Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 16:42
Static task
static1
Behavioral task
behavioral1
Sample
8b236331b10222175230f054dd148594_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8b236331b10222175230f054dd148594_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8b236331b10222175230f054dd148594_JaffaCakes118.exe
-
Size
88KB
-
MD5
8b236331b10222175230f054dd148594
-
SHA1
48d2c48c32ec72e93adb85e2052f02b4d95bb0fc
-
SHA256
6266d03451c23c3b63302434870deea29d74d640fc4914f426a82210574d2ab8
-
SHA512
99f5d5b2c8ce71c6e2e9d479a89c83b34374f472f08e105efae945dc29acfc6ff71398c098907170bd00bb5de4ee289e505ed036a0f94f297274d7cf186e5ba4
-
SSDEEP
1536:9IrtYPW5lXMBsbD1RqwJVlASXn5HCJgSIxPNvyWAZJlrxZY5C:91Wg2fVP3XnhgIxPNvsZJlrjSC
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3068 8b236331b10222175230f054dd148594_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSSMSGS = "rundll32.exe winitv32.rom,VLfMTKQFAbmU" 8b236331b10222175230f054dd148594_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winitv32.rom 8b236331b10222175230f054dd148594_JaffaCakes118.exe File created C:\Windows\SysWOW64\winitv32.rom 8b236331b10222175230f054dd148594_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2708 3068 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b236331b10222175230f054dd148594_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B0F1CE41-5800-11EF-B228-52723B22090D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429556414" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2852 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2852 iexplore.exe 2852 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1108 3068 8b236331b10222175230f054dd148594_JaffaCakes118.exe 29 PID 3068 wrote to memory of 1108 3068 8b236331b10222175230f054dd148594_JaffaCakes118.exe 29 PID 3068 wrote to memory of 1108 3068 8b236331b10222175230f054dd148594_JaffaCakes118.exe 29 PID 3068 wrote to memory of 1108 3068 8b236331b10222175230f054dd148594_JaffaCakes118.exe 29 PID 1108 wrote to memory of 2852 1108 cmd.exe 31 PID 1108 wrote to memory of 2852 1108 cmd.exe 31 PID 1108 wrote to memory of 2852 1108 cmd.exe 31 PID 1108 wrote to memory of 2852 1108 cmd.exe 31 PID 2852 wrote to memory of 2480 2852 iexplore.exe 32 PID 2852 wrote to memory of 2480 2852 iexplore.exe 32 PID 2852 wrote to memory of 2480 2852 iexplore.exe 32 PID 2852 wrote to memory of 2480 2852 iexplore.exe 32 PID 3068 wrote to memory of 2852 3068 8b236331b10222175230f054dd148594_JaffaCakes118.exe 31 PID 3068 wrote to memory of 2852 3068 8b236331b10222175230f054dd148594_JaffaCakes118.exe 31 PID 3068 wrote to memory of 1244 3068 8b236331b10222175230f054dd148594_JaffaCakes118.exe 20 PID 3068 wrote to memory of 1244 3068 8b236331b10222175230f054dd148594_JaffaCakes118.exe 20 PID 3068 wrote to memory of 2660 3068 8b236331b10222175230f054dd148594_JaffaCakes118.exe 33 PID 3068 wrote to memory of 2660 3068 8b236331b10222175230f054dd148594_JaffaCakes118.exe 33 PID 3068 wrote to memory of 2660 3068 8b236331b10222175230f054dd148594_JaffaCakes118.exe 33 PID 3068 wrote to memory of 2660 3068 8b236331b10222175230f054dd148594_JaffaCakes118.exe 33 PID 3068 wrote to memory of 2708 3068 8b236331b10222175230f054dd148594_JaffaCakes118.exe 35 PID 3068 wrote to memory of 2708 3068 8b236331b10222175230f054dd148594_JaffaCakes118.exe 35 PID 3068 wrote to memory of 2708 3068 8b236331b10222175230f054dd148594_JaffaCakes118.exe 35 PID 3068 wrote to memory of 2708 3068 8b236331b10222175230f054dd148594_JaffaCakes118.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\8b236331b10222175230f054dd148594_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8b236331b10222175230f054dd148594_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2852 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\UHzE2B1.bat"3⤵
- System Location Discovery: System Language Discovery
PID:2660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 1243⤵
- Program crash
PID:2708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0688fc1161bf9fac54e274af6959b61
SHA13460e468f83c3d29d17b10ef150fc5fce5c69aab
SHA256b110283da82128d6cbaacfa1fcef93b3d175751e4a76708a52b6166c2a2c90eb
SHA512637342b1d5b61e19807eee1403496695b032eb4c8e3e1372c6956dcbfeac96db9569101dbff3a1a21e6091c298fb9b81ee0bb942563b9b042937028f129dba36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50956c7e814ed7599d1e018969176be54
SHA1e985ce3c594f5ed1a353fdf336e74813da5b3ff4
SHA256729a630a7dd62da96cbd0436245b09096d6c9ff3f3004574f35686dc7dea7db7
SHA512912e3b726f11c161be182bb0f1045a97876ea54bd9c31715b8ae1640d4428bf83221112df4fd5318109acb067fada75eedb5c2711d9caae7f702bad2fa18dcb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe8b0b37fe703c8e7f177ccc0160614b
SHA1d3f9b4a8642f64ce28967babbafbbe49a0431dbf
SHA256bdb6d6f3c93589ac44e529506cf54b52ba8da94c077c708827cefa8e95c0f693
SHA512859cf988f9321b64db627868eecc08eb8c643fc9c7e6f1edc4334f4cc8d933f4cf480a4e23b7f2ae9b9109921799356083b550004902b95a7620d8336b4325ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594f0906a4252065e3cad04e83b51c5ad
SHA1df1832e91d85d0c8b426d6dab6e45aaeac036b4b
SHA256df891148dd5867640535804d30b06c28a741c4cdfdea5646a6a170afeda9439d
SHA512a604b8c196937d3e36c9af8248b0d9f5ebd3cdc7cb929bbcf63e8bb4e977f782fb9ec8bb2ded35eca8da84eb14b8342153a6d97063b90912753ff91c13743b21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faccf399d3560ec3135daa65f7bfa316
SHA153de8cf1bbe5405fb086de3cc16137f993a984b4
SHA25617e7fad347062cd2a28071b3c64de9ed7a00e00668bd32c97ec1fe457b58d399
SHA512b188588408811a65d8091009c2555894098b9dad08270567dd84a115ad96c1f602f147c49227243644f75ed7590c6210fe21d0bb9d4ff1c654b90d6ac9856cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53959c50519033bb6b22f5e2eb7b34ffc
SHA1b0fe9ebb6318c4da423aee82c7a82d4089512be7
SHA256c5f9af2ae0b239a41850f2749f4938adf67869ed462c7b44adbdc70aa9e00d9c
SHA5126fd87a6f107e66b9eaa81940dd9f9729930baf57e5d96015dd3f7f292788dd3ad345f9adecadbb95e17050667c32bde2c7faa6f1ddb59a846c2c87a5fb9b9874
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
188B
MD50562e1496e87fcc5af56eafab3481868
SHA1b94c206b4bcac42c60e87bb059a03f2a5b273bc2
SHA256db2846237af3d5fa4483c55aea366f5e4de4d103aa892e936ed48a21b86fabbf
SHA5126d83627e85fb62821261902806d5244dad3d955490af5c3c2b1536cbf751eaf969a5caffc099f144bd46b3087a6fe4d430d2eb0bd9b9eef207fa4b4fe22e3b62
-
Filesize
62KB
MD596ba2119679f3a09985b523ea3e61df6
SHA15981d6b07068f8f8590ee49b4175d568135b941c
SHA25694f9e3d1a98bdc0bfb5b2c95b0755c9ef9003e69a70679acc18af77e81e14368
SHA512808d9f5c3dd8e0e4b154b353c9ae4cdffcb436b30a67080d5ece80311b78955cc03d8ba392b324873b3b2862c6cf649fe4e63dedd809c1b60f866e931d05dfa4