Analysis
-
max time kernel
53s -
max time network
54s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 23:44
Static task
static1
Behavioral task
behavioral1
Sample
3b30485a7f67c3c169a83bb7f2c64595_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3b30485a7f67c3c169a83bb7f2c64595_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3b30485a7f67c3c169a83bb7f2c64595_JaffaCakes118.exe
-
Size
41KB
-
MD5
3b30485a7f67c3c169a83bb7f2c64595
-
SHA1
19940d7fa89c0cdc1acb37562fe85912fb6b8876
-
SHA256
d22ff8d20c53e629c02a21ed2538afdad8724ed9da95722c9811915f5f5415d7
-
SHA512
dd27ee2816000dbbc09f07ff540246c2ed7ed37b8158a26e0532d90399643899801662cad5398db1f00db7464f20a053cc4ca5229ef1786bbb3c75c88370ae0f
-
SSDEEP
768:O9wlvxXCRAIprsTMrOlEP+GFOwA0V/sP7pCUQjhriON/wNo4:OwtcrhrOOWqV/S+jdiOO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2888 xflash.exe -
Loads dropped DLL 2 IoCs
pid Process 1756 3b30485a7f67c3c169a83bb7f2c64595_JaffaCakes118.exe 1756 3b30485a7f67c3c169a83bb7f2c64595_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xflash = "xflash.exe" xflash.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\xflash.exe 3b30485a7f67c3c169a83bb7f2c64595_JaffaCakes118.exe File created C:\Windows\SysWOW64\xflasett 3b30485a7f67c3c169a83bb7f2c64595_JaffaCakes118.exe File created C:\Windows\SysWOW64\xflash.exe 3b30485a7f67c3c169a83bb7f2c64595_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000002f76700c52ffcc38f5ec6c5188d79f576c1c8a6b54ad657b5617a0437e331bb000000000e800000000200002000000003a1a9650a08e325268950c9124faac8793c6f1c3c3435682ff7d616ae2dd5d8200000006ede51188f17d4c310c2668fffbf33dd8e6d3179be8ad9a858e9594ed2adba6e400000009a5f2c703da6ccef2fdf75cd24c3386c7921cdf7fb4ab15155febdcc581b5afe7dc49baf0d852b73862f682bc4dd4c65da8de29263c54bff5575b0fbf3fc3bd5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0dfb958ecd3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{81594981-3FDF-11EF-AD51-4E66A3E0FBF8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2888 xflash.exe Token: SeDebugPrivilege 2888 xflash.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2288 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2288 iexplore.exe 2288 iexplore.exe 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2888 1756 3b30485a7f67c3c169a83bb7f2c64595_JaffaCakes118.exe 29 PID 1756 wrote to memory of 2888 1756 3b30485a7f67c3c169a83bb7f2c64595_JaffaCakes118.exe 29 PID 1756 wrote to memory of 2888 1756 3b30485a7f67c3c169a83bb7f2c64595_JaffaCakes118.exe 29 PID 1756 wrote to memory of 2888 1756 3b30485a7f67c3c169a83bb7f2c64595_JaffaCakes118.exe 29 PID 2288 wrote to memory of 2900 2288 iexplore.exe 31 PID 2288 wrote to memory of 2900 2288 iexplore.exe 31 PID 2288 wrote to memory of 2900 2288 iexplore.exe 31 PID 2288 wrote to memory of 2900 2288 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b30485a7f67c3c169a83bb7f2c64595_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3b30485a7f67c3c169a83bb7f2c64595_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\xflash.exe"C:\Windows\system32\xflash.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9fdb319de911e08a72a6f8adae4add9
SHA11571a9cae83713110deca923549a24b8194dcd1b
SHA256f2c40a502a78770f80194d5fecda14178af6f71d5810c1387f56296dc3a9f796
SHA5124e9ad2bbb4ce7a34cd19e269605da28e845b0474697593f67a029ef563c572e405922a83c69b92db499686f84dc7d93249a10d858fa695c37db595c6a962c0b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c34448e8537cfa4cc47690eeec2e9c3
SHA1383a7749982508b8f8f1068e01000448a988cc28
SHA2569ba99003c244273339c2b9b0977f9ddabec9a79898bd25f92bc90dc2aa728c13
SHA512b4468851f07d6fb68b759e33c130e30d98be19e50e78cbed9bc6821b082aaaacb4ef440495f4a3f4c7a8c8bc838d4eb4dfe1227f670f031c72043624b5aa038e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6078fd996809223bccc56fb95455d85
SHA1f4387bdf634087031b38bdadd1fea0572b88b3f3
SHA256dad12b40aa38e2079a23f6dc5075d6ac2ee5f06b97e193454e69af41b39e408e
SHA512a2fa2717cb59a5af4f14bd5c609a83af5734afe48a6bf1386a247519ad80c70bb4e52eaf305061b6bba7cc83f28e69d6b41b7ad2758be2648df3b733f1f79d51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c6d46af970c71b32e19b4d4ecb691ff
SHA18b963b8e1b6b60742a02036928f57690d5651abe
SHA25634cb193724d857649d97ae38bb914b79214c0bb86c746e3f2e9d45d97f6dc64c
SHA51216b8e4f6d19b0d18d9a5562c7be481240e8ee616c71bb62a21f7bd9f0680aa6647cdcc3bbd38a4efb001a415a493c7fb0f965d8cbc83adc198871e0f1254ea4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50860f77d9298281f692d86a812069a08
SHA1b3ea84cbad967c5b6705ffbb162606639ef0f98f
SHA256ef9333ac1594fbfe0797ff8ef9867f7ed96b5cc76b749df0191f3676bb0d55cc
SHA51202932a19ec31dec6f788a48e412874e19bec50afd4ab153cd6fa0f1e86456ab6fbd83e7b2a69aeb6476a6b246f33465ea87ec209887ce6523acecf86d499309a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59520fbc5d218d9b74b8898563c4a4755
SHA160e200c25064c071f57f30b4e9ff03c6e43fcdfd
SHA2561e0f1f0f57ba126b0d0d17982268cd636b7d3ba801364649260198b8ac0e97f6
SHA51215f78421f232bfc4fe2e8ad92e2473c0deda4b414c086de2382ed5e21de76acae2fe7e005837cdf054c7b4beeeadf36b3074d76243eb3d629bea8d06457d287f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c29f38df3de14c7c2f95878ada44f09
SHA1200a5c6f594bec61f355beccecd78fcf9be8b5ce
SHA256733a202ee282103c1421b37f3b69b990e8a144fbc39c4a028c7073bb0c3603b9
SHA512528966a1661c994b506d5aa18d0f69252bf1193e33959414f83a77bbb3078b4a2fd3803ad0032b16ed1f8ca47d0477ab20d9d137e432fef93b512327bc3966bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd18ab6389fcfe561a0df6feade6036e
SHA1abe557971c9ca854f9a977363d2b3fe29f1a2a41
SHA256f80fc2a7e1cb212167dddb7719adb7133e7d2a3d5648920f431d3c82e30c6a7e
SHA5122ea3fad40d0d94d1b43e6b982c3ebfbb3fd622753e327fb9484031618dc61e62d8555afb3712b04a9052229982c36137548a13e7ddf1203dbc86b8ae235c94a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a37bc3f965e363b9c6638c903fef5943
SHA14816a95c0fc4d91f681972c790f802542bfbe739
SHA256fb7365357a12fa8e4c745727b69e38389df9aa80005464fdd04c07ac116fb1f2
SHA512eff43b0758d2f136ee1e1b8ae5de85954a62e122f5bfc983265fa54d7ca671ae3824780e62845f9df2ca29ca12ccc7ab96b63f066a7c7f636db42916892ef518
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
5B
MD5ab1ddc2ea36ec8dd2ba74c4c706e7c6d
SHA12704e223e2e6657838573a73d793fb826db96823
SHA256df8b9a0ca649a3805aa4433413bfb955f83213a7bf2bd37efd8a454236e46553
SHA512812c231953d8d4613984abf2fede3f300632a5208a3b4de6803d3effe2eace6ec384ae76652db517a663d90b17b3c3c5cf6e5a2211ee4a56abf2a07b294e6522
-
Filesize
41KB
MD53b30485a7f67c3c169a83bb7f2c64595
SHA119940d7fa89c0cdc1acb37562fe85912fb6b8876
SHA256d22ff8d20c53e629c02a21ed2538afdad8724ed9da95722c9811915f5f5415d7
SHA512dd27ee2816000dbbc09f07ff540246c2ed7ed37b8158a26e0532d90399643899801662cad5398db1f00db7464f20a053cc4ca5229ef1786bbb3c75c88370ae0f