Analysis
-
max time kernel
134s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 19:43
Static task
static1
Behavioral task
behavioral1
Sample
bcea3c98d62c936145eb118dcebcef60_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bcea3c98d62c936145eb118dcebcef60_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bcea3c98d62c936145eb118dcebcef60_JaffaCakes118.exe
-
Size
43KB
-
MD5
bcea3c98d62c936145eb118dcebcef60
-
SHA1
042b9a11f23d4406846b9283f293d7c1f443f2d6
-
SHA256
0b04fe457b3ba75d9106cd80120788726d2b74dac75d82548933debf6f9056da
-
SHA512
fdc0c53eba4acaba71f0fdc0d37653147a9f6da4af2daf63c2d6f02bf2fb807ca6b362ddc1e99a1daafc0ab4c734920c004d60c48979733d6c373550004b5190
-
SSDEEP
768:MHBOrTRmTSADtmn0BJY1QjQmqAaKk2r0ejzP/YeoxgZyS0QGuTS5ACgkDdUz912:MHBOrTRmTSABCsmArvwewS0QGj7Ddy2
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1968 bcea3c98d62c936145eb118dcebcef60_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcea3c98d62c936145eb118dcebcef60_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431207191" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3516741873" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31126932" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{FD386FDF-6187-11EF-BB4F-4A4A300BA5D9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31126932" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31126932" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3521116409" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3516741873" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3788 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3788 iexplore.exe 3788 iexplore.exe 4200 IEXPLORE.EXE 4200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1968 wrote to memory of 3500 1968 bcea3c98d62c936145eb118dcebcef60_JaffaCakes118.exe 85 PID 1968 wrote to memory of 3500 1968 bcea3c98d62c936145eb118dcebcef60_JaffaCakes118.exe 85 PID 1968 wrote to memory of 3500 1968 bcea3c98d62c936145eb118dcebcef60_JaffaCakes118.exe 85 PID 3500 wrote to memory of 3788 3500 cmd.exe 87 PID 3500 wrote to memory of 3788 3500 cmd.exe 87 PID 3788 wrote to memory of 4200 3788 iexplore.exe 90 PID 3788 wrote to memory of 4200 3788 iexplore.exe 90 PID 3788 wrote to memory of 4200 3788 iexplore.exe 90 PID 1968 wrote to memory of 3788 1968 bcea3c98d62c936145eb118dcebcef60_JaffaCakes118.exe 87 PID 1968 wrote to memory of 3788 1968 bcea3c98d62c936145eb118dcebcef60_JaffaCakes118.exe 87 PID 1968 wrote to memory of 3788 1968 bcea3c98d62c936145eb118dcebcef60_JaffaCakes118.exe 87 PID 1968 wrote to memory of 3788 1968 bcea3c98d62c936145eb118dcebcef60_JaffaCakes118.exe 87 PID 1968 wrote to memory of 2736 1968 bcea3c98d62c936145eb118dcebcef60_JaffaCakes118.exe 97 PID 1968 wrote to memory of 2736 1968 bcea3c98d62c936145eb118dcebcef60_JaffaCakes118.exe 97 PID 1968 wrote to memory of 2736 1968 bcea3c98d62c936145eb118dcebcef60_JaffaCakes118.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcea3c98d62c936145eb118dcebcef60_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bcea3c98d62c936145eb118dcebcef60_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3788 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4200
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bcea3c98d62c936145eb118dcebcef60_JaffaCakes118.bat"2⤵
- System Location Discovery: System Language Discovery
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5c7e3b23826b88f278d1e288a4470605e
SHA157dfb4622f47d230bb3b7de93a1233fe63a371d0
SHA2568a4a36c919799e5e243666866a97a65df2744184d27fb070858e7391b806ace9
SHA512caec881ca9294c6d5d6f35dd502c615459bd86abfc91c6695cff34b17b637d210e7bb456f5311a78cf01d55a76a994c602205bf8d0b4c30302e4ba7bab31e447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5940f2b1235778966714b4371ec17a12f
SHA1cc3f2bd1d41d303ccf428b079cbfd32fb23c34a4
SHA25665929e4297855bdaba0c3cd87e7b43de4e6ce7cf6a531cb8c37893b8cbf647f4
SHA512c13ed8ca2192893d579bf716c62122051b0c44f8a7c9f1298eecdb6b97577a82735088280af6c46ed0b338f15b7fa9616148cb21915987ae39007b81f0c337ec
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
305B
MD5fa62e68f80581d905035fd5b372b6389
SHA184f30e0a714070b38bf52166342f5758b67d7c7c
SHA256a9d8b9ab68fb3b95f7dd9f4225a7957e362029228a040d6fb466e3e2b2861ec7
SHA512c204e8d36ff7d6a5ad2c8770e999b73b01140c8287dc00352eeb47d7cb39bca44741b2e9d93768a20d1aaa2440726a691ee3b46f7602ed334d2ae57d5afeb51d
-
Filesize
31KB
MD5aedf6f88ce7b0590257d35485e677782
SHA1213dfc8ea5f166d5218fd6bd5fcc717d4aeda04d
SHA256f1d708d278de2acb411b12671fdb9ce281738fef2a9171a3287f6616e25089e8
SHA512a35fec4cdb1be8144f29dcb69607d6ad83489dd3cf53fa89787bc3d9a936807a909868eedd5899224f118e0df991d4300d94a9b4f61d01e99a23e388d8a38f4b