Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 11:35
Static task
static1
Behavioral task
behavioral1
Sample
6f67e0016cc592fbc2bc35129433f320_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6f67e0016cc592fbc2bc35129433f320_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6f67e0016cc592fbc2bc35129433f320_JaffaCakes118.exe
-
Size
704KB
-
MD5
6f67e0016cc592fbc2bc35129433f320
-
SHA1
283db84a80ca8fde448d74daad59fea827f43acd
-
SHA256
c27646936f519338b5b796aedc458dab1333515f107ce00dcdc7edf392830bb3
-
SHA512
7ca2bf3481b31f32c916403682945f9bf3319c3342acae0c1077c1a9de7daa86f9bb104443f9466da8a0299e96c7b1c04b485219a0d43b7919134a384b656f96
-
SSDEEP
12288:ImhcfmetsELrGbIoE+itJPEbvrgqhVpMsSuyroPXJxxUYFEYP47MoFkvrPT+Ueen:ImhOGbXE+8BEbvrXSDroPXJxiYFjSkvd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f67e0016cc592fbc2bc35129433f320_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000008818ac5736c872547ad4292c37aa07357f287c662a6815159ab7b3c6884961b7000000000e800000000200002000000063cae7b380b71fc20454883c1631c4e4ca022ff3ade33e4f6d55d677171ccc33200000001f17f4aaaa02c2b4d86ce80adc5102ceaa542c8fb6479e6aea75082ee28201b64000000006dde8854ab48f3590b42e9c988752355f31b45c8d98f24e433dc9b36138f88d42546acc0339b8de4e63d558aa68b072b236facaa1431a86f018201b085a5440 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5027639688deda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428069946" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BD242471-4A7B-11EF-B8BF-428107983482} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2968 6f67e0016cc592fbc2bc35129433f320_JaffaCakes118.exe 2060 iexplore.exe 2060 iexplore.exe 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2292 2060 iexplore.exe 31 PID 2060 wrote to memory of 2292 2060 iexplore.exe 31 PID 2060 wrote to memory of 2292 2060 iexplore.exe 31 PID 2060 wrote to memory of 2292 2060 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f67e0016cc592fbc2bc35129433f320_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6f67e0016cc592fbc2bc35129433f320_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2968
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cce0908aa6158596dd6fff6b2b30a45
SHA16f832118f02916ff95056137a11f5eebd54d94ac
SHA256c598c5e1ddc297d0c2ced08aafbaec598e462fdd9af8cd2d8cf254130485c827
SHA512a3d11a8a536d2a14e7eaa984e21d5fc6323b58f09e73425a8669faf8913a83ec40a0b473f106f5c840e7de9a76cfd45f386729ad507ee337064963f83addef0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53513f449d029c76e55bd416877c83e99
SHA1ec919c01f5a5148dbe7ba16123672ba0d7e29577
SHA2566333888b70690e54503762ed8bd349bddc9788ba042c9024364a7045bdcea883
SHA5127eb11d47e10e4d0c9a8ceb59650d8f7fb20a9a2862246b6b822d6c1b8c7bc052aff16e5ac1d597911e1b2cf9c3d20eda7cbbfad647bd2524c1e2a1223a67d8c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51acb3201122a2fa8c1031d7f21642c25
SHA13e874923a7981bbec13bd2ae21b0731ca92ab9eb
SHA2569006ddf3a133e80973f7ed0fa04cc7570343fe02d7a6f6c41937c28548dd72eb
SHA512ea6183b3a1cda1ef58460995dd47fdba7bb1244a66b8f1e33f56bb79e5ceaeb5c5db5b348f530d0b8a816f1e49d41e774bc13b703caddd476530c67b90a6398c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507fb0243947d70f01fa32d0fd9a2457c
SHA15c5b20991b4c581f3453049f515c96f8ca07da76
SHA2562b6b1375da722ae2b361d1a8c799e8825376054db64498766bf59327bb86d715
SHA512822ffa22ca3816a5b79c4a1f15683966cf97561fe886d9667f5d3b85c73fa4f2be7385af7287159e699aab94589b0fed7a3c951de0b9df709c947ffb436ab5a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ee445175991fc749b56ad4bbddeccd9
SHA173f527437a14d540915eea75f694063761e22557
SHA256f1765672ba8ca105d8a8f08a796e8724eec52eeb4c27c2e73af3ca6f868f2398
SHA51291537a82adae685c9ef2eb3ab6b1399a84d5f00c58ccc225986ec122c119613a3f41721fafa805dacc387097e28bc1ecc85b050d2159266b1594f3d334411e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579f5dc2361eea331d24b2ef81ff51cfa
SHA1d132a1a1dc6b53b4c0c80c78327e0adf171f1667
SHA2562a51a1c83545e72c2eb98672955b4d6f1dfb14544be7baa682bb259450b02e84
SHA512d59732a97e1f36e412381e718a7c96d18ef2ce76287c21dd1c7efd1a7a92043f6ee72fe881feb0774881fd65a48dab046bb2af6298fe771b9edb4fb374e9d02b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568106a5ba4cdc580aff6ac4d3ec51a83
SHA1e4c9536ff24e3bd5d3f3e9abdbf3ab6d2201f89c
SHA2568cb2f3fa1b81d57734ebf4db347261ee613d21b29e4e33497fd28852e70a34ce
SHA512c51b2befe9901c0386c5fba4882a3c98649ee03804bc7539373fd3290353093f964b264e817f406ef32cc8efcf6d863a136d8dba8fecabefe11c69e16b6d9e55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51290b669fb1cf8678af70e44ecaa8557
SHA121bb8b98c9bb7e871fe433f19b554703214571fb
SHA25634fe36a7096b735217a30a76c2144320f9a82e498305613715b1660bac401817
SHA5127dc22a4fa773f14962e789b0de3354d4eed3bf90df0d411cd6f338dfef4e32ab4edffeb82848473eca8eb365dd12acfee6916c7e4df2bedbc14827c30ff1f833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be2b2230e5ea16202441f8e07cc604a5
SHA1a668a0dc64df9155d65c058e0635c2e54ceaeeec
SHA2567c4a211480eb4dfae18e749a741833dc5dd92abe0ca8349a3c5a0c1affaecca3
SHA512765a1debafee852b990fd7c2ca4f0c9ab2d267b3162a1111e1bee6e1d39be1445c4fbab5f433b001f01e903576d787c89e88fc39680817d977e0f6b4207420de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5256e8a18e048097e398aebe3d20ac03f
SHA1c354f61aabef8e7140e912fa4bec82752a4e3acc
SHA256cab60a13f21ef7145b0654e94c6f756ac061e3cbf8e400580ffdafc388e3a885
SHA512955b144ceee5f56e2b56becdb884c2398177dc6ca7dd7f8c9fb744040831e523ae914943b9bd5e45ed561ea0212494201ec72c09aaf1dbfb8c86924abd49f305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574ffa2753f0cd07b4304e122d2fca5f0
SHA1b446ba3b7a4b9a50be4d47a845c388f4419f7906
SHA256a99249951a426c1759a2b50c24d9d2acdd22c93dace6468d5edca9bbc618ab55
SHA512806ce689709bc8a4112ec823851b082e16f95c33bb0ae901ab7c0eaf99b1bc9d28386345e1be48e97e0f7d2afb6b127e5f37d04f7ee1cc6b5c442d3df34069a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5488ce3043cb16a1a6724aabc1923b8a8
SHA1188277dacf29f115478c0615b6c395b0ff8c8765
SHA256b509c956e58a7a22f3779cb38b64b13adbb4b7e39afec588775259c6096cd601
SHA512c0af9e9c843e3d05725c5ff2f2772c08215393964b21fc6596b1e4c2c2da6e50d00f2ebd66d342f38ceec3de790a3317b78a26fcc29563d6bc7d2f7b5698a6b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ba557bf5c730117fe55ec6dbe20388f
SHA170a53b31da3b5a172d2058d0dacf26fbc26be27f
SHA25668358013443e73360cdeb4e234a2f89ecdaac5766d8cf5c35bbd058ff66c04cb
SHA512eea082cf2875e851851e398961f0b671286e3858b62e9e062838de09ae964872db8c6d46df7d6fb5a4141e598aca7047f3662b17292830b113998ac2834f924b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e656315af71ffc09d67faeca6b3510cf
SHA1a357e9cbe848437cd1d760502b27f5234719c023
SHA25671d216963128776db398eaeac4882205630d4e8cd48eaaa95d5181651189aa6a
SHA51253c070e88a1d5a3bcd52154da86b282d4d1d2bc94a075d66a9c59e3964e5d0ec86aa7cb955e6ef954866efba78f5c438d1cddb58447c5b3e52e3b9b0ef406fcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5534604549c39795191fa1d73fb6df57c
SHA11df29188d193c152c8fe3a39377cebdd35e86bd5
SHA256bdc5958d352839f0a56b60ec588ed2135ad415981ffdac80bbe3b74713fabdcc
SHA51286b2cf1b173f0f29424ac342fe12c534a818db3b3e7f62b0923781a65a186ec1e6b935bb41f816ad8dcd86dfcfe1a4c6d5e27a3ab7964f73623311ab6312de38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ada7e6b3a0ee0a33b74ccf896268dd5f
SHA140786c0e55cc1b6143b5100cd79ae66cd470b910
SHA2564ffae8db6377bdc0bed427a784f5e70ab385fd132800a4367a9c6023fb60689c
SHA512bead33359287555cbc9e978a245991233975682e6c5837f2f829f3873781aa04c913dc937449d618cc17e2756d7791dc3b4f0fc56e51a16b554ac74cc9693975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571bf86b333b04c0c14dbdf310885f2fd
SHA1707d9294c8d414bb0da789ca7b336ba944f77b9c
SHA256e2312aa8bbcc2b27d3070a5684b65b1836449beb8522c766a87b5304a2f86cd6
SHA512b5e1fd2eb6ef3dddfb7b9e1c48c160fc118ac1f20288362cd7a7f6db68cc8e1a31986fb20fd590c1b3650e2ac4a839b0431080aa31a153fca9fce6467968ef13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5811376175d13965c047eeff668552853
SHA1071f290fa7ac3c5ddc6997e1a8b7d4d5d71e2989
SHA25623fb19ab832d09bc6d2796331812ca311425431941f8e257d310aa0f6714c5b1
SHA5125dd67991ecaaf9bb398f42960b9b3543625d8510412d0476669c4fb21c8466658d6d15b74817937976b451bc5110abe4a72a56ba26f6e60e3a61155ae4d659a4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b