Analysis
-
max time kernel
84s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 17:42
Static task
static1
Behavioral task
behavioral1
Sample
a3811520e152e2fd0f7ad400b22f229f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a3811520e152e2fd0f7ad400b22f229f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a3811520e152e2fd0f7ad400b22f229f_JaffaCakes118.exe
-
Size
657KB
-
MD5
a3811520e152e2fd0f7ad400b22f229f
-
SHA1
720152922ed5e3393f46f55cacf7fbc1318702e3
-
SHA256
9d88bc193a32be5d6e383826bcb1442c1f28d7480215cfaf81ecc4fa07955e3e
-
SHA512
f5db172d9f3cef5d2f8dbe31df1d48de58c8b2cbdf7a609785d650a4d8073b6f054902d37bece5b104eebcb09990bceb78eed86ad7d1218cb743df2dcfed797c
-
SSDEEP
12288:B2S/ifyCmMf/JATS4SJJrRjm5PLDhuiH149jQX6oX:BLhhM3JAubJJrRjmdAzmX6y
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3811520e152e2fd0f7ad400b22f229f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0E242221-5CC0-11EF-BB68-FA57F1690589} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430078419" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000eb5f66d6783099256801b4291e7185caf0ef91a805902a3a959b0e4cfe7b85ec000000000e8000000002000020000000bc977e88511367ad89d2b4470a62006a06489f4224934cf11d0290ed2c5231692000000007966397a0bff25ca3bf5f4a3c098353fc5105a7dc76924e7601c41a733595f44000000040538956e5b84bfbd0feb60fa08e67dff07760eb11b46a106ddf8975694066abf3dd210188b15953d7cfd04cfece6ee31a6764fd926d1e4aff56e928ad8db905 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c09563e3ccf0da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2908 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2908 iexplore.exe 2908 iexplore.exe 988 IEXPLORE.EXE 988 IEXPLORE.EXE 988 IEXPLORE.EXE 988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2908 2552 a3811520e152e2fd0f7ad400b22f229f_JaffaCakes118.exe 29 PID 2552 wrote to memory of 2908 2552 a3811520e152e2fd0f7ad400b22f229f_JaffaCakes118.exe 29 PID 2552 wrote to memory of 2908 2552 a3811520e152e2fd0f7ad400b22f229f_JaffaCakes118.exe 29 PID 2552 wrote to memory of 2908 2552 a3811520e152e2fd0f7ad400b22f229f_JaffaCakes118.exe 29 PID 2908 wrote to memory of 988 2908 iexplore.exe 30 PID 2908 wrote to memory of 988 2908 iexplore.exe 30 PID 2908 wrote to memory of 988 2908 iexplore.exe 30 PID 2908 wrote to memory of 988 2908 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3811520e152e2fd0f7ad400b22f229f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a3811520e152e2fd0f7ad400b22f229f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.prep2pass.com/jre-6-windows-i586-iftw.exe2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2908 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:988
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c81ca556212a324e5102d0a1d610bf9c
SHA164f88e5b77edd26000d397dfc532d5f5d2818ed2
SHA256c09f144632245381b294bb1321bb2c2bbd7913c9f163306c39ea594269f500f9
SHA512c6ed4149b28695155f7405f195d6f52e5eaf3fc33f6d17107fb631e4cdd9eb465d4811e4e84dced7b3ffa5f482d43e74d6805491742d6f4fd7b55fbc8c9191cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d4d0e4cafb00da98ffe2e3a646ee7c2
SHA11123dab0788a6e456b1198343aef322a565200fc
SHA2567905714b0560ee5dd333f1cd59964f0f7082e2170eeec584e2caf9afab1e7db2
SHA512f13eff2fa3d6ce503a1a82127ea2a8d50dd67306378729f3731be71246f889f62991bc27132965b975f420f25d0ed1cb806af1ab129f0aad90d7831947c040c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570b96be89212fa04b69ad54e3e1c5fb0
SHA1b25990f4613fb5eb242c46a058d7fc2599993cdc
SHA256be67fe1d7b2a74e1bd1af2dd3bb1b36ee3072a3378e70769e0e0456874abcf1a
SHA5128cf7050fdf747a4f385c0bc099eff60c941f4768d221afbe05952f0f1d213925ca4e0428947a8b3722ef370026fe90554ff9edb875225ad34f7d6367e3dfdbf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a73368b668b9bdd474a1066ab19ca855
SHA1613b72c877803e7b6eb7b74297817e45a86cf42d
SHA256273b5f52b1298eae92bcab467ea870d2d6ed72a02f3bc8773caa251bafc40cdc
SHA51250fe56934ea1a5059509240e52aa6e7f0383a89bdb271cb95a11258a6939ef19a4b2a70312cfc29a786c3002d8434f4035d8beaaa19be80e0b745678ad12dada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574234de89b7e883466796e5bd67ceef4
SHA10a5cde4fea25a9cf249423fbf9a17906f293d087
SHA2568500fca3fdc81ff2fd0117fe35d86519f9233a1266c6255f0faa05a35c5e8be6
SHA51266d00bac0efce83ef65c85b05d335cefcaed6acf7f2b3daa75eaf979d04cb676a9a428ee72b6210aab2de13d2b676303b1be72c08ea76e93ac829d8bd2e33873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4d5cfc82eaa0844b0798723162ca999
SHA197a18ab7c27817003e2b96f8a3b3c556651fe6e2
SHA25656f3d8a47276e02b581cf0d2cd6a071924326ff9bdedce400a1b70a7b4e57288
SHA512b161392b7ff5aaa50ba4aca5d031c301c507c4d9a973a044890460013cb7a39610c51ed7c43d1edb39e0b83800c1958a11dd56cc90feb0adb95660277895047d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592b3f01e27ef6a4d6af52d67eb8bc639
SHA17f25fe2b34ae2af139a8e205b233323c6646e90b
SHA256cf415582c1b6e1eba6b866a0ccffacb8c7f94f357ab45cc32ad4c0352940a645
SHA51274a2a0c456ab20348b5caff86ad5c2f6345b22ee4cfa98cca860de33f824af019e2a02680aa40e1e2d9b75e64db4d4c83cae62dd2d89282d0d7c1f01c59261de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd77986fca942edf5dfff6d3ed4f7f96
SHA1a1530eed0f54759ff2b205aa7107c7542088c6a5
SHA256baacfcda12b5eac3343c8b694aa515a18393344b11bbcd53f5af93213b7cf16e
SHA51288089b03bca892a4e2e2e30cc931a0fc678f87e7300fcf304073bdf19741c8adab48546a12e6193d2c474e54ad551ded5135dc2e579116821e9d82092d03a801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561c5ea4aab95b733013f4b99e3829c1b
SHA199b84a7960ee6b014d5e1411876b02ebbfe44b42
SHA2567a495ac3e3c8125a41432ca0511dd77dcf1656ae5d7c1c8b336ad6c5c85c6a5e
SHA512dd7feb500ef0b2534dffc05dde3ded97455b41f3abe2daf4f4557873d00f467273218240f34f36b0acb8ed8fd208aebabbbf8d4540ecca780843fbfc394f25a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a5ee6ca9bdd95d7e35ee7b161546456
SHA15de0a9930875f89071e200a2950ba08bf234b672
SHA2560afa0ccf52ab7a9ee62eea7a928e57c94ba3d4d92ec00d574f3e4623f9065664
SHA5123b62a5b3409a150138e60b7ac99f5b6ba48db85dcaa2d7ab493b8ddbd366805ee291716dc47ba927857e915b3b3781eaf2ea2492dc25fdb4fe96dd356ea0ae32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd4c3c4b56fde4029d80d946e618cfbe
SHA181717c91462532866ceb603004acac9531eef572
SHA256b4581da4ffd0864c3f7badae721346bae7e743ce24a4bfe44ea1f4e431d18a26
SHA512e77d8ea9774122d56f39fd2fec2039c0f0c3877046371d59935a74204840bb2ff8324b5a71a2e3ad14194087b48693b67f975a306956f21e76748bc78543210c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f181251bf32e4017fada1816f2f11099
SHA11e1a86475451795f623a1c9a4ac916ab14656171
SHA25619379fc8afa8becf283437c1bbfdbca9cb51bcf1e47a003f38b97fb28d1b4b60
SHA5128999513b775df823efa7a1f91da2c842697c2573a7ab42dfddf0df3c17832932aaf9d6ffaff7f23e4cc0ad9bb1f7d97541f12dccb856bf8aae9b36a172c5ca45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d25ebe0c36936ae1a58840b2c4e77f5
SHA1c1684f57430e3bfbd95188f8269b6602cbb4de9f
SHA25638662ba5704bc376dbd93bf3227bce7b6e36b8b85dc4d38e87254fa568932b90
SHA512bf7e287d94527f60b394afd4e353b86b85a2be4730f20a2d963cf8dd6f590c3c69dfdc0e6add488cf24002587f6c19bd7616e36d9c912399a31b38ba0cd0aeb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522623c11b401081158b2fdf2075faea4
SHA1e6094832f1a899aee5e24ad8ae16f1af30d52ca0
SHA2563b7dd166e15223876439d2095d8a21fb8de317bdadd9a3055fedd47808ebf072
SHA5120de2117923fc68d0c1073f1de554fa461a00a441f6a1d01627bc5ff17a700235873625cb5ad8d7c83c48b02b4e9d8a209457d43c93da2ae162e1c562ee6d39b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554c9ab4e5785ee5d24d055d657c74858
SHA1889dff59d022e0cd249fe28f5102d14c181d1e09
SHA2566686e36593c62bc346dc934efdc2a241c4bd8ddc5896eaf7f8903342e3ac8f78
SHA51227bcbbba1cb52d4caeb993d9da96405d0e8c6f146417b37a77170552af87e916283de406c751c797d7616fca6af490f969fdcff926b190acc227328c1c6c0385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535dd71c245a11cd135a1a323f7dc76f0
SHA112690d5ea382ab56688d3031783abf45ba7e7c10
SHA2563a65cfab4352318b6b78d6a5585fe2b6578f5dfd387937de189af018f05e2c23
SHA512e6f4721f9a0c9907729963cfa39e9885487d8a86603c04cf6ea1fcce34fceee27ec34ca99b2501e335f948a79d75ac65f15f2ca9b4736f8f3e347c175ccade91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565ce780ba37a5764ad5b84c7ec82ff69
SHA1a7eb9229498d262c483fdd178046b539e3a2e124
SHA2568aeb76e65dabd1919669efa13cbb4cc9bc908a4618375505d420c8b9daef5fc2
SHA5125016ca9de28396fa026949a608d59388fce668f328613874538b784faf4b676941aa712882fbb5c1bd1ac0562fb7c1721e2bb16b63710a9db3b1a7276669f393
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b