Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 19:24
Static task
static1
Behavioral task
behavioral1
Sample
3a6fa72965a4658867506af0a9e4c997_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3a6fa72965a4658867506af0a9e4c997_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3a6fa72965a4658867506af0a9e4c997_JaffaCakes118.exe
-
Size
277KB
-
MD5
3a6fa72965a4658867506af0a9e4c997
-
SHA1
50360410222e553121c2563425442ebc5dde28d3
-
SHA256
5485f28ca73829b395863d65b0be53b32b3105d74cdbd2fd401d7a34bda8b879
-
SHA512
219d0aa2a6fb21338455dbaacc146d275decf89b3777ca096968294d679a382a67e49401f05cf5d32f0bd21c85234d5fb45483a78899e2582391b0f446b7cfc0
-
SSDEEP
6144:hSpt+OKXbTkZS3qSeF+ywwW18YO+Pa8nzbt1SgGm0q3:Et6oZRSQhBpCzbtcgz
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2456 QjP1BDA.exe 2808 QjP1CF4.exe -
Loads dropped DLL 8 IoCs
pid Process 2028 3a6fa72965a4658867506af0a9e4c997_JaffaCakes118.exe 2028 3a6fa72965a4658867506af0a9e4c997_JaffaCakes118.exe 2028 3a6fa72965a4658867506af0a9e4c997_JaffaCakes118.exe 2456 QjP1BDA.exe 1728 WerFault.exe 1728 WerFault.exe 1728 WerFault.exe 1728 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSSMSGS = "rundll32.exe wintxf32.rom,srKaPZLd" QjP1BDA.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\wintxf32.rom QjP1BDA.exe File opened for modification C:\Windows\SysWOW64\wintxf32.rom QjP1BDA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1728 2456 WerFault.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426887723" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{28393231-3FBB-11EF-B99E-46A49AEEEEC8} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2456 2028 3a6fa72965a4658867506af0a9e4c997_JaffaCakes118.exe 29 PID 2028 wrote to memory of 2456 2028 3a6fa72965a4658867506af0a9e4c997_JaffaCakes118.exe 29 PID 2028 wrote to memory of 2456 2028 3a6fa72965a4658867506af0a9e4c997_JaffaCakes118.exe 29 PID 2028 wrote to memory of 2456 2028 3a6fa72965a4658867506af0a9e4c997_JaffaCakes118.exe 29 PID 2028 wrote to memory of 2808 2028 3a6fa72965a4658867506af0a9e4c997_JaffaCakes118.exe 30 PID 2028 wrote to memory of 2808 2028 3a6fa72965a4658867506af0a9e4c997_JaffaCakes118.exe 30 PID 2028 wrote to memory of 2808 2028 3a6fa72965a4658867506af0a9e4c997_JaffaCakes118.exe 30 PID 2028 wrote to memory of 2808 2028 3a6fa72965a4658867506af0a9e4c997_JaffaCakes118.exe 30 PID 2456 wrote to memory of 2748 2456 QjP1BDA.exe 31 PID 2456 wrote to memory of 2748 2456 QjP1BDA.exe 31 PID 2456 wrote to memory of 2748 2456 QjP1BDA.exe 31 PID 2456 wrote to memory of 2748 2456 QjP1BDA.exe 31 PID 2748 wrote to memory of 2668 2748 cmd.exe 33 PID 2748 wrote to memory of 2668 2748 cmd.exe 33 PID 2748 wrote to memory of 2668 2748 cmd.exe 33 PID 2748 wrote to memory of 2668 2748 cmd.exe 33 PID 2668 wrote to memory of 2564 2668 iexplore.exe 34 PID 2668 wrote to memory of 2564 2668 iexplore.exe 34 PID 2668 wrote to memory of 2564 2668 iexplore.exe 34 PID 2668 wrote to memory of 2564 2668 iexplore.exe 34 PID 2456 wrote to memory of 2668 2456 QjP1BDA.exe 33 PID 2456 wrote to memory of 2668 2456 QjP1BDA.exe 33 PID 2456 wrote to memory of 1496 2456 QjP1BDA.exe 35 PID 2456 wrote to memory of 1496 2456 QjP1BDA.exe 35 PID 2456 wrote to memory of 1496 2456 QjP1BDA.exe 35 PID 2456 wrote to memory of 1496 2456 QjP1BDA.exe 35 PID 2456 wrote to memory of 1728 2456 QjP1BDA.exe 36 PID 2456 wrote to memory of 1728 2456 QjP1BDA.exe 36 PID 2456 wrote to memory of 1728 2456 QjP1BDA.exe 36 PID 2456 wrote to memory of 1728 2456 QjP1BDA.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a6fa72965a4658867506af0a9e4c997_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a6fa72965a4658867506af0a9e4c997_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\QjP1BDA.exe"C:\Users\Admin\AppData\Local\Temp\QjP1BDA.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding3⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2564
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\jFn1D41.bat"3⤵PID:1496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 1083⤵
- Loads dropped DLL
- Program crash
PID:1728
-
-
-
C:\Users\Admin\AppData\Local\Temp\QjP1CF4.exe"C:\Users\Admin\AppData\Local\Temp\QjP1CF4.exe"2⤵
- Executes dropped EXE
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9e186979d23df8fee4b30c71ec2b1a7
SHA1ac035f96a0aaf7c23b057eb7cfae0585029eba1c
SHA25696999196fac106262e0fc4038629e3364679010c2b5db0b82508cdf3688ee32c
SHA512be50f86b58d070107fe46c2b5962ee7d39d8ea1ef48910d8310befdab3e4e24b98763dcd6787d1f0ddb00aab206248625954c6783406ad37f48f4fd850baa2a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddf26aeea27ee5992181d170a041e757
SHA178de24125fb7d2fe9f7691312585340eb9515f20
SHA256263d57e2880de9aa864f5b8f61a028cf50393b42e152340cb98a0ecf6d034de3
SHA512ccc6841c09e463f19a2b823739c15d0dc634a83d06551981258e96988e39ad9d46fda1ac439649585a7b8572e22aab2b8744ed129fa88cb6a5fdfb163e1f04fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fb41b76fb55965e68c26e468904f7c4
SHA1c68c5f0f9186b7998ea051dbea2f6139ddd5051f
SHA25678d15ccf27c5a0b6c3d28df678ba43aec0a573ce781890c5e7831a8ebc758945
SHA512729f5894f52b6fc14cb94ba4f75c8296441d233792185425c0d4586b3ab7328f113cad330198f4dddb51bfcd6004cf76f5043405886161aa1989960f8af4280d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500379818f92510d6b4a5d96c62745165
SHA150175e8b97180412170aed2a3a8bcc9e40b697c2
SHA256dc0cbcfd1b16af129f5c12f048555f6f47bc7bd37fe90d9ed629dffb9bea8421
SHA51210dbf32391f4074d3b265641cf0ed74af55ce58758b1f785ade168a02f76bb5de94c6972d57d9b1d1f05392beb6e4eacf5ed5cd27f104b62e369e5721e192a1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5432d5eebed38dd609cacfc5a6358cdc0
SHA1bca55e822f60794537d1804cc30288e9def74387
SHA256aa944c5502897b8124c3e1ff8f2283f946022b748588ef3201e25d0714a620b4
SHA512ad15af74d267d17f1013b81bc806072e0c125eed694c19658f3799f03def3506526d6ae29933eb87d2d2a8c91851a6b5da053335184c5038b3e6431a9762bb19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592852d1f4302a4cb90ad040f6cd5ee9d
SHA1741a9968a7dd8926905b59a383d4795c43d3bd81
SHA25685fc595446266809c989af2371b1103dee3867abed4904799ac0d06a3cf057cd
SHA512b0f13c8da99f515af51311f68a5d4511205413c13a29359dae6d48b003b6d7b45b577fa9ff0ff68b9b69acbdca2650f9b5d612a63316a9744d2457b264bb65b8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
188B
MD5695807d2a8169294fa3d056834275495
SHA1b1d0e2864a3c297953d841213a020430e5b4b8c8
SHA2562a993fcb0c609066a7da81e2e84f49df765fba5daf8a856312d6899250f5b4d3
SHA512961d565354ac9c4fb2f2827b37c75638d558293b26de93f4db3e4347c4d2dfe5329044275f2a2e461179255ca9559173f1541f92fc348f0c9a8edd10cbee82c3
-
Filesize
106KB
MD52a079e97603e5cbcf4a801a526cf7fa6
SHA13be9f592286a17187a271045f4292e3be524b6da
SHA256e85d1a77c05b5f976c05ea57b61d5214aab386319fc201e9cb4ed9dda92e6fa8
SHA512a68ca6ec585989fa5ecb70fcde767a29b188573017dd2ea470cb0c67173977bf13afe940e9360e94f2b456d14568f1f999ae71a86633eaf434c18517680ec9a2
-
Filesize
94KB
MD5903917b02827d98443c196743be84664
SHA1b135f55183488c9fa79f60195cbe7443c8c9d191
SHA256d186e9ca8056a4b64e216c9e634b7a40a847aba61b46aa78fa3c201ab0e6c6cd
SHA512a8638f534eb78cb531e0a4cedab7f9798b123c47659f222a67a6897a031ce5b6c4cce7f06d020c9cbf34093822d0a551778cd13a3602023bffcdc8e3e6fe83f4
-
Filesize
80KB
MD55a4bbd7777dce44a58697a4188cb02d6
SHA144c652e0ff9a3be599dfd56af1758e91994ba039
SHA256559e6086af7081df06c50fb398766caab133179a55254ce0e907c0b0b2c2ab79
SHA512bbc25531673d19ed3a7abde6757a0897b6fb03481b765455bac63b7faf04c7010a0621cf9ec1eb5a821e5bc008491815714e0a2abfa6d2b4d5a206eedd846c46