Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 21:44
Behavioral task
behavioral1
Sample
4b88832c30187fd440791a15d03c337e_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
4b88832c30187fd440791a15d03c337e_JaffaCakes118.exe
-
Size
191KB
-
MD5
4b88832c30187fd440791a15d03c337e
-
SHA1
f3e28cf9237f88dbd05cbd5ba9f831f470520d57
-
SHA256
2773da24d2015cecba58a788deebacbc4fb1fbe680ff494f0e3b3b9cf179b719
-
SHA512
9ce9db07b2154e9bb3970c8f7bffd6e2f5f4eb2de7f304916e5c5e379abc0c11399d120cb7fc4d9781383d0a74641f6008a88df7748999f8910dc0fbc84e675d
-
SSDEEP
3072:FdTejYQcRkBtZy/kqtcGxekIQ8bqJLSjDexH0THKLW15Y5dyO5SDLm9qJV8Vd1vL:PWfUkBPyrtBxgQTMK0TKpxS3H8j0bG
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2280-0-0x0000000000400000-0x000000000056B000-memory.dmp upx behavioral1/memory/2280-24-0x0000000000400000-0x000000000056B000-memory.dmp upx behavioral1/memory/2280-25-0x0000000000400000-0x000000000056B000-memory.dmp upx behavioral1/memory/2280-26-0x0000000000400000-0x000000000056B000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4b88832c30187fd440791a15d03c337e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b00000000020000000000106600000001000020000000517f14487596e61129534df6ad47376c89cb8197456e66f132f992576c6c576a000000000e800000000200002000000021e76c2018567647dd81a279c3d0f0898e7a745360cad447dcd61f9067535332200000007e4ddecea9f1fe8165dc47198713f97eba703a48fca07ec0f7ab592e7344c3ed4000000016395180279b96fa31273dc486bee53063089ff89fb2a7edb1320c9c4dce0a5be7de959641d1b7b4b6d91ccde8baa9e221894d4d7e14221ceb316d04864a10fb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main 4b88832c30187fd440791a15d03c337e_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6BFDFBA1-42F3-11EF-B001-72D3501DAA0F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e046da5900d7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427241740" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2280 4b88832c30187fd440791a15d03c337e_JaffaCakes118.exe 2280 4b88832c30187fd440791a15d03c337e_JaffaCakes118.exe 2280 4b88832c30187fd440791a15d03c337e_JaffaCakes118.exe 2532 iexplore.exe 2532 iexplore.exe 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2532 2280 4b88832c30187fd440791a15d03c337e_JaffaCakes118.exe 33 PID 2280 wrote to memory of 2532 2280 4b88832c30187fd440791a15d03c337e_JaffaCakes118.exe 33 PID 2280 wrote to memory of 2532 2280 4b88832c30187fd440791a15d03c337e_JaffaCakes118.exe 33 PID 2280 wrote to memory of 2532 2280 4b88832c30187fd440791a15d03c337e_JaffaCakes118.exe 33 PID 2532 wrote to memory of 2564 2532 iexplore.exe 34 PID 2532 wrote to memory of 2564 2532 iexplore.exe 34 PID 2532 wrote to memory of 2564 2532 iexplore.exe 34 PID 2532 wrote to memory of 2564 2532 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b88832c30187fd440791a15d03c337e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4b88832c30187fd440791a15d03c337e_JaffaCakes118.exe"1⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.gamecentersolution.com/downloadgame.aspx?CID=21157&AID=4772⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2564
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51608a3b515ee1b7861917fd7cb01cc0d
SHA1c75c688da72ea85d07299f5fea53c194aa41ca15
SHA25624572c358effd138bb5ad2589f8e1722270a60a4cece23bd8e7bbc550570a857
SHA512d64e79b11a311957eb7943f07a8755bfeb1dfb36214d6d581bf2f50437d203f61ad7c9df1e4f5eab4ed36e28d2aa1e523115f39f83d3873f69e4dbb1d96d0de9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d655dff999e6a1a7a36e78e9f714765
SHA1767dd203c7fdc13ce9cf4573d147a255014d8a8c
SHA2566ca8997857eb10ad087fa655a679f6681a314eb7a27d449191b834b884fdfc50
SHA51288b88ac2617f59b5ab11c36ce01e9493bfe42ef3cdf54f9d065ca1fbb82eda31e47c6b52d053490906ceadb7159a5b846d6fcb87f5c4fc3cdf3211fd52b7caa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a53fca8d5304ebba6a6f5d2863f5ce92
SHA12fe7f0fecc088ce7b98ca414ce150218ba0aff98
SHA256ed4050dbd76525274682727a4f4866055b6c46900bac1a416a6a8fb440adc29e
SHA5129af71f66a99f28101162f9bccc713bab4384813af08120add920111092e6f93e95c61e757eeb9bef3956d32298b316644daa7486f639ae3e1077c805e830010f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cc622470d238b98aaa42b5798bdd6d7
SHA19928f4e11d6169f1d79e1c37ba3c162b82050d35
SHA25662d7f609b6b81d5f298e07308fb6fb9980f163a91dd7bd3b68bd334a6693d93a
SHA5125ef7d611d7bb6e4767b243f955250bcf1dec318821e9571a87dfd808032d264783ff8894a6e273677462a9ae0c1a1cf1b1adaff93e2769d88e24d219194da472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cf510b7bd036e357c2a6149391003a2
SHA19f1841bc606bd19235a9e9bfb27e4513034218bf
SHA256fe7119823331b54ca1cf9ade5662d06e859be8606fe526fb94640b72d78c7407
SHA512430c3253b6d302ce317bfdf37a3484d7b9eead4c709c061bfc1d6babb983db3d248ecf950fa0250930eb3d855ad4eef133b91913013ad6df7582dced1d02ddd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0510d7faca02609c6457f61664d4826
SHA11804e1044f766342b65c9a317b8c78b09ce23a58
SHA256395d3dc2061f510676f5a00fba975b243db7cdec46995489e919ffd87c16644a
SHA51237ee58b8235a578ed8ada145df763d6b5c10f72962bd706ba6e6519640c21211cf434136a4900e9c60c8393367743d4b39b72ad91c4943a1535447c9a9c377ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55940a116066b099cd8ada24be1855b11
SHA191f63b3e3b244d8c831fb7dd1796d1a5d7358d90
SHA256e2241cc120985910be673ea1d27b8685fe95657868f2896c21b92389af8be1fa
SHA512dd67ae37e0c5e429e538fbf94075521a15d1e56b617cf387cc25012404eb3be5f62f9bda44b12063628e046662366074252037ceb5bf912e3e04f9126993b434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5affb091e48eb242f0cd8f8da555c7c86
SHA111ad6e02a1e2e8c56bce89e8be546f244cc88818
SHA256802b7af48c75c6ff597b97fffde1fbb5f371dbdb265cfed033f9fdd995f7317e
SHA512015779a457941d06d9a6db6f1ac499544bc65e858681a0b0c976d69c6f8efc3971f2612bcf27d06ee7ccbdb4668cb5f887e0fa14b290e238f1171050e2ed333e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5551aa5980ac446ff42325afdb8a4bda1
SHA1740f43c4c53a6c4972da32994ec0561b838fc8f1
SHA256cd58d9af4a8a81f7f2cbaf1ce9a38009fcfd04b0538003355a6e0b9ff78a8822
SHA512fbadd7a9e7c29ebf895bce49ece0c8f21066cc77cc3f0daad225cae0a52a0fd3d970cce2177176f8d399c79d81c55f414311490670c6e695c1fcb60e7045030e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57494ea5c949882399b8a269103c21d71
SHA1d0c088f312a8fa92ae678806f9c14e737d0903a3
SHA256b48f551648fa0f9f41b92c89e252c8d90fc512fca44808abade6eca66836b000
SHA5120875f533a9511027021beab34433e70cb31b49684935af7d138f61eddc7654a1414f4f629b1e4a3573e6723039bcff5cc94e0c2f56a7bca3b44c767fa891b221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598afcbdfe07ec90d163e2e61f80ae6ec
SHA114762f8c0f799804438cd93a8062fb77817187f2
SHA256f221921fa99a034847dd8bccb14ebd0b872199f9eac70d31b445fd54947f8fad
SHA512b5faa644c35f08b78ce5c7fb4e14688e83ecb538f14debe6a0728e6835edbe466329c9da5b57d150f8461fd186179ed27e2410fbe391de7c88b2078821df99ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2bf17a5f80957563e1267facb027603
SHA12667aff53c1b4f6b1dda1b561bd0f412509b0afc
SHA2566bb325486847a66f92108ba49ce0ea4913cab93060d3667c4fbea531fe3741ea
SHA51273138f1308adcdd05efa88e08dc94563c204a8ccacfee2f0f79034c898e8f43b575de5aeb7c717b032da8a13554b594da001cada053e17723e454a77b79644d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599fbee765367f833c2570013bc27bbfe
SHA1c8556f8edb9a97fedbe7c06607eeb752894c7b77
SHA256c84f8efced8b76bd4a2dd286a46329cebc7dd642e4a21f2309252191056b0b95
SHA5121b266d0db9f6d768e3b6908d0f9a0559ff58f927c162bc9e7691e337213c57870a21b94107485863daa451c1715192e5d58cfd6c3df156275fc1d6f09d299ab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dfaa512a65c022efa2ff0b69e92387b
SHA1287cf30434140324323a58760d3fe6516f05d056
SHA256529fa13f5ff29793f27c84bd83bfe954c95ced8b83ad4c82b08ae81dc144c080
SHA512dd33c622bd447b99034343069448f873e7f17ee2c615dcfff03533d9aedce4f1a2808bd632322f150a64a1531ab5e57ac8ba66231b91cdc86e1c389ab3f57881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f639ace1708e1e8f6da2b614501ce2db
SHA1f203d8a15ede2f20f593d802ceff5a9a03842ef7
SHA25686899c68491e6095331642d7f8c51a25a6ddd1e02f73dbe653f6df8cf7011b3c
SHA51282b665fec531a1ff74a716870f097b683574348fc7dd68b96acc1923cdc1f0b0634200bf7ff62fd73790c84c7c6c399e73614d3c7adbeb60d041892902f78c2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56631b71cf64fae558a27f664723320f4
SHA1f3a5e0d97043472563f19cdf7db8731ac3a1ff02
SHA25640753d9ae3dfa4d1f727f969982daf3b6bb3849fbbc8bcec5622f36e0ff1c242
SHA512419322ac10df79372844e00ba73bac0352efe3b0d96d64a5adc4e77b6b3c8493be8289db5d3c8434b7da442bdef890270f319c27c0675fef6b7b56098b757854
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
192B
MD50fcf82b5a915470e8a79d3516f582a36
SHA175f81b41607905b231521243129aff3554a58db0
SHA256076264d4f165cef82f0cb07f6795f1d5ffa74741a943fca42cdeac65823bcae4
SHA512adf69ec56756fe672677b039cb44bb13fc3adfac569f5ea4eda4e7b35de5ebe0229c5825ca8337aa2c623a773bdf775ddd3689e9fae03a7af1f694576d954293
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b