Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 01:43
Static task
static1
Behavioral task
behavioral1
Sample
65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.exe
-
Size
42KB
-
MD5
65a8ebd2f8ecfd6c708f5ca10088916e
-
SHA1
7d6ec83d2748033fadb6ce4d6217a94796a6fa31
-
SHA256
f799a6cfb79f9fde7c6689aff3ae41ac7cb0f51995ff6a5acd24db62df5a527a
-
SHA512
566ed17fe1c824627336e3a7629672a579b98f025bd0619aad48fe41f1611ec00d68c5a8df47217244a7c0ccf7f8d5e198407992beb52f924f309d576c13c6bb
-
SSDEEP
768:0i+GMBFeEFcsrYg9KJmZHB/w82KDWVeJ/ZIcHUeOmCe07GO:0i+GMBFpcqf9KwZHTyVeJZa
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 4404 65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSSMSGS = "rundll32.exe wingga32.rom,aoLRun" 65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\wingga32.rom 65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wingga32.rom 65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1991255010" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A110A854-489F-11EF-96F8-5E2A1C4514C4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1982036657" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31120556" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31120556" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31120556" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1991255010" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1982036657" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428468565" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31120556" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4404 wrote to memory of 3880 4404 65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.exe 84 PID 4404 wrote to memory of 3880 4404 65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.exe 84 PID 4404 wrote to memory of 3880 4404 65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.exe 84 PID 3880 wrote to memory of 3068 3880 cmd.exe 87 PID 3880 wrote to memory of 3068 3880 cmd.exe 87 PID 3068 wrote to memory of 2348 3068 iexplore.exe 89 PID 3068 wrote to memory of 2348 3068 iexplore.exe 89 PID 3068 wrote to memory of 2348 3068 iexplore.exe 89 PID 4404 wrote to memory of 3068 4404 65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.exe 87 PID 4404 wrote to memory of 3068 4404 65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.exe 87 PID 4404 wrote to memory of 1416 4404 65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.exe 96 PID 4404 wrote to memory of 1416 4404 65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.exe 96 PID 4404 wrote to memory of 1416 4404 65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.exe 96 PID 4404 wrote to memory of 4492 4404 65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.exe 97 PID 4404 wrote to memory of 4492 4404 65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.exe 97 PID 4404 wrote to memory of 4492 4404 65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\tweA325.bat"2⤵PID:1416
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.bat"2⤵PID:4492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD55fe1d5be97aa5a4b444680410010b626
SHA10b747d5b13d5745fcc81a5819b2db8e11543ab42
SHA256018bb27ecbb368115c6dc85539b5d24b0f7d548a3cc81ace6f7fbdc2a5aa55d4
SHA512b3baa42206a9866e37dbe747a04d82d49e51e8219a8ac51170498cbdb98430a6b3f591151d3dfb133b1734f6fefc62b90efbbb907c800f45e93eae998c009fbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD52979f8871d162698b3c2f204760d1d2d
SHA1549def60d1bd0c5faf3c2cb0354c39d8221754a9
SHA25609cc8e1e395f86a0dd0bdb144cfa1aa376cfa2ae779f6790c3cb8d6f4fcef306
SHA5123c0c8d5f4a945699487842e79ecfa38ff8c132cc810c740712b280866451e4e6943e14ff689d32e62806565e4171374bd73d712af926da15a6484e5394fb1375
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
305B
MD55db8b5ae784d2e5b8f2c1baadb1712f1
SHA1e719b674d3c1d7210894dc43a70aa3d4f9aedff2
SHA2562779de7f00e0a064a4648b337a6271b3abaa394b51ec4407c099fdf1bb7b1d0b
SHA5121c6c554181f119550f597f8731ab45cc45b1b82432fa3dd1f7816f3ba6e777c6d9f1a824c1695242c43e6886bcf8f147764b7b51a564352c972bf926a6dad09f
-
Filesize
188B
MD583123e574a671339d1dc7226ff7b2c6b
SHA15d78e434d9c9aaf7551e40133247926d25be4733
SHA25631ad825fa2023168056317428c76c32d86ad0b7200518e016729589328ecb683
SHA5127717f9c3faed795cca82b93ed1fb69bc40c36fed50edda1a4071c927d3e213448ca5a18d3ee42b712b14630b60f7e1689412b64e5920e17a2706073579fd604e
-
Filesize
31KB
MD5660f17720f49d2d2fd6c70cc5a1f0fc5
SHA1bd4187f3c1d2f3aec9ecddba81b225133d874164
SHA2568eaa6726a4873e22097cf1d7b2bc583778f3afc9d20bebbd7e470b23d3e610d5
SHA51214cbc458817f494f1af7bf448511c2df350f53dca6eb6448217a9ac37d9f0d601f75eca153b6ed8d24b3e0a85cf41459fce66f8c878a8e2b3723d13529812ced