Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 05:51
Static task
static1
Behavioral task
behavioral1
Sample
8d8f6e5bceb52116c8283ea72c37bb5f_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
8d8f6e5bceb52116c8283ea72c37bb5f_JaffaCakes118.exe
-
Size
747KB
-
MD5
8d8f6e5bceb52116c8283ea72c37bb5f
-
SHA1
b0131445b97bae8be12514f285fbac7220e51779
-
SHA256
beb378f4a6d6a608df965976e4983b9a8bd1cf20075897aa42bec522385546ac
-
SHA512
82cc9c7cfac617b0cbf67c54640c4b57c5760a2b7d17da9d271e7aff9352e1d7b2b0b84ddf4d86e33ddbbcc86002af1a916a1f358c3009f88c3ea9c81510536c
-
SSDEEP
12288:W7F2GlKL2ioCvszUyYoCt3DIi0S80hrRZaqWR40rHeluaL0dUiuRm2Bao5:W7EGALzohzUy2NJvhjyR4kKJRi0+4
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0007000000015f00-27.dat acprotect behavioral1/files/0x0007000000015e11-25.dat acprotect behavioral1/files/0x0007000000015f58-22.dat acprotect -
Deletes itself 1 IoCs
pid Process 2260 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2684 CiScv.exe -
Loads dropped DLL 5 IoCs
pid Process 3000 8d8f6e5bceb52116c8283ea72c37bb5f_JaffaCakes118.exe 3000 8d8f6e5bceb52116c8283ea72c37bb5f_JaffaCakes118.exe 3000 8d8f6e5bceb52116c8283ea72c37bb5f_JaffaCakes118.exe 2684 CiScv.exe 2684 CiScv.exe -
resource yara_rule behavioral1/memory/3000-40-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/memory/2684-31-0x00000000002B0000-0x00000000002D4000-memory.dmp upx behavioral1/files/0x0007000000015f00-27.dat upx behavioral1/memory/2684-26-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/files/0x0007000000015e11-25.dat upx behavioral1/files/0x0007000000015f58-22.dat upx behavioral1/memory/3000-8-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/memory/2684-56-0x0000000010000000-0x000000001012A000-memory.dmp upx -
Drops file in Program Files directory 12 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\CiScv.dll CiScv.exe File opened for modification C:\Program Files (x86)\Common Files\CiScv.dll CiScv.exe File opened for modification C:\Program Files\Internet Explorer\dp1.fne CiScv.exe File created C:\Program Files\Internet Explorer\Exmlrpc.fne CiScv.exe File created C:\Program Files\Internet Explorer\IJL105.DLL CiScv.exe File created C:\Program Files (x86)\Common Files\CiScv.exe 8d8f6e5bceb52116c8283ea72c37bb5f_JaffaCakes118.exe File created C:\Program Files\Internet Explorer\dp1.fne CiScv.exe File opened for modification C:\Program Files\Internet Explorer\Exmlrpc.fne CiScv.exe File created C:\Program Files\Internet Explorer\krnln.fnr CiScv.exe File opened for modification C:\Program Files\Internet Explorer\krnln.fnr CiScv.exe File opened for modification C:\Program Files\Internet Explorer\IJL105.DLL CiScv.exe File opened for modification C:\Program Files (x86)\Common Files\CiScv.exe 8d8f6e5bceb52116c8283ea72c37bb5f_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\CiScv.jpg CiScv.exe File opened for modification C:\Windows\Fonts\CiScv.jpg CiScv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d8f6e5bceb52116c8283ea72c37bb5f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CiScv.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "NO" CiScv.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429603764" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EFF68C71-586E-11EF-A0AD-C26A93CEF43F} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3000 8d8f6e5bceb52116c8283ea72c37bb5f_JaffaCakes118.exe 3000 8d8f6e5bceb52116c8283ea72c37bb5f_JaffaCakes118.exe 2684 CiScv.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2820 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3000 8d8f6e5bceb52116c8283ea72c37bb5f_JaffaCakes118.exe 2684 CiScv.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2684 3000 8d8f6e5bceb52116c8283ea72c37bb5f_JaffaCakes118.exe 30 PID 3000 wrote to memory of 2684 3000 8d8f6e5bceb52116c8283ea72c37bb5f_JaffaCakes118.exe 30 PID 3000 wrote to memory of 2684 3000 8d8f6e5bceb52116c8283ea72c37bb5f_JaffaCakes118.exe 30 PID 3000 wrote to memory of 2684 3000 8d8f6e5bceb52116c8283ea72c37bb5f_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2820 2684 CiScv.exe 31 PID 2684 wrote to memory of 2820 2684 CiScv.exe 31 PID 2684 wrote to memory of 2820 2684 CiScv.exe 31 PID 2684 wrote to memory of 2820 2684 CiScv.exe 31 PID 2820 wrote to memory of 2968 2820 IEXPLORE.EXE 32 PID 2820 wrote to memory of 2968 2820 IEXPLORE.EXE 32 PID 2820 wrote to memory of 2968 2820 IEXPLORE.EXE 32 PID 2820 wrote to memory of 2968 2820 IEXPLORE.EXE 32 PID 3000 wrote to memory of 2260 3000 8d8f6e5bceb52116c8283ea72c37bb5f_JaffaCakes118.exe 33 PID 3000 wrote to memory of 2260 3000 8d8f6e5bceb52116c8283ea72c37bb5f_JaffaCakes118.exe 33 PID 3000 wrote to memory of 2260 3000 8d8f6e5bceb52116c8283ea72c37bb5f_JaffaCakes118.exe 33 PID 3000 wrote to memory of 2260 3000 8d8f6e5bceb52116c8283ea72c37bb5f_JaffaCakes118.exe 33 PID 2684 wrote to memory of 2820 2684 CiScv.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d8f6e5bceb52116c8283ea72c37bb5f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8d8f6e5bceb52116c8283ea72c37bb5f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Common Files\CiScv.exe"C:\Program Files (x86)\Common Files\CiScv.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c c:\delus.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
747KB
MD58d8f6e5bceb52116c8283ea72c37bb5f
SHA1b0131445b97bae8be12514f285fbac7220e51779
SHA256beb378f4a6d6a608df965976e4983b9a8bd1cf20075897aa42bec522385546ac
SHA51282cc9c7cfac617b0cbf67c54640c4b57c5760a2b7d17da9d271e7aff9352e1d7b2b0b84ddf4d86e33ddbbcc86002af1a916a1f358c3009f88c3ea9c81510536c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579e0bebc854deeec7b709e82796e907d
SHA156e5328fa1c0dd409dbd84e97d1d1a56087dcd75
SHA256f5e73e328fd3a693ec324a159c26aeba93e42f2362f0c9ef1c1bde0963ec81aa
SHA512d4db8e432e4bc0cabb84c323650e3e59a64fbc98d990e08664e4fdd3289dde9489090ae39028b4026416c60e8ca17c638280d70c6b635344a87d60544e3518ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5903aa0d69d462ddc8eaf515c13ff637a
SHA1b50a2ed4822d8cbc7ef52343a470e4391049c7bc
SHA25696496d7780791eb4c7c2e6a829446b22101aa0b793298cfb3729a56423e687b6
SHA5127d3417cfc7cbcf00f3c75b73b86dbfadc8c885a37906efb54cb6feb6306522cf0c8235f83693d8073de166cbf71c2914c8c6dc9458ae556330ad9c3dbca5e804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55785e63228990203922da15da0676cb2
SHA1df823413f36d48d38b746f20907c4ad27bba9eef
SHA25658ad93c366c0972f8cc382a3bcc551a70c3c29a63595834e54b098d58e4bbabe
SHA5124c5ecf62e647f417c2c6b3e30b7043f0e5522698278c0dbdcbcb9f97322999493743da071dfe7733ca7e5d56bcdeef38bd195d9b31ec26138308f24c06e65d2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5833e382f54b1599ecf1f53991782139b
SHA185ce7a4a30e10ca81602e005c5cd604a809c0405
SHA2569366eeb07fbeabba1d77f6391eaa2143ae6a6cbb741f8b98c16956c393bf1183
SHA512f039f99f4e5c808e94b468b335070b7704e5f00599c0ce063304f9d1059efa90d8b6317546526d979a49834dcb4863528d25435a039e8c057cd52637e5f8cd6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e577d698a017d4d393bfc9785a17bc29
SHA18c22957fdb0f5ae9c69d88e9e1db3cb7cb38db0b
SHA256dc9bd811c0b6b16a3052a9b9a64116a023f60791d55251af3717cf56c09b0eeb
SHA512e48ae7f46d3fea6bdb8013593e8aba841dfb6ceadf6124f85c44396a61a644575bc251fb05c2a7557e08556dda9bcab1a76a41abf9d942197e0373b671227d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f85098f93ae229895538cbcc9c8a254
SHA1e4c7656c91c2efddfeddb3ef6fe86b28ea4a6890
SHA2562f9c67388ea89003fdc2c8320565d53f40d23d701d48c764fb8ca01ddbaa8bcb
SHA512a9617936020ed726c9ef1d1c8e490a54d622a2800a12283bdfcc6db96f0b5d387ab21ac8c0dbcd86dfd3d878b8c9b1ac44a6508644f597f960bba89ab320e0a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e429637ccc98bbfe091d876b7fc0f24b
SHA10f42533f3577123cbd674d9efe78037a20bb93d0
SHA256f15d8dc882cd49b91ad728b9e176bd01f58223200d66739510613826bdf730e5
SHA51211aea5f554124c8782f36403c214ba1cda3e6fefc6d885a6c36d155c82deae5a58312072a3b719f8f1ee1148abd9081c2af72b0a5171d02929ec1fdf61825d8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7c68f80087288f23c2b0a30e837acec
SHA1aacde6442fa8091ee65dd0518e94b16e219f4dcb
SHA2564b7422bf40658c0e6d3b822eb45e9df944f9577d072829115404b49fbc593566
SHA512f7cfd156f72e45c267dcab0f710bd3f439ebe8c74b633c2a3bd1a317d4eb8319ce87e40cd6709b969e7e190f231c1deb3477f60a70976211a5677fbfb6a5bd28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a057c26c755370e99a3e3272002798e
SHA12e23815265af52d385b9bc8e616cb88a1ffcb6e4
SHA2560460a0ef65639cb97a35b4bacbdf866a63b6bb734ed13103d9199b297860d0bd
SHA512fc2cd6ad783dfd78835a1ae15c646049b05c0d46ae6e83d50235545dcf5a7bab471d53c4081686e7e828d4d1cd0e606bf4ad22df45748428b535a043940e45e7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
34KB
MD5387cf1d2f17aff6967f3107773764513
SHA1b971bcd44988bee744f8133acb032e07d9dcd1db
SHA25674c55aaee905be674763d679ca05a6baaf93f456b5d8935d6293e523766968c6
SHA51219a4fb39b2f9863c92d76016290e701fd6bb1aa5d889896666922fd862d5b72b95a97aa27d3d0b3218233ba9dbcb3db147efbf9e61e5be853d4d3672e87bfd5c
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
230B
MD5ea0c358e88150bae0bc8b10519433ec9
SHA1b7d2f602c56493715a23fa7b64cdc50fc4e3e09e
SHA2563ede335ccccbc045b8b65e4442636591969c66f2194a2849efd8d0b9a67fe530
SHA512ea5c297c207df62ef0b5b3d8215d3eb13bee454c271ff9f1affa9520cda23dffc3e2c0f4201bad9bd912548db81f58b4dcf2403137e2e51ad9d41214202d5f12
-
Filesize
56KB
MD56649262561fba5d19f8b99dd251b5d02
SHA1286e2ab6bc2220b3c9a83720c4c612623210e10f
SHA256824afe6bde1c2890077e9a40c4261a77a1d736429709a45d68ed508581e74771
SHA512688bd75b1e9661f425a21577063362e609ce496880a4780012317d56075095e5804fb7b849b32fbbea06fbbff5d47a5534113b6613f1a236b2a76cd043bba7ef
-
Filesize
406KB
MD5e79169d47394020f7c893abb840b61bb
SHA1c5b9c2cbef3d5458b52ebb67461e84432673fb1b
SHA25611c25cdeb02ac401d913dc48b935a087e32c2d9b7b7c4a5cfdf36e4947e959dc
SHA51221ca64559082a31e46e28513de762fa2239c521f60b3485bf99926f895f0bf6f63fe2162c3e2eb25705efad22d351e24b8283442f4954ac88bc8c56ef5dc529a