaffaCakes118.exe 42 PID 2436 wrote to memory of 1016 2436 04ec53a1c638d330d93daf8b7bfaadad_JaffaCakes118.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\04ec53a1c638d330d93daf8b7bfaadad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\04ec53a1c638d330d93daf8b7bfaadad_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\lua\1.bat3⤵
- Suspicious use of WriteProcessMemory
PID:768 -
C:\PROGRA~1\INTERN~1\iexplore.exeC:\PROGRA~1\INTERN~1\IEXPLORE.EXE http://www.cnkankan.com/?821334⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1492
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\lua\1.inf4⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\lua\2.bat4⤵
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Associations /v ModRiskFileTypes /t REG_SZ /d .bat /f5⤵
- Modifies registry key
PID:1500
-
-
C:\Windows\SysWOW64\gpupdate.exegpupdate /force5⤵PID:324
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\inl5591.tmpC:\Users\Admin\AppData\Local\Temp\inl5591.tmp2⤵
- Executes dropped EXE
PID:1016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
915B
MD5be85f25f9b7db8406cd5355970ab35a4
SHA19b3dda905d2e30940e7205846195b2d7b6636747
SHA256fa23240bc8f6b3bfe2622188299e24aa286ab3d27ba0e40358f8893926a6dc59
SHA5128418f4d3dca7002394e8d538d90bfe05582a2ee4b10f8526c3cbb87c8a512ee606afd0172eaf57e47bde21c0129b53a740c4e5a5ed1efa205316edc5e9ab9ea2
-
Filesize
50B
MD5e08ad52d3d132292f9c51e7cfec5fe08
SHA1269f7eb185a9ff02664297bfb6f5df9f86ec10f0
SHA256bd2a3003fb1f771283b30a044c49aecb72bfdff4322330337dba4992ecd198f4
SHA5123dc0331f3ee9a57de7bda71a94953239bc7033a130f2b783b35d17ce3ed7b7928c154323d10ba81bd81d3bfd2d7c123cec55f5178d2b44286c2f857ccd6a1722
-
Filesize
2KB
MD5d720afa7c1bc6d67157c1fc5e1804f5f
SHA1372cb41239edb1f4452a67b2c116cd4016b0f608
SHA256fa0eaebd30bad6d62a875ff2bbd6861750cdf63ef811e620d95584337d8805e3
SHA5121f4b6dffc79fbdac3868dbd9c9654374eaf28600053dcf041dcc0bbfdfb7d6610d29b8edabf0a88d3d298e8877f927c6f0600fca41ccb1e7d4aaed44ea1d3f1e
-
Filesize
263B
MD549867388978209a322cce5e58881aaf0
SHA16f5e5702dfdd03349533784e36611015fda96484
SHA256c37541cb88ecb332271fbda8f2b140d27627a898f2f2bf156b8a94ce5fefd0a8
SHA512d7445933e5b4979007ac0c63d24f6d34949bc45d6595da2f2f146dcc372775f23e676f15635fd96f87a5d87668f5722e0fc494a3ca71c81b55ab1daab116f5f1
-
Filesize
410B
MD566a1f0147fed7ddd19e9bb7ff93705c5
SHA19d803c81ea2195617379b880b227892ba30b0bf6
SHA2564f45ce85e221352f7fe26e04968c7f7267dc24b55cf2b72b929b4c90e48cb764
SHA512cfe51756ddec75d240249980a4d27870d15983add25058e4d0da4d8a3ea11384d4d228d6cbc95091f91e516e1ab4dfb1e315941dbd95bf717d4b31936311d597
-
Filesize
8KB
MD57b2cc87165c7598cd390c0f7cf4d6717
SHA104fd7ce74a29e2df543b9f3eca0bf8f82064f5af
SHA2564f9d55cf344b944fd73ed63560ee9bf9130f124d593502b5a67abab2586bcd62
SHA5120d8ca7b61c3a1d69b571063c2d43b623f2fac296e8f9c0dda1103212546632356aeaac6b21de1097ed54682aeccd5a68d8ef08f03f6ad0fc2bd386c7f52bc996