Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 11:32
Static task
static1
Behavioral task
behavioral1
Sample
a25dc93aa7a6c5fdda16e78065df449c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a25dc93aa7a6c5fdda16e78065df449c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a25dc93aa7a6c5fdda16e78065df449c_JaffaCakes118.exe
-
Size
258KB
-
MD5
a25dc93aa7a6c5fdda16e78065df449c
-
SHA1
a3935faa9e0ad09001080f0589317c52159f791a
-
SHA256
457318fcff1d3caeca7706c290defc3b08e77435785b017a12857d47f160fd59
-
SHA512
6b72e12e8e47e8fb443eec53ea2f8431e6e4a81d7fcab3d400578d0a56bdb620e013ea62139441b64224357aff5710b3c1a1c2f6ba2b951f3c05eb300ce16149
-
SSDEEP
6144:LiT9aCV4oXaClb7qtU8TV9PBVa//L2tMIhKf+eY:LW9aa4Cl/qqq9gL2tvNeY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2012 SFSB7AB.tmp -
Loads dropped DLL 9 IoCs
pid Process 2924 a25dc93aa7a6c5fdda16e78065df449c_JaffaCakes118.exe 2924 a25dc93aa7a6c5fdda16e78065df449c_JaffaCakes118.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2900 2012 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a25dc93aa7a6c5fdda16e78065df449c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SFSB7AB.tmp -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 31 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 7400310000000000e8584b681100557365727300600008000400efbeee3a851ae8584b682a000000e601000000000100000000000000000036000000000055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 7a003100000000001159105c11004465736b746f7000640008000400efbee8584b681159105c2a000000ea0100000000020000000000000000003a00000000004400650073006b0074006f007000000040007300680065006c006c00330032002e0064006c006c002c002d0032003100370036003900000016000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4c00310000000000e958e392100041646d696e00380008000400efbee8584b68e958e3922a00000030000000000004000000000000000000000000000000410064006d0069006e00000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 70003100000000001159105c1000594f554841567e310000580008000400efbe1159105c1159105c2a0000002e87010000000700000000000000000000000000000059006f0075002000480061007600650020004200650065006e0020004800610063006b00650064002100000018000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2012 2924 a25dc93aa7a6c5fdda16e78065df449c_JaffaCakes118.exe 30 PID 2924 wrote to memory of 2012 2924 a25dc93aa7a6c5fdda16e78065df449c_JaffaCakes118.exe 30 PID 2924 wrote to memory of 2012 2924 a25dc93aa7a6c5fdda16e78065df449c_JaffaCakes118.exe 30 PID 2924 wrote to memory of 2012 2924 a25dc93aa7a6c5fdda16e78065df449c_JaffaCakes118.exe 30 PID 2012 wrote to memory of 2688 2012 SFSB7AB.tmp 31 PID 2012 wrote to memory of 2688 2012 SFSB7AB.tmp 31 PID 2012 wrote to memory of 2688 2012 SFSB7AB.tmp 31 PID 2012 wrote to memory of 2688 2012 SFSB7AB.tmp 31 PID 2012 wrote to memory of 2900 2012 SFSB7AB.tmp 33 PID 2012 wrote to memory of 2900 2012 SFSB7AB.tmp 33 PID 2012 wrote to memory of 2900 2012 SFSB7AB.tmp 33 PID 2012 wrote to memory of 2900 2012 SFSB7AB.tmp 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a25dc93aa7a6c5fdda16e78065df449c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a25dc93aa7a6c5fdda16e78065df449c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\SFSB7AB.tmp"C:\Users\Admin\AppData\Local\Temp\SFSB7AB.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Users\Admin\Desktop\You Have Been Hacked!\3⤵
- System Location Discovery: System Language Discovery
PID:2688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 5163⤵
- Loads dropped DLL
- Program crash
PID:2900
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:2744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185KB
MD5a875ed14fc9a804528232488c75f4aff
SHA18637c10f6fe6e4bdc72a6f99c31fd5dc8cdd69f9
SHA256208616e16eef78f01739d69b70b4a179f146ce914bbf705f9181169c0e210b39
SHA51292f9b6cb9123d4fdbaac3b1afc1bc3789ef1667d581351767b623aada5327e30203d8a063b008f17ad9c39dc57eb67289e7fdd0982518bdf9338ce617915a863
-
Filesize
238KB
MD5c3d71370a6f07e14d0782e7083ded9d9
SHA1435640c6a7440efbe200eca4a92628a1f0040447
SHA256deb695c7b1ea262ee218d8d63e2da5527f6d4078d90d7f9e5b7ba835d0f6f372
SHA512935d39a35acb2236e78bc8f07b55d7b11c6b108e0fa3592f10c5ef9cca09473b6c19cd0a6738391ade5f578a8e69d8d3b9082b54cfb183a8c57304e20959e66b