Analysis
-
max time kernel
52s -
max time network
55s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:26
Static task
static1
Behavioral task
behavioral1
Sample
81c79662b312b4349fed69de7d38d109_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
81c79662b312b4349fed69de7d38d109_JaffaCakes118.exe
-
Size
29KB
-
MD5
81c79662b312b4349fed69de7d38d109
-
SHA1
7906f1d2abba4816493554977522ab9bcfcc8c60
-
SHA256
ab99d5f2146ee8393d58ddc5a089a836c2d67625558abe093a08a8f95ea15d5a
-
SHA512
b550bc43757b69beb54baab4526732c7dfb7cf624ff88e4de7adf5e87b18b59b57a4c14de10e4385c77cf6c796b8faf8ba570cd7b5344affce6a25d6b1c7ea04
-
SSDEEP
768:STYszelexSsoDLzV/1EeeYRDKJVLVo0CF:SFelUOLzh4VC
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81c79662b312b4349fed69de7d38d109_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000000975ab8d7abf27495a77cc8711c1047da25bed6bc353b8bbe1ccc46587c41b78000000000e800000000200002000000006d27c66a6f20ed91174f927f5ac3a4eb671f130c6212c9c98e4486a391e75c590000000bb3750665faae598ca378274dd84799db0357272e0d71cb32f9389132fdfe7dcd9bcb380e7d0b75ecf23a42e111f07765e587d976ad7076699d5917f005bdac5a2bd0ea733ed6d00d923770eb5b3e5edb9a255ebb0c779e45ab87916bc583653476a88caacd95b2c71db4dcef42564f2d8d6be717f1ff9e845a74e3bb09650c67014a023892d8f9c5058724c58a0255c4000000019b1913bd927af716f7b2d3af587152b2805f4b9aac22701dc256ee95d53ddcb5dcb89451e1146f54d7a4706e02e1add52df128aca3dda14aa19f7b537e6ea1f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B5CBDDE1-504C-11EF-A429-7A64CBF9805C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Cache = b104000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000e8aaf38348914119122cc71f5a89e7b136fa7d9026a5eb8802ec37ca49825330000000000e800000000200002000000053dd2a6ee1c3c436b21a07bda4bc37bed07a93663efb870ddd4a053842807684200000005a1dda441c78d82f9b60ca62524993dfedd2b45f3a8f68fbc878c50338f51c50400000006bb00dcf118405f22cfeeb33b2cdd4b675a6bb329200d4c34405c9b07a21e99ed8a307283998b033f416742c45e06bd44d2683801aea59f67e98f8f3c3e70931 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0b4468b59e4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\adult.oo.lv IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\adult.oo.lv\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2952 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2952 iexplore.exe 2952 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2880 2776 81c79662b312b4349fed69de7d38d109_JaffaCakes118.exe 30 PID 2776 wrote to memory of 2880 2776 81c79662b312b4349fed69de7d38d109_JaffaCakes118.exe 30 PID 2776 wrote to memory of 2880 2776 81c79662b312b4349fed69de7d38d109_JaffaCakes118.exe 30 PID 2776 wrote to memory of 2880 2776 81c79662b312b4349fed69de7d38d109_JaffaCakes118.exe 30 PID 2952 wrote to memory of 2732 2952 iexplore.exe 32 PID 2952 wrote to memory of 2732 2952 iexplore.exe 32 PID 2952 wrote to memory of 2732 2952 iexplore.exe 32 PID 2952 wrote to memory of 2732 2952 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\81c79662b312b4349fed69de7d38d109_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\81c79662b312b4349fed69de7d38d109_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\system32\wscript.exe" //B "C:\Users\Admin\AppData\Local\Temp\QktZITmBj.js" "C:\Users\Admin\AppData\Local\Temp\81c79662b312b4349fed69de7d38d109_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2952 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591e27997fa5915e218375458c33a4568
SHA1bee7e873cc98ad9094d1b84e728a35fd7b71087d
SHA2560a9645652448de3f539f26ab1ed9af89ef3c647790bc4dbe3b8b39aeaa68ed16
SHA512a34bf9d0a7fc1ddcd9bccb08272e794ae0b79f032d9e90e621d695eebb959e0f1e071ec11aa1a612a2ebf2acb7b5c613a8c1e17165ae9c5f6e24112e009cd35c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f078ebeeb035e9120fef1e5ba43406c
SHA169450a59d6afe2997136f7608e46328138f98fcd
SHA2560958163854247d5452f362861bc17a3d0f953a2f2f00c19f76e1d6c6d65a0572
SHA512e97c61d161ece873ae95eaf5304ebf71376986aefd544539276049e44d46a2186f029aea9d879e2c73ea7a198fe6335cffcd1549c126b4c1cb6bb1f4521f7f7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54422fc2a37e7e83241c64bb6756c9e9c
SHA1b0b39534ecf5c6b98d81ed10b5da537818139994
SHA2569c567fea5ef469d72d0d692ea86837ad5ec7277f4ed8daa4c673aa618669f581
SHA512bb5d94c5ab6484798977d307b7765812a4133b1ec9502603e2645f1263afdc06df510b819fcfd5f450a6d014b388fcdaedc7dc8bebec749ab33277e0d13be17b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c21ef327f8975f8ec020cca64717a031
SHA12c17a1833a15a5e161861570e497292c6047f153
SHA25669534c68422f6993f46e793847298d140feb2c09773844b44a17ce8238ccc073
SHA51221bf3cb293ebf2fbabc62f4cf7b59441964bbc4316c0d10e08c06dacd65dda5894c21af9e468b3f2084cd54ee7ecc12b3637f0be7486a933cf77be734afcc7ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cefcc7278076b855e18defe97ab6e3a
SHA1170c1a27725216c2c47fd045361b1edfb59b6344
SHA2566a62e1dc89fcec2012cc5fe44e47797ada09d44452d2635433fdadc767980c0a
SHA512e0ff198924badddff92a32bcc351b68b85f56e4bc144ea8bc9bda4326dc5b4bbd9c7aa4f7c34ba303b32acc9dab7ce37c50d58a87619c9972726d464f827d77d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d46adba21b2a707e24e6459b55a16d2a
SHA1d44b1072cb5030fce0dd3964eb69e493559abc61
SHA256063568efb6acedfc1cac6d34f00aa680b79aa5de5616cc584063ec9049560b7f
SHA5121d8a96483297fb8423ffd63eabc064d8d66a3e825093f4a64946f9695836b282aab666d88c85a5abdaf9d4674ac1113f7bd603df37afc54ed01e0d726ac8d8ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7f67fc206cdb1acf1384fbfb8ddde6d
SHA115f607e45adb4427e272261c307804f4d27d6477
SHA256525520bc0aeae22abf78e38442c4d591eeb3e3d3194d6c2f23d5bba6445ec68d
SHA5127cb2ba661035ab576950129bc536921a592f3ec15abb6b8551479b68a00b70e78e6584af89cfccb22482e0de21fafd8af609c3ff2aa68205c5e8f9474795c4cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdc9d2d8ed83810e7e443499d79538ec
SHA143b54dfc05556fdd66f3b45588322c9808de54b4
SHA256d1d89f2983833367b45b50f8674dbdf7b27863ef00228088d852b0e8362eacc2
SHA512336f819bdf53ca2b290c40944434a9c72eeddb89a7f8d34b846d6c794f32ac70925878ee65cc8fbb5b4993ceebbbb1f767ad846397d9baae68013f954875fd71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b4263cde1793ee722b55c6766ff90fd
SHA1dbcf906f5404929247a2c25c94a4ab82b2d2b9c4
SHA256c2a2399d01aa76f24974fb42e513d440787a4ff6e9a5b7411369cdfe81647928
SHA512fba04db36f7eed6b98b02a96f49f6f07e10dc3e8200ba3b4fe0c1cdd7bd8ff6aa3ccc1252c4ec1c6098023d454cb3d4551d1c81ceb034e2cde4d8b8713188dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be555b11b4dd41e75ed5a37fdcf88c0d
SHA1e95aa5fcb736e158e8d9ffe200cde9c4b2dec942
SHA256c6b08c9fc58e1731ce158ddd0a604cdcc48896fc618064fc60e0830062923bf4
SHA512a18707430a18148d99cbbcedc54d9cfbc8f458a3830678a749f988d8a6024fd41bb1263c40ac7ff012781edb0d7906aa3b15fbb171ed89aceba0fe42357d2ab1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDDDRHWK\favicon[1].htm
Filesize291B
MD5b73189024a094989653a1002fb6a790b
SHA10c44f096cd1fec253c1fe2fcfcd3c58fe05c402d
SHA256014c471c07b2bc1b90cf5b46eb8eb60abe3ac278e43cd8fcc7c4e6c8950c592d
SHA5121bca726835d33847812060c968e5306535f513429de5c90d66942155fd42ff75508dba97da8ca36c6d6e6a8df5a2602fe3be047bb5612ad4e367c6c00e1e50a3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
4KB
MD5508dac3231a3b5280f7a0f2c101e52f8
SHA1146aefe775f7368526b3dac8db52db8d566531cd
SHA256c247cf2930f4262d590aea3987c3c679f851e6573b37e64758100b27321a1dd7
SHA512682dc85c20b04c8bfdc708a972dac57b476892916dd2102f4c1351c0c75591653a5ff2ee96dff749c76ac794d8e4ca4cf7db01b94f02d1e82a47bbbfdab38a5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b