Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 18:47
Static task
static1
Behavioral task
behavioral1
Sample
bf3278465406b491b1e311f2dfe6a44e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bf3278465406b491b1e311f2dfe6a44e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bf3278465406b491b1e311f2dfe6a44e_JaffaCakes118.exe
-
Size
138KB
-
MD5
bf3278465406b491b1e311f2dfe6a44e
-
SHA1
5b0a11e0e6b0df23e64ffb6bc80c8d71b14021e5
-
SHA256
5a757a91732dbe9c76b92d7b86501897b14d6aa92074d05ae7d0fd822d3349e9
-
SHA512
44a8e97ea6fb799a5a19b5bc89c3bbf6bdb7dbb684a126f96cb5f6734b0fa7d803be39eeeb2038b72fdbe0a6ac027dfc148b9226775bf12c86240cde867f5652
-
SSDEEP
3072:GSaP0Z050tfQQMvmkBN3WvRrMogdE/7/pPwyP:GSaPC050tfQwkv3wwouE9P
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2876 bf3278465406b491b1e311f2dfe6a44e_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSSMSGS = "rundll32.exe winocy32.rom,ssXBeXLb" bf3278465406b491b1e311f2dfe6a44e_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\winocy32.rom bf3278465406b491b1e311f2dfe6a44e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\winocy32.rom bf3278465406b491b1e311f2dfe6a44e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2604 2876 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf3278465406b491b1e311f2dfe6a44e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5B35A641-6249-11EF-8E5A-6EB28AAB65BF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430687136" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2824 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2824 iexplore.exe 2824 iexplore.exe 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2876 wrote to memory of 1812 2876 bf3278465406b491b1e311f2dfe6a44e_JaffaCakes118.exe 29 PID 2876 wrote to memory of 1812 2876 bf3278465406b491b1e311f2dfe6a44e_JaffaCakes118.exe 29 PID 2876 wrote to memory of 1812 2876 bf3278465406b491b1e311f2dfe6a44e_JaffaCakes118.exe 29 PID 2876 wrote to memory of 1812 2876 bf3278465406b491b1e311f2dfe6a44e_JaffaCakes118.exe 29 PID 1812 wrote to memory of 2824 1812 cmd.exe 31 PID 1812 wrote to memory of 2824 1812 cmd.exe 31 PID 1812 wrote to memory of 2824 1812 cmd.exe 31 PID 1812 wrote to memory of 2824 1812 cmd.exe 31 PID 2824 wrote to memory of 2988 2824 iexplore.exe 32 PID 2824 wrote to memory of 2988 2824 iexplore.exe 32 PID 2824 wrote to memory of 2988 2824 iexplore.exe 32 PID 2824 wrote to memory of 2988 2824 iexplore.exe 32 PID 2876 wrote to memory of 2824 2876 bf3278465406b491b1e311f2dfe6a44e_JaffaCakes118.exe 31 PID 2876 wrote to memory of 2824 2876 bf3278465406b491b1e311f2dfe6a44e_JaffaCakes118.exe 31 PID 2876 wrote to memory of 2600 2876 bf3278465406b491b1e311f2dfe6a44e_JaffaCakes118.exe 33 PID 2876 wrote to memory of 2600 2876 bf3278465406b491b1e311f2dfe6a44e_JaffaCakes118.exe 33 PID 2876 wrote to memory of 2600 2876 bf3278465406b491b1e311f2dfe6a44e_JaffaCakes118.exe 33 PID 2876 wrote to memory of 2600 2876 bf3278465406b491b1e311f2dfe6a44e_JaffaCakes118.exe 33 PID 2876 wrote to memory of 2604 2876 bf3278465406b491b1e311f2dfe6a44e_JaffaCakes118.exe 35 PID 2876 wrote to memory of 2604 2876 bf3278465406b491b1e311f2dfe6a44e_JaffaCakes118.exe 35 PID 2876 wrote to memory of 2604 2876 bf3278465406b491b1e311f2dfe6a44e_JaffaCakes118.exe 35 PID 2876 wrote to memory of 2604 2876 bf3278465406b491b1e311f2dfe6a44e_JaffaCakes118.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf3278465406b491b1e311f2dfe6a44e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bf3278465406b491b1e311f2dfe6a44e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2988
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cWY9F5B.bat"2⤵
- System Location Discovery: System Language Discovery
PID:2600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 1602⤵
- Program crash
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5886bce09ee33eda88518881924bdca5f
SHA14a483bcce466e3849d1ac6b2803fa6a78c5e3191
SHA2569d7fe1e44216fa27fd43a7533d599431f92e73e4feb9cf3f5a635f74dc1b9fbc
SHA512f5e2f92050660dee85405eb88a14783ba9e66f3e534c91fd6b5e1cbe2a434b8986c4902d2c38d5b6ceab6d9ac66509d971513727063d702789c8d1b1c1ff5ae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f874b6da6ef90318d8f9969dfc6516a
SHA1aeeb4b51eeff1e20bd4b2949987107008570f88d
SHA256dde8ef530d362d1187b9cff16d5da0fd052ec0410f0664c5b78f3a6c5a0815f0
SHA5125c1e497b921d8d123f59d246d74f31275aba6c2e5346808a38ddc19c22010b87efc464afdd71e1772cced490828b6f3726e08ae751fa437859a697c7d9698551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dae9be38a71b33a94bac7e223de3c330
SHA1c8574a50654300459717cd2a79472bf23e7759f7
SHA2569e2faa78050280c7e66e027fc5374a81428faf8a56a55dc733bda23b77258cf6
SHA5122a22730c17902b085a2637523ea37f57a3150e6831707aa18f085e1a0ffe9802005263ed0a55941bed9a1ff74b363583d272380bdebb9e76c8bcc6a44d076efb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6b06ec0b32e7f3c8067bed8a7da1773
SHA10e571724e5bc8bdb29d0fc3ffa62f9da046eadde
SHA2562f34cec21b78ecec169fd8916f3649f58eee21e99a6dc59524ae77ffa077132f
SHA512d0f2330d14e55a626b7cf05e3e58d3c0024571b3003d8edfc834a85974ef7e7d37aa473805dea30fb57601db705c63f68d965224baa1c53620f707efa8cba170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521df34a8bd05d04eca180f63cfd60df2
SHA182136171e5a22419085483fa9ad0c31eede0b648
SHA256d9d1fcad806ab99d7ed92cff41be444f2efe9bd1f001cb9752ccd31c18dfe243
SHA512ec3e931aef0b3bbbec36a57b8b6e0fb17191d74a553238d5e1e2d7870a3dce93945712053994b27446362cc0cecf144bf68195a55b55ee65cfe017b8168b7654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c47e15b894d4d8d96ecd5f3268f7c934
SHA1abd608a9c1058ffc684b8297661ab6214e33d3e8
SHA25669b497184f14baeac760cd898b8748f21e7b3f323d0c5b04a387ab294b7cd76d
SHA512870e123330d4eb7971223c22f5bb3af0d035dd037e100fb72756d514a796738945b1d8e3f06c86849c2f67498c7a2a9d126b9dce38d66e84d6a685dd8abce907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cc52aabddd64958af2d7b051ccb1cf1
SHA1f0169cdc6640a514b8b66a17da2df1a8ae4888ac
SHA2568a0f1de58439b5318bca0a3576e6013c1eac807acb6ae8e423c001e2420392f8
SHA5127ba564d777a38cca25946418579511d03034ff53fd8e7d4c3fed57c169a57a5a11ff0dfedf86425d0332e39047eaef8870e303b35cc3838a16ab55e4b3e3806b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592cf475c1fca45af7b2771e967218b3d
SHA11111f4de45ba7c0acf0b1f1502808e25b16cd702
SHA256e02d5a63af7e0ee2e369181c18079f24bca206de229d6fd54c9a2b66fd8529a2
SHA5122d64ea9d146a1891824c0064f1343ec28d918558d89a390b5ab15aa3e02d55f8d6f83dc3ff34d9bfe4df48d038ce75042998485e1b675b061825e075be999336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d11cae32ddca5d4aae1c2e91aacb22e6
SHA17516c7c8ecb50a818feedd3de46775922bb3baa9
SHA25690f245c41610c84ed714d0a85029066793db85ef59940642aa9df9535676e5f3
SHA51251a5d4fdf270ac8b6dd71c0f4a697537d345706cee98ea063e9870d8222281ad7c5fb645ac6463665d33de80211eb828a00bb272db892aa429dd8bc3609cc6d2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
188B
MD5e87fff5af830e6aaf0470b4c747d89a3
SHA129fb9f459d889e0f800ef4727e10a84e5a5d0d88
SHA2563113266c8644f516bc69b2cf87aecf2db816b6df7e4e1875d2fdfaf6a1fc9098
SHA51227ddeddbe7bb440c4e02b396dc09fdb46210c2d6377cff1b07466928f06ca2cc25a36b0f4c104075bcdfc7c2e3905e9f7bcb2814f1fc831d4c0547607f4bc1aa
-
Filesize
72KB
MD50343c8bd4abbb882345e1b70ad53c38b
SHA1a68b56aa6edf4c60d02ffa9ee827f07b13961688
SHA2565a4227ac3ce660043f15fa602ca40535420e3e8f17da393fa7d38cd873c04082
SHA5122e2d0072eae4fd04c6e55435d8dda219c0278d2fbea390440e17b473d63862b81d0ef48c6bb2a4d746e9a4cb0aeea7828a15b76d9bb424cf616cf9d7e1d735f6