Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
23eb0606337e465b935f2a658a79c2f7_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
23eb0606337e465b935f2a658a79c2f7_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
23eb0606337e465b935f2a658a79c2f7_JaffaCakes118.exe
-
Size
710KB
-
MD5
23eb0606337e465b935f2a658a79c2f7
-
SHA1
d22cecd84490c81346ce91ed73bb463ca4ec71cd
-
SHA256
e6960a78f226ab8745fb699c0370a83125495f4a9746e049d7fcc3f7a70e7d4c
-
SHA512
2c5186c8b0741257248aaa217235dff3d671ea5ea8ae6d2c47d76eb066fc88e99ee4aad541c408e6e6a24d0dd1f37b6253283331cf59081afbb677c8a1bde4db
-
SSDEEP
12288:K24Fgorajo1spSFEbSZd/rwkbvaJZg57slaBwhWvN4PeaJQhK:KLOorowFEe5waycolXMvN4Gns
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2836 hake.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_hake.exe hake.exe File opened for modification C:\Windows\SysWOW64\_hake.exe hake.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2836 set thread context of 224 2836 hake.exe 82 PID 2836 set thread context of 4680 2836 hake.exe 83 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\Delet.bat 23eb0606337e465b935f2a658a79c2f7_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\hake.exe 23eb0606337e465b935f2a658a79c2f7_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\hake.exe 23eb0606337e465b935f2a658a79c2f7_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1572 224 WerFault.exe 82 -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31116708" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31116708" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2324083249" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{B5DF27FC-3997-11EF-9519-46FD0705B728} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426815897" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2321738838" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31116708" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2321738838" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4680 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4680 IEXPLORE.EXE 4680 IEXPLORE.EXE 1268 IEXPLORE.EXE 1268 IEXPLORE.EXE 1268 IEXPLORE.EXE 1268 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2836 1876 23eb0606337e465b935f2a658a79c2f7_JaffaCakes118.exe 81 PID 1876 wrote to memory of 2836 1876 23eb0606337e465b935f2a658a79c2f7_JaffaCakes118.exe 81 PID 1876 wrote to memory of 2836 1876 23eb0606337e465b935f2a658a79c2f7_JaffaCakes118.exe 81 PID 2836 wrote to memory of 224 2836 hake.exe 82 PID 2836 wrote to memory of 224 2836 hake.exe 82 PID 2836 wrote to memory of 224 2836 hake.exe 82 PID 2836 wrote to memory of 224 2836 hake.exe 82 PID 2836 wrote to memory of 224 2836 hake.exe 82 PID 2836 wrote to memory of 4680 2836 hake.exe 83 PID 2836 wrote to memory of 4680 2836 hake.exe 83 PID 2836 wrote to memory of 4680 2836 hake.exe 83 PID 1876 wrote to memory of 2780 1876 23eb0606337e465b935f2a658a79c2f7_JaffaCakes118.exe 85 PID 1876 wrote to memory of 2780 1876 23eb0606337e465b935f2a658a79c2f7_JaffaCakes118.exe 85 PID 1876 wrote to memory of 2780 1876 23eb0606337e465b935f2a658a79c2f7_JaffaCakes118.exe 85 PID 4680 wrote to memory of 1268 4680 IEXPLORE.EXE 89 PID 4680 wrote to memory of 1268 4680 IEXPLORE.EXE 89 PID 4680 wrote to memory of 1268 4680 IEXPLORE.EXE 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\23eb0606337e465b935f2a658a79c2f7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\23eb0606337e465b935f2a658a79c2f7_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\hake.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\hake.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 124⤵
- Program crash
PID:1572
-
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4680 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1268
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\Delet.bat""2⤵PID:2780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 224 -ip 2241⤵PID:3772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5eae7a71d200930670779f22e7f6fa100
SHA1b595d77a1d2c7410797bc880902c10495abf3b2e
SHA256ecaeeb3f053c017f978a1bd7f2e0eabd5cc9409c1cbb9faa9e6aeeca07e89288
SHA512c19b6c64cede2516be849ded28e43b6c4fff00b760601c7b74be8195aad49aa01419ead6e838adeee0e66114ad513b7a0651f0ed26b8d558231345b06d5f11da
-
Filesize
710KB
MD523eb0606337e465b935f2a658a79c2f7
SHA1d22cecd84490c81346ce91ed73bb463ca4ec71cd
SHA256e6960a78f226ab8745fb699c0370a83125495f4a9746e049d7fcc3f7a70e7d4c
SHA5122c5186c8b0741257248aaa217235dff3d671ea5ea8ae6d2c47d76eb066fc88e99ee4aad541c408e6e6a24d0dd1f37b6253283331cf59081afbb677c8a1bde4db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD563a2d2b4cdc269762fe4bdb8cdfde7f8
SHA15cce14e5285ce9844b164d37de9f4ad0acc7880f
SHA2568e323e0354939fd301d8db011a0b007476c93e0e048100922e3e59e34b04f716
SHA512db3b35b23c3088fdf8f5215d8f9149e717d871be0c7b69541aba232e6f829e18d9d074b53f173387985a3ba4df1c016ec5b75f4387d6123c6c1ba3113c43dec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD57fe8300240b4bf4f21c396877759b6e8
SHA1ff88303deab30627a970ff0e6703adee0cef9824
SHA2563668293b22291c99c8cdccf79e97d425db9d6489c1e21237b9440268a23d0cd4
SHA5126086a5757c75dda0389b2cc270691a2bbad962d4826a1b0f8c6c61d3d75445f7b25c180010f11db49f274a6b74d3865f703c4e64f3959dea99d026625fb3ce55
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee