Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 17:08
Static task
static1
Behavioral task
behavioral1
Sample
74f57f1719319688fca1b279cf476303_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
74f57f1719319688fca1b279cf476303_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
74f57f1719319688fca1b279cf476303_JaffaCakes118.exe
-
Size
44KB
-
MD5
74f57f1719319688fca1b279cf476303
-
SHA1
c7b13d772485eedfa24817f76990bf0061b9fd67
-
SHA256
ab646c87fa597f65e62a7f12a83404a1cf52f1572500b086483f17834422c679
-
SHA512
886c4bb25cae6a79e731e40d74c7cd83e9f335186d8e810a6f5e6d8c86b66a6856c52109748cb7fda68e7d78664e8406705561bbf64a550898c6fd4f49e8af0d
-
SSDEEP
384:v2B+s+jBrc4R9hkffmjGLQeMrW6dnjRv/egNTvKQamlmi:v2B+fFrfbhk2jGUrrdnjt2KTvjazi
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5028 set thread context of 4656 5028 74f57f1719319688fca1b279cf476303_JaffaCakes118.exe 84 -
Program crash 2 IoCs
pid pid_target Process procid_target 4824 4656 WerFault.exe 84 2984 4656 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74f57f1719319688fca1b279cf476303_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74f57f1719319688fca1b279cf476303_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{3757CD79-4B94-11EF-96F8-5E2A1C4514C4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31121313" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31121313" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "198314237" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "198314237" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "206907736" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50a4370da1dfda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428793518" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000474a65013f51fa4ea7512bf38b7b7930000000000200000000001066000000010000200000005b48aa78a4f3cee8917bd0c99e915ce4954b7464488685f194665a2636989b7a000000000e80000000020000200000000fccb3af0f2addd3ea8f65dcc531670e21661b5f11a3aa7c4078331e3e1ca13a20000000b1325f783c26697e88633f067f92a1790e399a924d39bc1ee27c7179fbfce2764000000050da7e90c57c26e08d4a83c9e100299b2ccf7a1f7263968d0de82da786f5cc0c3c03c37f5954c4636449f68fef9b1ca8009a422a3be1c5de1a3c5e612cdd9a82 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31121313" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000474a65013f51fa4ea7512bf38b7b7930000000000200000000001066000000010000200000001d1631ca4b641110f00e2ba701e89fd52335536afb5a3b8d7a609db6b1a1189c000000000e800000000200002000000008167d381d259ae7ea722e057dc0bd3d7a4ebfff5d6ca33b19c9475670eac6fe20000000c5e8edc138f0dc74a7e95b44c9329a6b06bb72e44cfb69a3ddb3b7e7022ce8ee40000000dbb724a591fcd19abcdc0cadde2a2dacd5539759aea540206d3c469d7660a59aa62bd9c62d7f3da22f4a17fdf70ff5f92207656b321a1e11545790ce97b3bd55 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 308b430da1dfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4064 iexplore.exe 4064 iexplore.exe 3408 IEXPLORE.EXE 3408 IEXPLORE.EXE 3408 IEXPLORE.EXE 3408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 5028 wrote to memory of 4656 5028 74f57f1719319688fca1b279cf476303_JaffaCakes118.exe 84 PID 5028 wrote to memory of 4656 5028 74f57f1719319688fca1b279cf476303_JaffaCakes118.exe 84 PID 5028 wrote to memory of 4656 5028 74f57f1719319688fca1b279cf476303_JaffaCakes118.exe 84 PID 5028 wrote to memory of 4656 5028 74f57f1719319688fca1b279cf476303_JaffaCakes118.exe 84 PID 5028 wrote to memory of 4656 5028 74f57f1719319688fca1b279cf476303_JaffaCakes118.exe 84 PID 5028 wrote to memory of 4656 5028 74f57f1719319688fca1b279cf476303_JaffaCakes118.exe 84 PID 5028 wrote to memory of 4656 5028 74f57f1719319688fca1b279cf476303_JaffaCakes118.exe 84 PID 4656 wrote to memory of 4064 4656 74f57f1719319688fca1b279cf476303_JaffaCakes118.exe 85 PID 4656 wrote to memory of 4064 4656 74f57f1719319688fca1b279cf476303_JaffaCakes118.exe 85 PID 4064 wrote to memory of 3408 4064 iexplore.exe 86 PID 4064 wrote to memory of 3408 4064 iexplore.exe 86 PID 4064 wrote to memory of 3408 4064 iexplore.exe 86 PID 4656 wrote to memory of 3180 4656 74f57f1719319688fca1b279cf476303_JaffaCakes118.exe 87 PID 4656 wrote to memory of 3180 4656 74f57f1719319688fca1b279cf476303_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\74f57f1719319688fca1b279cf476303_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\74f57f1719319688fca1b279cf476303_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\74f57f1719319688fca1b279cf476303_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\74f57f1719319688fca1b279cf476303_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.leileikuai.cn/welcome.php?k=t%2FK9qMCtzqrG67buxuvF1Mbrt%2FK38sbrwK3awLfyxdTA1sCtwK3Iy7fyv%2BzArbbuxuu27sbrv%2BzG67fyxuvH672owNa9qMCtvajA1r2owK29qMCtxuvL48bry%2BPG68vjxuvG68bry%2BPG68Ctvai9qMbrwNbG67CivaiwosbrwNa9qL%2Fsxuu%2F7L2oxuvG672oxuuwosbrv%2BzG672ovajG68brvajA1sCtwK3G67fyxuvG67buwK3H67fyvai38r2ot%2FLL48bryMvA1rfFwNa3xcCtt%2FLArbfFwNbOqsCttu7ArcXUwK3G67fywNbArbfFt%2FLG68Ctt8XArcCtt%2FK9qMDWzqrArcbrwK23xcCttu7A1rfFwK3Arbfyt%2FLArcirwK3F1MCtzqrArdrAwNa3xbfyy%2BPA1rfFxuu3xb2oyKvArcXUwK3OqsCt2sC9qMXUwK29qMbrtu7G68DWxuuwosbrsKLG67%2Fsxuu9qMbrv%2BzA1sCtt%2FLG68CtvajG67but%2FK38rfysKLA1sCtt%2FLArcCtsKK38sDWxuu27rCit8XArcXUwK2wosbrxdTA1sCtwK3F1Lfyy%2BPG67buxuvL48DWwK238sbrwK23xcCtwK238r2oxuu27g%3D%3D3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4064 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3408
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.go2000.com/?33⤵
- Modifies Internet Explorer settings
PID:3180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 4043⤵
- Program crash
PID:4824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 4403⤵
- Program crash
PID:2984
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4656 -ip 46561⤵PID:2800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4656 -ip 46561⤵PID:4596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD53657335e6a16bf2e31605028126baadb
SHA1e5d5a1fb18511ebcb49494570a94b92527540114
SHA256433b51bbdd8a72ef859d9e4bc11030dd61b20e78db25fda3780d5ae8fe706548
SHA51229b6d77cb3850711312b6578dc8f647018c1e7ea7ff1a375f55563dd69395d03a960d11e6a83d77c0a93695440fb1c3522cfbd4c957e6e06c82c9e8650785848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5850f058e5f3d38685e9d110370d93970
SHA141d89f6923b8358421b3d69909792040bced2337
SHA2564ed24598c1b80e22ac6c4d83de5ab10de20c30764f57fa83afce67ec644c41d8
SHA512cf0a098f5588286480983169ed7f0e22f99af9f4e57dfc2222bad0f6685b4c027e42a4e467ebbc053a969a25e32038f70694b6cddfea65899b936a390fd25bfa
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee