Analysis
-
max time kernel
149s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/08/2024, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
83870fd4b4cc6dbbd71aa516b5c181c9_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
83870fd4b4cc6dbbd71aa516b5c181c9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
83870fd4b4cc6dbbd71aa516b5c181c9_JaffaCakes118.exe
-
Size
9KB
-
MD5
83870fd4b4cc6dbbd71aa516b5c181c9
-
SHA1
2761854d57c18d89b2dd4d6984c4dcb1d65c6401
-
SHA256
380ab11290df67beb0da81ad31144fa3ab01f173c0c88df54fbce10367d72b27
-
SHA512
aaed8ae72f3eeeb2b25f1f90f11ab371405ddacff65c2affafb60201d7e777ee47b2cefdd80845a29111f0cffc3b5c58cc2017f005de1cc47c9b90658649309b
-
SSDEEP
192:kQ0EJMEbGhFyHJYqLTPCaiMyb75E+mAVuMuimqzcJ7ZUbRV5sf:kQ0EJtiuH6iTVyb75E+gnim3JObRVOf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83870fd4b4cc6dbbd71aa516b5c181c9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C55EED11-5691-11EF-AB1A-5A9C960EEF88} = "0" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90e1ae9c9eeada01 IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000000250e0f7f9458bf130cfa637006c9dc1c958faa8a05baed345754e3b95cb804f000000000e8000000002000020000000f34553004279a3da3e857d44d9b4cab3ab41eedb2a1e2c1771f11883c1c2082320000000468ef0ca31adbb6c35b1655e698b4a300fb17d37df651a409bccc5ce26493864400000000d5587fe0be942ab529b77b4a7e2d067d2dab69be17d98c426ca6b3d62a0fdad8494b76df0a20bfe051fb3123a49536a32a5bbb93d416ec97972acda271def23 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429398822" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1880 IEXPLORE.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2932 83870fd4b4cc6dbbd71aa516b5c181c9_JaffaCakes118.exe 1880 IEXPLORE.exe 1880 IEXPLORE.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2932 wrote to memory of 1880 2932 83870fd4b4cc6dbbd71aa516b5c181c9_JaffaCakes118.exe 31 PID 2932 wrote to memory of 1880 2932 83870fd4b4cc6dbbd71aa516b5c181c9_JaffaCakes118.exe 31 PID 2932 wrote to memory of 1880 2932 83870fd4b4cc6dbbd71aa516b5c181c9_JaffaCakes118.exe 31 PID 2932 wrote to memory of 1880 2932 83870fd4b4cc6dbbd71aa516b5c181c9_JaffaCakes118.exe 31 PID 1880 wrote to memory of 2748 1880 IEXPLORE.exe 32 PID 1880 wrote to memory of 2748 1880 IEXPLORE.exe 32 PID 1880 wrote to memory of 2748 1880 IEXPLORE.exe 32 PID 1880 wrote to memory of 2748 1880 IEXPLORE.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\83870fd4b4cc6dbbd71aa516b5c181c9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\83870fd4b4cc6dbbd71aa516b5c181c9_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files\Internet Explorer\IEXPLORE.exe"C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1880 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51858584dc4a665f02199d573359ec353
SHA124230510e348d4f41929fc9ca24ddc11a8937c03
SHA256730b58329825a9e4098c63652ec74665cb206b0cf54f75a5b13e08792dade274
SHA5121ab75b8192131fa3b716f905c8f54d42f9b73cd2628807ec6f195db613df4d59b24f6aa7f2771aafd60030d6627db00ee459fe8fa99397c264d16e6c2c71038a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5268b87ca45bc9e6ede9cc19fcf0710ce
SHA13cc619a8b073cea4c89228dcc3c9ef7ad7e7eade
SHA256befe2bf82d6ba51caee536b8660328c7f0aa644681aed41190627d48b4d93b7a
SHA51268e3df3a2e297f60fb61ad54158c674e6351bc8eca29232b6e5d564c411c284af920d9dda0a5990b79992fb88efff1daa7fcadb8fc1dc9c32b81994f64634e3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eed2a82f64277d8c3d75debfbebc18e7
SHA1f06d35652f52f3b808f88da8eb5020b467b056e3
SHA2566f6ba7238eec607bf8988c5384763797f4779aff02a5bb9d16596e6cc0fd8838
SHA512836f3675a8a247c99ccf1a0172df4f53539ad4000734469f37814e16b580a819a19e3e0333aa7468435b0d690dde3211766b34841caf0b77596628033156142c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564f47fde61a8530e10c58026b3973b96
SHA14ebd553ea9384acb4568820703d7dc855b2c2e12
SHA25601b3d05d561eab5d40e10250786fe79f8e504ca09c5d379d0b4c5644db15ee0d
SHA512bed727c21e844b819075dbe9745c95b49bf7592b95fd997be8693005792e750e1119f966dc7aa78163aa7fa7ff29f61c69c7c8a3440670aa382c8c23aae7554a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537ceddc51a7e8130dbecdf1ef7ab35f5
SHA1405c2700eaed685d51b57e8ac9003313b0bef04d
SHA2567b1b4e01646eb64376bb6735417d6413f0586d867e7b9395fe7cfa46bce40add
SHA5129ed9799033a9b72b549eec747257563f51b864dcfeb2d440c160e04c6c48e48a3b62692545fa414870bc0008a7e7566e23b1c71ff2269856f4ccd7a81cae38a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a01706aa73da708d590f064c2b781aa
SHA1e91aa62191567861ddcdb6071ada69f0142efda2
SHA25680fb55110d18871641106d2907823ec63eb0102c3c6b7d8d4c2896bde5bc7231
SHA512e0a78824680835a335cc96b2f5da9af680b864ac95aaf53686c4aa771f1a67ecae4999f725422927c9ddbcc21bf40df03e5cbe8156372bfa5acae197c33510f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530e3b0ebf56c20799eb4469bbd373eed
SHA109564e914053b486799ee2d81fd21e3105a5a798
SHA2562c3ff828b7140b353690484bd37c9f58b7c2dd95ab47f2ca73a66c5581f1a067
SHA512d38937f4f5cf85d27247ae4dbcaca74c50f98f2a98f007b75272fb50e0ed904c8786d5878f2feddc8eee1ee1c8f3433e22e0476cdf478630abd7c7d60b811d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5959ea28b51ec27a829cd01e7cd6451
SHA1340324b550266c4e06a2b9bc8982ca9e0b49a74a
SHA256f282e9d7de60452f0c36b80b79961c3da7c774f51af45195e3789fde2a91f525
SHA5121de6909468caa8c49ce165e657900811031ed408aba5db49b698889312747c15d20ce4afc4a2ef2c4ef89e5995203c64662b6cc35d18bcb93a6acab6bdd8c4e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598fb8ae66523ea3a6fc826245c59292a
SHA195906a60691f037602f2627cade6a5418acb68f2
SHA256602d507efeaba321dbd196f44573e1f16e2736c7f3b2ace883c9a67b92feea9a
SHA512f5f4d1b9cb7a2a0cc18b5187170fa40ccbc32ff5fb7d1c8631666be003e19505ea23f3e8289b77076f00fa9b41ac8c85a7d814ddd711e8863dc8ee1c1f149215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579ceb04fecea449bb3ddc999996acb80
SHA1a3fef052ad8d872d99c039b5d6d73da6d9f0f0db
SHA256cc6b0eb12cb9e46c7d9214ff4c62f6cdb757a2715dd03a649710b988ce3f0d69
SHA5121c38be784c1f2e5a605ae765f1387074893b07b23606ca3a71e61cc58e3130958422f143a58015a91b503b424ec2dd25df8272190493d7985cc68c39a2e31d82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545e0b70ad664dfbcf2507fa7a1c35e44
SHA1f99c3b12138c082334220e160d1490f55f5aa6a4
SHA256d662a9178fdb6fee39e35fd39455c8c54bf1c742a9d3e4d553b621691d765492
SHA51226c4e096181b1f2166506f100cb6f33c8b37f182aec78920aa497588bfc5ef7303556efdb9a7c6cbf80523a35e0f44fedfa323b9e3abb6713920bfc954d81aec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ca12233ed6b3d0ed273eabb2d17da44
SHA155b7c04e213fbf5c165bb266e8534c6ec42bcbbd
SHA2563a25887eb75cf4af47c4fe8b0f7d2cad3e79fa22c506f08d0f560a92fcbf094a
SHA512e2e0092a52b54cab5941301aa5cab32c51428fcb2de8965739305f0733eb7e70bde8ca87b42448bbd6465fe7aa4e72681dfa77f199d8cd6a95719d1bac81814f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df83f484b5c3dcac5bd5a031273e0c06
SHA13ff76a4e32db4c74bd95988272476e1aa5ff8367
SHA25609073d88bae1c7eef64fe95372c264020aef7196c8493cab3b33514a0697cdb8
SHA51289e7483a351a6db64bac020acb61c9995ebb528e44ec16b18278cd47a8df6f6c4744e730066b4291344a973489420326bc248e9bcf9c842f4d35b66eb18f321d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c2ed6c6eb4c4b22a9aca43db8662e75
SHA1d1fdb59d54bbbf17cb267ab2224a9cc6811de1e0
SHA25619109e1f504aa3f657c36fb23beb0fd9bb4d16812806dafbbb86b4fabd49c8de
SHA51246bf31592b197dd122c25b810f731741409a7d5be945db937f40d3f368b31c567087bc2aab6065d73e2a204e681ff6b36fbe22120cc740b1c3c7371ba610f4c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d0be9473662e27c01d521b9b267ed7f
SHA1bf2e4e8f5bad3a47ee56465ee0af4a418d653728
SHA256c3a243a9ec2a49f2f78e21579e9006b0741840e53b847659fe4b42787ff5c935
SHA5128dbb3e218e40e42fd15f6c35ec49e33d803fd7aa76cff0d69367f4236ab11b89bd9085e300cc750de2ecf089517d9695ad374df82c700c5389e32f26475972f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7d5a862c3274714fbd3c9bc8e030332
SHA1dd9af840a0b1319265dbd620463f809e3f2fbcfc
SHA25672ecc65b1eebfc3de5688f30d15dea447de8bf9042e33784ce857984f82dbc86
SHA51230132a9c9b244976273c1d55c883d2f23cce3997c625556440ab77176e7e3bd4448275314a06610e68d9cce5a4a8baa7f3ee5fb03b015be8155d83d8d25d8a0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5378b4f3c48566e01fc9ea74261768abd
SHA1430604762ebcf3adf31695f78c5f95c946eb1c03
SHA256edeab3e449f69a9db0005e9b1a912963feaf1a4b2054ced475c58ea2c6ee50ef
SHA5128893aa5a24196a9a3a04cd1b5d0f5cf2635427c667d4105c91c7282bcb228109c3250c3024fa995246585ecf399edefe44674ffec36cf6d1d50f0f8e99de50b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51562eb5eae0f793267b1e9187f8fe900
SHA103eeab3014de6cad4d366717d9b47f2ce7a96ee6
SHA25632c821ac89d156f3f74cb254cd489c352e0d3cfa1bd6f468756ed5eec9e3287c
SHA51201a739db52b46e738bcdf5059c06e780df6f6be3fc53fca434f109aa1cdb36a65aba88e7270a5bd838c816ebff9d8af0276c4118d35a087f8aba2f423f0f30e2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b