Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 10:27
Static task
static1
Behavioral task
behavioral1
Sample
8e625ac043aac99d18be960872b83961_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8e625ac043aac99d18be960872b83961_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8e625ac043aac99d18be960872b83961_JaffaCakes118.exe
-
Size
15KB
-
MD5
8e625ac043aac99d18be960872b83961
-
SHA1
bf23a734b0cfe28f58401cc98be56dd26d10d073
-
SHA256
988d93ff33051f2230045001b60e12c4e024fab7ff1c54ecaf576106d2027484
-
SHA512
d683304b005331092074dfb5386d826a6d33c7282bf3337b39091bf08300bfb67a60eb8d05786f206a67e3cc5d602ad6046da0f4262d15f5a5ddab0176ac283e
-
SSDEEP
192:nSs61A/0LiwxqfKD6Vk/gqWhiQ7Sh92sGNl+vHthQjcWpKrgkx:Rx0iwxqsRQmh92tl+fthAzArX
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e625ac043aac99d18be960872b83961_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000055c9ac1cf18270aba49d0b0066d3d7c195811fbeb7ef6330aac041e86f7e1ee7000000000e8000000002000020000000ceb1295aaa7dc900ad6753db367b88d9e01464b22521d1dc18c8ccbabe2fc68e20000000a8f6b136d0ee2e20bb0918e89cb108d6cdfcac39339138b839454336c291b0eb4000000024574b8147122361fda3c390578dda72b5530bb35398495adbbb52c097a031a9806636d4a099f672df063c0fdbcbbabee6c38b8c0e486aa9f0cbbe14c3190206 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429620326" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90682f58a2ecda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F7433E1-5895-11EF-BC8E-E6140BA5C80C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3008 iexplore.exe 3008 iexplore.exe 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1940 wrote to memory of 3008 1940 8e625ac043aac99d18be960872b83961_JaffaCakes118.exe 30 PID 1940 wrote to memory of 3008 1940 8e625ac043aac99d18be960872b83961_JaffaCakes118.exe 30 PID 1940 wrote to memory of 3008 1940 8e625ac043aac99d18be960872b83961_JaffaCakes118.exe 30 PID 1940 wrote to memory of 3008 1940 8e625ac043aac99d18be960872b83961_JaffaCakes118.exe 30 PID 3008 wrote to memory of 2040 3008 iexplore.exe 31 PID 3008 wrote to memory of 2040 3008 iexplore.exe 31 PID 3008 wrote to memory of 2040 3008 iexplore.exe 31 PID 3008 wrote to memory of 2040 3008 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e625ac043aac99d18be960872b83961_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8e625ac043aac99d18be960872b83961_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://get.live.com/mail/options2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2040
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593acec755d6e6d2b6a8586468468a794
SHA11d24f9d105e655e1c6e42db4716a0f18ca7225e1
SHA2562a9995e2a974886007b8671758ffcfe719f034f7edede91df70fead0587fce6e
SHA5125e67fcd83b9f3d7bef7e8468e14d0182a329b3653675a1978c89ca5c022c28c441a695ed6997ab19fd3b38f348467f8c11eb4359939245d66335db415cbfb089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563739aaead1993a0cc6404a30a95675a
SHA12cb96303c73d7af8b430fac86a291b3561a9c603
SHA256929ee3708644b22a74b2c6d6491006ebe41a018b0a027f3480b4ee5c1dbecffd
SHA512e1acbc310f082fc5501f908a740c2a6fcdbe1621ed0ca1f6ed208be90ed53ba47327e537576bad0d99a8b76cb78feee32a0ff062837ffbd8600fa7e8e276e83a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e181275bcf1ae030267ff53e6c854624
SHA17384e3d8368aa256c30f874c0d4a1e297e02b584
SHA25669b496503ef6cd43f52cc6aeb958e66be69cab7e4a5851d35c4c1c0c4c844df0
SHA51270bf422464ca8ec8472d6e005b7487bc6e25ecb815efb09c020025d3f40744668169ad824bc2572d097d48e0cba3eb69f8e4e49089c9d58d3fd3d84b5d8de2e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f404b9181b6f17a08dec114f66f390f
SHA12d7264a1bec94701d02a9b569002a08787553b54
SHA2561b65026cd891c4eed82c028430ca9a06c91ceb3bb2df8ce409191d2ee2f6f3ba
SHA512848877cae851ad35c371bd05eb1f556f43e6a018e8684be76ef1fe0cc2982f9b8756d960cbdceb31a384bbca22123c946dae014d353aac78dfdc91585f355012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afc0594d2df10eb5caf05595fe6c769c
SHA18f42b45ee0cc1d4287c8f29af10ed20ed6d56212
SHA256f7a6a7a63d68da32c01027402b58af03a53341ef22c682ef5a9f1d1f37969694
SHA512f2478e4483afa9ac54009df05da623052b1903555251b093e0108551acc4a3e90ae27fe65c819076ecab322b42da1f5b8d3f85659991f4226b308a60b715dc0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d427bc5c582f33a42c692304f9040378
SHA15d5e39376daf1ad987e7a07fb691e2d3f4508b29
SHA256da6cbabd52904b0970ecf0957bddf6619eecec44d493dab84188a823b1b6b27e
SHA512abdc9f0f0c5720a1c40684e7801293bb8ecc116d5544928509b8e88176bf1154a06267723731c05189e1b1cb72aaee081487fcaab133d2948ccbce66966024aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592a1fc8ec2fb891470e6de1384120312
SHA1fa5f3d347e6c037ad9fce3519b24bcb5e9ca92e7
SHA2569aa40925485cbd66331dd602e24d78e7e088c3087c517392bbd9926467503612
SHA5124174ace93c58555f50ae99e95622576b14cf6014c407e7123db54663bb767c65af00ee0019b64c686de08fe43ea0ca6aa6015f17f9ee050789aa699e8a49ae1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebb11b0a79e3cbaeeaa30b4118358fbe
SHA1bc20a054f6215222fbd7be3b1dd6a8abf31c8fb7
SHA256fd4903a42dd4864244653d2b556aaa6b7cf0142067bd0f4a481be3761a5e334c
SHA512e20410ab80dd246df4076cb7ae0d9b925c4fff150f728400b6a927618b1736e369d970dc5ca4aec58208d7709a61f325e0f15beb6a082516e05ef631b13bde22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd303c4fcf7c0db3c2d5e3319e683728
SHA1a0718b0a19d72a2925e09c8e8a2f3f2cf9c8392e
SHA256059ce37120a119483a1f516858b14ced78c13f3f4f6f3a027de26547a2ad112f
SHA5122ef139999dde2c50ceae68fe1a219d3bf93357d0c7ffdaa44d73176a53aabf514f580662c6cde9c1a3493543f6bd0cd0acd73764b9d841263107221a4b710a30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5297e5920e5a0eaf7a15fbecff6dc6edd
SHA15bd4b6792e4a2736ba7d8e438e64e9d9daf6e70f
SHA256fb11206175e352b3bf74a642a16e18471988e24f21710fa90086f45bdb63ed24
SHA512a184995490e6b88550e5a258c2f69628acdffcff5df6bf2d22a89f016103901eab01d05840a8e5abe91f04faa41bdeb0a78bb58d056cec279314f685e936321e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae240d313071fe6a88a833c2cf5614e0
SHA1d66017102e235ab0990b23af68f1f31ddac1bd07
SHA25636b643147f06590dec6e872cc877aade82d44b4f2fbd246bc657042177b77ee5
SHA5120c6ccdfc8b7a1eaea21893fcc5ead40cd819b4bae9b92840c9ef2b24158ea230e171884bcb122b8c3a190f75658eaed00007a9e4b47bb30c0134f65cf19c8509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572d59e01b18b2fd356e758bd27045764
SHA1413e53af521ed7d7320ad6313f53348cd08f0f19
SHA2568c27f923817f9385db83fdfbe2e077e303f316f7279b519d196f1eeb697ace12
SHA5129caca45575b9b3daa659ec5eaf2374265a17cb5fe5672b92d05480df2d76a9ebfdf149d1420ea2ad7ebe8c67878ea9830b6e6330b5240db3a02cdec7c9367aa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a1049ddc65b9b1a330abc755397de11
SHA15eac7a75f467fe9ec368b81cffa0fa9843410880
SHA2569b91a82734665ba7002200a2752e6d5ea1f42efbf6950ff28f81a5df90237330
SHA512d9d417a0e0f12c1659a1dae47032afbf0c811ecad013b1c640c66041c981f2e1a7abcbd3035631bdc9eb2669ba653bee8f326d77562d5974c78e57cf5412047b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbff2753a3d3b21796da97407e351e73
SHA18efbf9f9ad21d35119668cb112d56425a480cc61
SHA256660e5c5ddbe400efa22ef7b31ab98241da6ff852c3171b802190a25f997d3b68
SHA512c80d4ec32a7d3135684f97540d52f4debfa6ec763e25f2efc5bf1a0f8174521e5f232b1c4324e4b8e22ece5aeab6cffb7e6ae9e2f687a8d57a811735cb4c8771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50320d59b7ed7b1e0db6fab2e272de288
SHA19914c0f73d026ed948f3142a005a0c80ebd9be9d
SHA25613156c3451b692085a6d06359bb02756c103d4596603175941d4c51d0ee86fe6
SHA512de6ba505f8f27a2f3e0993a4032d1d25a7321eff546e4ec2627422b63b48ab76530741d2e6189869e7e0814ea7a590d6b581596968d5324a0e4699f792a6bf12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5185866d7e5a234bfe12e0f83da016cad
SHA1cb471c4bed733a6239c872fed426cfea95b042cc
SHA256b409b45c6fa3fa73d2707f8f7be531204e87d99496b61e624ebb1107cf6291da
SHA512ac39b0954ec000640898e3a6883c3ab11e8fbc32849e39eae550af4cadebd92fd739776141b14e4225019b136b2628101fecd1b9db81a93b85aea4eb8bc472f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1ef923b8c7033a2c0e9dc039ca5f65d
SHA1e79bc55ac9bebef37f313b7bfc1c14e7a06dced2
SHA256beb1dff78d90af42ebf87890bb788642e749ce219eb165f82aaa1466093c2316
SHA512a45ef0301501f3c7ce4319edf93d12b28e12fc458a0766b313407d8c7561284ec24852e1730f8fa76f526f671fffc0dde7546a9258fb3be839925c44c9f6ebd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5047644dd60e8f15fd2ab7c64b9881440
SHA117789d2d7456e345a188ea483ae5fb587597d3c7
SHA2563f54ea954fdcf284f6e11a24a321bcbd17db39549b336a3d789f0303fde8f5a7
SHA5124ed5a2bba65dc569ebefd19aea0a4b2d69a3bb5d2dbea43f62de18da25e9239ac3dd7c7deed26bed03ae41c7d8df9b81a9cfcdd7d303b05e945186de6a4ecd74
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b