Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 02:15
Static task
static1
Behavioral task
behavioral1
Sample
b9f866c8419788ef286f1dfd28ef6ea0_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b9f866c8419788ef286f1dfd28ef6ea0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b9f866c8419788ef286f1dfd28ef6ea0_JaffaCakes118.exe
-
Size
234KB
-
MD5
b9f866c8419788ef286f1dfd28ef6ea0
-
SHA1
802b500cb4ff41a1ebd705322f63fa4a8472290e
-
SHA256
7f6417344cefb06e3302b63c91e41f07a130a1ff235ff6479784d8ec6218250d
-
SHA512
4a5c68af0e0b3955e42a078b87f82fe57a72b2e8b8e502902ba4b57429ea691698cf78ab6e044aa4932345a5f53573b45222f158e6b5213f1aaaff28a70c0bb7
-
SSDEEP
6144:8E4nDWgRAkP/jNEc+TR4nDWgRAkPg8mMXx+q0CdH7UGw3G:CR3P/m2R3Pg8mMh+xCaGv
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\desktop.inf b9f866c8419788ef286f1dfd28ef6ea0_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\pROGRAM fILES\iNTERNET eXPLORER\Comres.dll b9f866c8419788ef286f1dfd28ef6ea0_JaffaCakes118.exe File opened for modification C:\pROGRAM fILES\iNTERNET eXPLORER\Comres.dll b9f866c8419788ef286f1dfd28ef6ea0_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9f866c8419788ef286f1dfd28ef6ea0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{84D592D1-60F5-11EF-9F10-6A4552514C55} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430541176" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2836 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2836 1952 b9f866c8419788ef286f1dfd28ef6ea0_JaffaCakes118.exe 30 PID 1952 wrote to memory of 2836 1952 b9f866c8419788ef286f1dfd28ef6ea0_JaffaCakes118.exe 30 PID 1952 wrote to memory of 2836 1952 b9f866c8419788ef286f1dfd28ef6ea0_JaffaCakes118.exe 30 PID 1952 wrote to memory of 2836 1952 b9f866c8419788ef286f1dfd28ef6ea0_JaffaCakes118.exe 30 PID 2836 wrote to memory of 3024 2836 IEXPLORE.EXE 31 PID 2836 wrote to memory of 3024 2836 IEXPLORE.EXE 31 PID 2836 wrote to memory of 3024 2836 IEXPLORE.EXE 31 PID 2836 wrote to memory of 3024 2836 IEXPLORE.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9f866c8419788ef286f1dfd28ef6ea0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b9f866c8419788ef286f1dfd28ef6ea0_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\pROGRAM fILES\iNTERNET eXPLORER\IEXPLORE.EXE"C:\pROGRAM fILES\iNTERNET eXPLORER\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD59273a0f56ba8ec7eaf76ab95ca9d7af9
SHA1b5d0b9fb6e541f6b607de3675b6e8332db71dcc6
SHA256d9a45a64bbcf1f171a781c62c58c57502dbd52a11575179ba14739cfeccf3680
SHA512b16567a6f1e07101833e39e617c57523046d18c1d6e2b82e17d3c8545239c8176376610cb488ec42d91af0c136984efbe54e01665dde162f096a836750ea0571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573e81385579b9cf29db92a44779b054b
SHA1c041c1129fdbc474ac45681181bfc08e6cf97d91
SHA25635128e5256333195dbfcce02efe79ea4cca8acaf21c2b8cde4b03de2df07103a
SHA512f4caa24029c0971d98a3284b602067b3184ab75dd78a08449785a1bee305a9cf9bc1f948abd7999ca77233cdcee6a471e78ac9cccb95d6856a887fcad20291c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fea5c566966feb4dd94cd53cb4fbfa36
SHA15b8eba7b8f4b2e0cf85ce59544e1f30863ab3ec7
SHA256fe3feed4e6c97fd213b1ef7a5bd9c506ff8f40ec0c886f71448e0be67261513b
SHA51201b5ade7d90f95a60626171edfbb1c9277b6e22d8fa111544a3a11a9e376861c08a5f904d812a016bd3d85cf00115533c79a404705e46e0bb6d074274da7ca1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5433af92b60bebb246af005b7ca85ce
SHA1fa4394afb114f9d0ab4b7d72805cf47251bba410
SHA25623d5618a434cf2ce01db247816daf72aa99b94f2ee9b2c94df822df562325e4f
SHA512cd6758766cdafe01720d1064f4121774753351c588e45f22584d892e9b42ccfaafe0abe0a267d581af600251fc778e0a89a5e48715018141526fe9d454f0e746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55085683ebbe81bff6a1c11d7c0382a50
SHA19103166bf1914297359710c4e336c98b1a18a269
SHA256c328761d941665044f3e8988ee269c02563294d188e5decdc87b6d88a36b3d1a
SHA512912fbf4b4ed7b2807e32929678baa6c6fa342af65cb5f26dc3175dfd21485ebb330d3b9ecb2d8bd473a4dae84b9a228c7bc007ec1c4f8fd344cdba7854594b97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5607bdfd90b11de2474c1b4592c123551
SHA16f6dbbbb946996a427abc25d8e67f4d49e472924
SHA256a87fee2ad5fb423a54e6cb5637221fca5e6b7e9597736159062ca93530a9f416
SHA5127d01ae801a6cfb4195d25da9f77ecfd6391d4c6924e54f1e99f3c513003cd9e2e3e42e073c67f37a6af595f607f43c0a83b957df37cb2f606751ea7b9a016339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d885a0fb1796d1c34216220d3a00cb77
SHA1730d72f3f562879357a43fadfa95c191a468555e
SHA256bc2b39ecbb219cf50a13409949491bfca53b1a1f36029dd657ddfcb7bbc6c0e4
SHA5125e56bcd7a5c4766ee86e6ec887e7b16a52961db977fc335146c3ef02d7012ad7672074c6a761190add1e637e35144f566753c407b43727c1d15edd6f9bc0227c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5769081dc5bbcea417ab2a75e76d953b8
SHA112fe11a799bdd17b618fc201a06a588547030c63
SHA2561029197b9c38f03e2861ab757032cf9860ff4854c7460319ad060bebfb5ab22f
SHA5122bff71ed0881399ce6582f48b621f23c258ddbc33dfb1a9393683069cb6ae843525bbebd219da14e932758acb94d1eb0ae25005bba7ba12547177d185aa1c8ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af926b13c965d206f53fe05e2313b550
SHA1bf821571677f7a529c5281bcc14170d41aad11aa
SHA256b2bc96567ff49df17cd7fe5639d128abaeb903e415ef6f929d10110c57f51bd7
SHA5124ee11aa10dc68cd9ffb2aefa070918f01b26528c87024c6efb3e8d3c3045c3ddb3956ce517a8cbe48ac6db04e1f40cb821a6b7330b35eb054ba57562c39c9010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c39e53ad059737f5f3106d2fe4f5329b
SHA14acf3a0f2849289a7ffa6e62f7952b02d202511e
SHA25623a34783f5608aeec52218c905fbd4a88a1cef46e27486ebbd6c8ee71e57bd5d
SHA512ce1b9ba8609c9a47ae38c74a7912969fcb52dcb6bd2b4570782cb5c3ebcfaaf8d2a08449f78af9c6bb72ef7936ce6f564257ac904567b48c3b5059fbac0e5d30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5177ac25a6585cc6f8e42cc1168349e23
SHA1f27f9212bc006aac954777de0bdfcc67930257b6
SHA256fdf9775054f31b9f2f8aecb3451675cd0e38bf2a9c513502770d315f6b295b0b
SHA5124ee4c9b8e734ff47bc4719f697119e0328d7cdf04542b4ac6d072a9ec182ce3390204526b7d4e15be5be4baad445eb6f12b0282092ab6c4ba9308f2f5fe7153f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d957dbbbc110d06c1954f1e4693f78d
SHA10af1fd966521684203e68f350ba6192275e86ce3
SHA256905838c825af36622831938165d4b7a1981068caf0da4f72df7353c25505bd3a
SHA5126b4af4befa88ceeedf99b409273dab6719a1ad1059df8a567f5a80186de7e930f76eea558b6fd0e7bd67ee8647a7f34fea4397b2465cd1ae9cbdd77b822c7a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5089b0c6b07f861000cecf0f2b01713d6
SHA18658b98e80863affaebc09b2bcb994be5801ec31
SHA256b98005e1475006211dc02e1d1887d9f09a785dadeedb48d60f39482559ef6ac9
SHA51267731d6fb48830a9fd7f52173834f9265ff48f40aa253205c5a814b8028c2eeaf0472edddace41a0d526b7af3c388be68b4ab84256bf0064319935f9959c7e5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5731525fd7604e488386991f1ff6ff7fd
SHA1b33246f93ee624882e04f1dde01a9829cfa42899
SHA2560b939bec603ff286f3c34b14bdc1e5a42c695f8e255c4d900f6648affac3cc20
SHA512a81a48c6e8b3e54b1caef0a0efa60169502cae8be8d73b2321bc29bb8a36f5244b3dcc9c466fedeab7184420c2fd9cf838ab2569cc6d5a8acf7b4f77123d5ee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8ff36674ffb4e31b2ce43ee0fa86cc6
SHA1c5ddd5c86b6c253cefaf5e6a4da4f875e102fb43
SHA2569cfd6ad1514540f0f521b32cff121fab98c0fb4f89aae5db131646ac15cb057b
SHA5123561043c1d84410578b34ae825981c7ea4e2d295818972532c5db5e12f4ae0e3554c12da3fd015f281567b7e96130aa169fe10a5fb353f995c460123cd3db94d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7b22f292739d1ae09d2b2a5b6423e05
SHA1a9b70ec64ce97d27ecbee118ad5cb91659001ad6
SHA2563ef4b34f7659604c2b44064f67d0fdbdd356c4452fcb28b73a4833425ec6ef75
SHA512d547479e6a34040eb6610e0ac93f418c710ca15b15e301f0d6c7020217ff574953d6463805858e6a4fdb7e69bd3e02386c7d998f71dbf0c5776909830316b7be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab7ea066116f2ab98c7fb9b508d62c63
SHA1e11498abbff8b905c7513dbd8a54094a0c463a4f
SHA2560b72aa3c67418d2b606d253e60963a19a298eeee0cf2a68d1820b7546794de0b
SHA5122a0f0ce6e732fe22782c2d74f7f15ea1e8e7937762c98227fec0b3d8768973e8da0192e9497be3aec8691afa46a737a14ff20e1004cffc13e32e058abc2995e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51267b31f4e107bd99967941c83575492
SHA1907d0b749e35751febaf743c62f1c8d71350ee33
SHA25601b3ce08f139555a71e992c6765496e676c3dc0ac33fbe8fd7b82b2d4d4ddce5
SHA51275f961682c8e76bbc16d6cdf06fbabbc53bc84275f8bca4c221c63f402c0ead640be0dd34d90feb00e09210bc23a14192fb35e882c0a428c6502572bce0ec3e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f571f1343d4e37b160f19826da3019a1
SHA14989abd842e76118b25ea016cf2dad4131f311cd
SHA2568a9f30fc2baa5ba7bd5913fe5110d2e77d7007119aefc584903e965f7eaabc62
SHA512a48dcaeac273a51e2f4e1c7b74fdf3c93da192541b4242a2e106e5a1b15f2666e461e1239253f9cafa16e99081f67f7ecf28e62afe878f03fb77b00ebc82ed0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c309d52baff06347d01fdc31b8190d7
SHA1defd8ed370c0430e1d3a5355562bcdf2e16eadff
SHA256fe8b447a47b30c362980e1724a295b1be08afcf81810202cbbc927a34a372b07
SHA512cd194ac5085c0d0ddea85d717735ff9cfb60b59981842dae842d4dd8e980b93b00115f5ced5f6c3fa729d6c36b2c48257ea9f3de0e06084524ecac9e598f5bb4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b