Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
94e7555da83aad6a60f410609eb57406_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
94e7555da83aad6a60f410609eb57406_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
94e7555da83aad6a60f410609eb57406_JaffaCakes118.exe
-
Size
102KB
-
MD5
94e7555da83aad6a60f410609eb57406
-
SHA1
ed185dfff735b700d309e882d3bd1708df81ab94
-
SHA256
80483be2def22f48ec2b5cef52cca139ec1ba60b86cae93b680a26f727578984
-
SHA512
b521659d5e783ed08b03de3266c37312601fbab9abb06d5619bddba257f8a3abcb8293a3e5d5a65d55c917dae81dfd1ac1f3999d55c4f0c074035af70af941cb
-
SSDEEP
1536:MkcUv9Wrw3h3FA2BJskRMbBLBZCx5ywyTjcol97NKRxWMZvbNV5LtL3HARRgr:1d9xR3G2BZMbBLBaYw0coLujNH1HAR2
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Ganar dinero en Internet Guia para Principiantes.LNK 94e7555da83aad6a60f410609eb57406_JaffaCakes118.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Ganar dinero en Internet Guia para Principiantes\Ganar dinero en Internet Guia para Principiantes.LNK 94e7555da83aad6a60f410609eb57406_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Ganar dinero en Internet Guia para Principiantes\Ganar dinero en Internet Guia para Principiantes.LNK 94e7555da83aad6a60f410609eb57406_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Ganar dinero en Internet Guia para Principiantes 94e7555da83aad6a60f410609eb57406_JaffaCakes118.exe File created C:\Program Files (x86)\Ganar dinero en Internet Guia para Principiantes\Icon15112011041124.ico 94e7555da83aad6a60f410609eb57406_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Ganar dinero en Internet Guia para Principiantes\Icon15112011041124.ico 94e7555da83aad6a60f410609eb57406_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94e7555da83aad6a60f410609eb57406_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60750d3bccedda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{76A4D411-59BF-11EF-8340-72D30ED4C808} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000003e6b5f112612ce406c8e6b1c00ddaa80ab6fc05ab2e93f3ec11cd4b0eb995754000000000e8000000002000020000000a72591a8036c37270ed708f51ddcef548dec5cfa24c8ee545e1fc27846521f152000000075e1ef47de9f332d59f7a11f6eca5c8c1c03d108f987e1f8ac8138cc2e9eac384000000004f02c88eb9d23191145465f2f03ce88c8fda088757c8fbafb58e132b0f4c682407a26edbdf2825f17bec6812af6006793d74b32866597c8f61019fdb199bd09 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429748303" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2740 iexplore.exe 2740 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 332 wrote to memory of 2740 332 94e7555da83aad6a60f410609eb57406_JaffaCakes118.exe 31 PID 332 wrote to memory of 2740 332 94e7555da83aad6a60f410609eb57406_JaffaCakes118.exe 31 PID 332 wrote to memory of 2740 332 94e7555da83aad6a60f410609eb57406_JaffaCakes118.exe 31 PID 332 wrote to memory of 2740 332 94e7555da83aad6a60f410609eb57406_JaffaCakes118.exe 31 PID 2740 wrote to memory of 2668 2740 iexplore.exe 32 PID 2740 wrote to memory of 2668 2740 iexplore.exe 32 PID 2740 wrote to memory of 2668 2740 iexplore.exe 32 PID 2740 wrote to memory of 2668 2740 iexplore.exe 32 PID 2740 wrote to memory of 2668 2740 iexplore.exe 32 PID 2740 wrote to memory of 2668 2740 iexplore.exe 32 PID 2740 wrote to memory of 2668 2740 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\94e7555da83aad6a60f410609eb57406_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\94e7555da83aad6a60f410609eb57406_JaffaCakes118.exe"1⤵
- Drops startup file
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.chrisqueen.com/cb/2ESTEBAN1/program2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Ganar dinero en Internet Guia para Principiantes\Ganar dinero en Internet Guia para Principiantes.LNK
Filesize1KB
MD5bf8daaf6c66a54cac4b43f4bd4425fc3
SHA17cac8164bb6c647c521f5f7dba86375269ac590a
SHA256a30766d0ad4421e092218264d118d2f55d5de866d7dcb8dec4e82ae78898b7f7
SHA512c6d0ac68b2516efb15e9cdc4bfc1f9848e1e2a23ab54934bbed293d33b606e3242f9c670a2b60d10279db08c2da6a3cd2d9f9782da7aa6a8044535538a952d20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dfb180678f3381f1927c7369864f379
SHA1c5f31ef70ec6e1c061aaa8a74353509355cee818
SHA2560de9153cfbc7958e0956ab6cefb8496c27cbf886c3e9717f251b3a0de3412db3
SHA5126bed39672464f2eff9517ab9e6ca17397281343ad10b74b5bdabf00d235b40ae7a07c1ffcc70fa8d9456d2479e4d63a71e720053f5c1250b64f0cd588996fd34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee99d2c5879e94e55ab4787dbd2a6f87
SHA1d8867b2cbcf616a333e97cc73f6930282a6520d5
SHA256a7b5456acb5fff6f91549abb3d677f9b6deadd91618d49a4409997ff7e46b4fa
SHA5129a51f9f708d5c35b6d6b8bdf5da8a6d03a0adfe5ddb5410997e4742bbcbc0d2227176932277a03e9f0fbfef26fe06076cf05cda76209011744853dd8f452862f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b662f68a9c3b4500dc9e70bd66218627
SHA1e619a46e96b222e5c9199883b2dccf9cb2beb499
SHA256ae6a6aaa8aacb42446b659e4b91caf0d306dd31fa0e95e21cf23f4e2f29da587
SHA51231ca175be406c75f9c2052be59edd3e615aa7150235da4ab698bf1bf685f43a56c15ce5822d766afcda27a6fe19381f5d0608ee00cdc4d8e6a8888a1f7b3f3da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4c0332a9d5a00cfffd2a8705bcc87e1
SHA1b63e8c39f780ea06b4632b2d3e3ac895243a253f
SHA25621df5c4bc749a859a883ed05eb6ad5aab25435f3fac282bba6cc96f1975c13e3
SHA512c540cb988b2a9476bcdd29a8dd3a36829c3cc42b4129e18a6663d5f78df76f6d5e970ac869dac3824dfee3610b74fd54896800d9600ca0a052eaea21764c86a6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms
Filesize3KB
MD59a4570ef116db42b868da8770b06947b
SHA1a2847c3781bb8d964158b49b2516ec52748ef285
SHA256d58bf86e539604c084ff44f2c7b25f1a96e4d83da8c1f4c3931bbc54723551fc
SHA5122f903fdae8b7eb3d044da848a2268af7d873db6acd9ae9a050171b14deddc71ca2649b8c8067f4d4247324e5ea7a0fd297b7f9ff1e843bad285ff32792ff6901