Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 02:31
Static task
static1
Behavioral task
behavioral1
Sample
43f1493ae2616ee8337c57b1c5b0fc0b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
43f1493ae2616ee8337c57b1c5b0fc0b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
43f1493ae2616ee8337c57b1c5b0fc0b_JaffaCakes118.exe
-
Size
239KB
-
MD5
43f1493ae2616ee8337c57b1c5b0fc0b
-
SHA1
3a0b5c1c4a9272c2c3fe7e97675bac4affbadba4
-
SHA256
ddaae5ce6dd6146248dc54d04599a6b0c57d9a4513feb2488b206801de8f2b57
-
SHA512
21f1bf7b9f151150d5c02d95e58feaa6d395c941f3b181b33d8f1ad1ce891a1ced2de3af58e6ec4b774e1af26f9aa9181171721b4388a3a55f93f8411dc2949f
-
SSDEEP
6144:ybPTZPIBXnMZjS4ad2003WNQiYomG5RIxCdW9M6H0:y1IBXyS4a400GNFYomGjWv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1232 oaPC8E.exe -
Loads dropped DLL 10 IoCs
pid Process 2064 43f1493ae2616ee8337c57b1c5b0fc0b_JaffaCakes118.exe 2064 43f1493ae2616ee8337c57b1c5b0fc0b_JaffaCakes118.exe 1232 oaPC8E.exe 2784 WerFault.exe 2784 WerFault.exe 2784 WerFault.exe 2784 WerFault.exe 2784 WerFault.exe 2784 WerFault.exe 2784 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSSMSGS = "rundll32.exe winvhw32.rom,QhmnGMYponI" oaPC8E.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\winvhw32.rom oaPC8E.exe File opened for modification C:\Windows\SysWOW64\winvhw32.rom oaPC8E.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2784 1232 WerFault.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{419864B1-4189-11EF-920C-D692ACB8436A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427086192" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2820 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2820 iexplore.exe 2820 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2064 wrote to memory of 1232 2064 43f1493ae2616ee8337c57b1c5b0fc0b_JaffaCakes118.exe 29 PID 2064 wrote to memory of 1232 2064 43f1493ae2616ee8337c57b1c5b0fc0b_JaffaCakes118.exe 29 PID 2064 wrote to memory of 1232 2064 43f1493ae2616ee8337c57b1c5b0fc0b_JaffaCakes118.exe 29 PID 2064 wrote to memory of 1232 2064 43f1493ae2616ee8337c57b1c5b0fc0b_JaffaCakes118.exe 29 PID 1232 wrote to memory of 2916 1232 oaPC8E.exe 30 PID 1232 wrote to memory of 2916 1232 oaPC8E.exe 30 PID 1232 wrote to memory of 2916 1232 oaPC8E.exe 30 PID 1232 wrote to memory of 2916 1232 oaPC8E.exe 30 PID 2916 wrote to memory of 2820 2916 cmd.exe 32 PID 2916 wrote to memory of 2820 2916 cmd.exe 32 PID 2916 wrote to memory of 2820 2916 cmd.exe 32 PID 2916 wrote to memory of 2820 2916 cmd.exe 32 PID 2820 wrote to memory of 2748 2820 iexplore.exe 33 PID 2820 wrote to memory of 2748 2820 iexplore.exe 33 PID 2820 wrote to memory of 2748 2820 iexplore.exe 33 PID 2820 wrote to memory of 2748 2820 iexplore.exe 33 PID 1232 wrote to memory of 2820 1232 oaPC8E.exe 32 PID 1232 wrote to memory of 2820 1232 oaPC8E.exe 32 PID 1232 wrote to memory of 2864 1232 oaPC8E.exe 34 PID 1232 wrote to memory of 2864 1232 oaPC8E.exe 34 PID 1232 wrote to memory of 2864 1232 oaPC8E.exe 34 PID 1232 wrote to memory of 2864 1232 oaPC8E.exe 34 PID 1232 wrote to memory of 2784 1232 oaPC8E.exe 35 PID 1232 wrote to memory of 2784 1232 oaPC8E.exe 35 PID 1232 wrote to memory of 2784 1232 oaPC8E.exe 35 PID 1232 wrote to memory of 2784 1232 oaPC8E.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\43f1493ae2616ee8337c57b1c5b0fc0b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\43f1493ae2616ee8337c57b1c5b0fc0b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\oaPC8E.exe"C:\Users\Admin\AppData\Local\Temp\oaPC8E.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding3⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\BhuD3A.bat"3⤵PID:2864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 1443⤵
- Loads dropped DLL
- Program crash
PID:2784
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58921af2f3da20100ed99a1953f0ce8ae
SHA1b815b16211d7c624e45b8eab1b1a6e7cd414182d
SHA25676ab12513bdb54ccaece950dfa67c7023421dcff1a7a6f2efc071870fdf19893
SHA512fc0e8ac323cf0711604f977bc3bc60ef746a8ea738ca24c0f962c1a75796b8a87a1502e4f5f0527fa1dcbdf9d333fc90ff681a02bc2207a7cfade2bc145cf1cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587610e357313f12bb607833f5a889a2f
SHA1f0fbd54578886ac3ff57b4af23e29dfbbe42e6ce
SHA2569addaefb7a4c27ceb8b188b539355fc8373367f5c6bcf3b95cc53d210fa6eb2e
SHA512b740355e560e5258cb2966fdce913334b7c5da77c5fe62f2a65e0721f873ba1bc7ca4b7a0def6dcbcca0db1188fc4a792bdd8e6e8207b50065a2b6f2c0d7cb8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f8e453c997abf41fb4b4598c1b51598
SHA1ec55bd645959ad9112589cb3d4aae6e2ac425d00
SHA2561bd114ce04ef42b4d232720f6621130ac46759b34aec1119d2ed3ee2e3b4e315
SHA51284667c184dc789e65dcc38573d88fca15bf76fbd64280428ca25bc6202150fd3fa9d5deb4d5bcbc32734a222a129d32191c040e4dde8d3afb2671f221c07601e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfc3e3920e8c3d18aefb8558b441e889
SHA118d09997663e85b27577611185956ef6c20ed761
SHA256aa1b2dcde545385527a04c69a50dc336a2300c6b5e498b8131b0a2fc7047a09b
SHA51297c822f79acf06ab0cbc801ba8ffc792b8b6c11a753329966f10e1fa5c81cce384c1cc398337e185035cb79334aa90b92a5d8f0fb4ebda18b421a2acb8f5fed1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558c57f2a76bab3796e0669ecadaf2516
SHA196ac81d87a6f9e4e531e1a76d3119b3125e8b275
SHA2560736ee72ec23422c0782fb50d092b23e7b599bddb373c4ab4e5390e9a632d059
SHA5127f6d0eda8026c2b798478f8af093a72ef862a3ba8e9cbc2353d9425ee25623690a7870e8b811e4e08fb92315abda5865827b8dba0c6e71c650fdab362e54e6b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc24cdfc9050ea4bf3716cc2a7c384c3
SHA19e2e4442cc0aef360404bb927ccc18d7eaeea7a9
SHA2566cd529ee51176ad3ef837de98343ae31f0b764cf4d7b2a7bce5e79563d778abe
SHA512e147794ba446617ea8056b822b3e2dc96ac10395751d95c7a3cadf8432df2726b2a84210465715be5e61c488a73d537376e78b14b8bd639936db287d34094ff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c22d13d2884ee0b5b7aa59b33391ad5
SHA10b6ad159497d6d08c479d2ad206453e2ec88b96c
SHA256c753bf79110b90d47ee3be930af7e02de3a16329392535c07f1c23e9a6fcc168
SHA512436520d8e216cee84cfa186c08030c1995df243b32c05090a05021918aaed45b2bf4c58ca2d400080e7f89255050b09d2ecddd11aa298e56f6017a794e8dae6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f83e283869f16f5b1af569f41c91a904
SHA11bf118635939848582b6313d018864e4ba96f69a
SHA256e72199630b16e8a745ff7aac21b15a1f30dc440b5c9a15d665f5184971da08ee
SHA512b769fdd3ac543e118ccb34a5b3b34e29fed546f91ed6a1be133b969fb0e370fea5e11c3313fd6a5977591a8e6f68d6f0f371b165757f8acf51f942a11ca2140c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557dec84690db6f5312031e0fab6bc801
SHA199b5895e420bcba2b8a55edb5266da8b5c46d975
SHA256441083a28e3116e105c7739e3b08bdcfd7c01e90988dee2e45ba40c2e2c2b667
SHA51226012bc19aa2fd815a1d76578275078d2a7957d5e4469f8f386db5e43e37a0b8af1d781686aa965f8d3ce00981edb0f8d211ce1890e7699143d8498336791dd9
-
Filesize
185B
MD57164c32b50e976fcce5a7e2318b0f10b
SHA1f6bc29574e4b9a977ce9845957926e7a2cfa9595
SHA256591aacb80378dd3ef7458811bc9c8aa0a4a07f6dc6a2f8d6e40425fdc702b109
SHA512627dd0aa0395bf34cdd3e34416ce8af12206b47333ff7bd3b444928319b6ebf4b7a4575f53c4a658531b3e93dea01d45edcad28b6ca7de6bbc9fdc5dabfa7e6f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
106KB
MD5c43f0e31674e0f4c88218c38b7d81ee7
SHA1db6312950ee3c1f79bc96bf724aa2185b66a2a73
SHA2567523ea71f532bed48c38938fcb494ccd76d0f2c36db06c7f4811b9d27b4e9a77
SHA5129ea51359fc3e64da5eef9bf3c348040d4afb6a4b878cd08aad7ea0595216c15a27b8d3307e6ec575fdec206550cc058050f312c7722be47f6cd1f2f8a5a855e9
-
Filesize
171KB
MD5643aa304b3795c8af46bd189ec5746ae
SHA1a39e2ae7bf09316b47ef00c251fce1731e67cdc5
SHA2567a74bb0f96cc0e905b3b6f85bae405ffcde40b53f247e339f1a3f152f65106ad
SHA5126d391791c187ffa542c5b287f2d1cab6ff5652e97031507baa865c6521787ab93207ecf827764f93b90cddb165975b08ce43bd1cc26f393a80a83327552b32c7