Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 15:44
Behavioral task
behavioral1
Sample
c91f86874fe27f7042c57a7ab112cd11_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
c91f86874fe27f7042c57a7ab112cd11_JaffaCakes118.exe
-
Size
191KB
-
MD5
c91f86874fe27f7042c57a7ab112cd11
-
SHA1
837f0dfe0184a9c546b98e64cc067a3fe8472062
-
SHA256
562627c0f9e3d04fe41cc152b638cbeba23acadfa8576fbb8731c13ffd76ed8d
-
SHA512
3527b2bc673ee2d0c7cf2bcce2e0660835831dc08995210148de153fbd4a193caf190f525861003992938274e947271d65b5c26cf541923f66c8a51ddd275876
-
SSDEEP
3072:FdTejYQcRkBtZy/kqtcGxekIQ8bqJLSjDexH0THKLW15Y5dyO5SDLm9qJV8Vd1vV:PWfUkBPyrtBxgQTMK0TKpxS3H8j0bu
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2668-0-0x0000000000400000-0x000000000056B000-memory.dmp upx behavioral1/memory/2668-24-0x0000000000400000-0x000000000056B000-memory.dmp upx behavioral1/memory/2668-25-0x0000000000400000-0x000000000056B000-memory.dmp upx behavioral1/memory/2668-27-0x0000000000400000-0x000000000056B000-memory.dmp upx behavioral1/memory/2668-899-0x0000000000400000-0x000000000056B000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA c91f86874fe27f7042c57a7ab112cd11_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c91f86874fe27f7042c57a7ab112cd11_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000000d7374e2b1f67cb1735f29455f536403238df1c4ca0485209a7d408b2c19331f000000000e8000000002000020000000f330f708b0a87eb47c01a1c9c117978a413314275ae79f2da3a2a6fe228893092000000026359c9f5edb88d7ec13c7a8a635569bb66e5adf426f075cd62d5b3cc02c774b40000000d1c10211e8dd9ac19a93f1be72cc586e9ceb0400b6e0b440a8c3593df0ba6f3bfe654a423904d5d671dc7ce0ed588319026fdcc948ce2163943e74dbeeee96e2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main c91f86874fe27f7042c57a7ab112cd11_JaffaCakes118.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431108198" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B2937E31-661D-11EF-BCF9-7EBFE1D0DDB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80711ca02afada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2616 iexplore.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2668 c91f86874fe27f7042c57a7ab112cd11_JaffaCakes118.exe 2668 c91f86874fe27f7042c57a7ab112cd11_JaffaCakes118.exe 2668 c91f86874fe27f7042c57a7ab112cd11_JaffaCakes118.exe 2616 iexplore.exe 2616 iexplore.exe 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2616 2668 c91f86874fe27f7042c57a7ab112cd11_JaffaCakes118.exe 33 PID 2668 wrote to memory of 2616 2668 c91f86874fe27f7042c57a7ab112cd11_JaffaCakes118.exe 33 PID 2668 wrote to memory of 2616 2668 c91f86874fe27f7042c57a7ab112cd11_JaffaCakes118.exe 33 PID 2668 wrote to memory of 2616 2668 c91f86874fe27f7042c57a7ab112cd11_JaffaCakes118.exe 33 PID 2616 wrote to memory of 2956 2616 iexplore.exe 34 PID 2616 wrote to memory of 2956 2616 iexplore.exe 34 PID 2616 wrote to memory of 2956 2616 iexplore.exe 34 PID 2616 wrote to memory of 2956 2616 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\c91f86874fe27f7042c57a7ab112cd11_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c91f86874fe27f7042c57a7ab112cd11_JaffaCakes118.exe"1⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.gamecentersolution.com/downloadgame.aspx?CID=21157&AID=7872⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2616 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2956
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59212de6e8cd1db0e36f8ea64fe85693c
SHA17f23b56fb82752ec2aed256e3638a48c98f8392a
SHA256cddc9d1356a427e759da178983bcb2db22f0dc87e50da68a8029b86aebed5865
SHA5128c6eda33b991c7bb4c1934de84dd1df2fa0e0fa5d724d7e830d371ed55e260673f564ce60f2650c7733539641d047d90bd7d701774ae09873f40490578e27aaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9ef19b3629c26e743135f53c6edb7f7
SHA160ccbf09e151bf4c014cf0cbf2755aa5f514a947
SHA256d67fe5ae8a1562fadc3f4a07f0464c0daf4eecef55c9ab3b29fc44c713c6eafb
SHA51209177ce47082671c7c5c2e186463bbe6696b600f7eb7f8467686933305723a868db37f3eef1ea3864ca06f1e0a93e5cc0776572def5f718b7e235d73314adb3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c43b1ec8b41611b248eba884027954e
SHA1c8e7dcaf0993ac92cda7add1aa1da91f7e9c3c63
SHA2567ba8244f823c8e393eb2058f243bcdff62a4d1f96f4ddf280a942958fd8cb416
SHA5122198ed773c01cc5bd07a515cc0d2d9751c998f5337fa6d3b3b7c0c126a8975fd3b98147d258e4d965074d01efea6518d91364e65d50a3dbf96a47ef8b788b4ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594c6d2603d1c6b52d37004db4ad3dff2
SHA10d1c0ac00899055f08692005f9831bacaf33b5ea
SHA256717170363a842cd4d66476a405f7f723b37f297ff40856b582c91675510f69c8
SHA5127769f4822e2e25456c67bc95f1624d84c4012036f79898433410cebf2d4caaf15151b55c31269660d2157eba6be5a169934d6b2a6d96c1207f4a03f47a055941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9cd34c42557a287256cba3b6f1ca0b3
SHA1f8dc814a9472c920f8da2d3421782ba5287793b3
SHA256932314762828ca6e50e00b1eb3cf75d7ca90fe596b99e861c5a28ba209e21117
SHA5120baa1243f23c60ac480daf3e91ca0e21bce5304332d18a7cc297607c1e3767836887d9599541a639b3fe89874eb67293b054848d914937211dc0def9efbeb8f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b15a4e74a0839f1b2b38ef59f9bcd3e5
SHA11400c4cb12e8caa3eea1dd36a6b4426ee969f5fb
SHA256e7fcc86a1ddba987a3e600d101a12ba0b95a50555a7dd682f61ceca171307c7c
SHA51250427d1e30f841c7a63c4ceb2657b39276479a4441d481a5e106b4443e90e35a8e24c72c8c7f91fc7cebea50b79facf9db16a2ee9401d31c738a29e96124e681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50856763057e118489aab9b5b75d2f03e
SHA1af4c6ca45617b1270a7b5109faacb4c5a95ecef1
SHA25632a7cd1587b6113acb589d6d66056246fb6c88e532db55f4df0d61cb4fd75773
SHA512cf13a616a1966f7f1774e01a661cf9edec5d97a75d28369d4f495753b57657b7c3c61b76ba69b32cabbc625c68f1bb3840a7a95fd26e5b8f540924738a8a0580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea6c8ac949f191db222fc7cb6b2679d9
SHA19f1ddfe8e84dcd39b7edb06f580227c48f36fe50
SHA2560ba7eeb4c6ef89a70bca3f1369237bce6ab7a513c11eb797e515c1583904d2d7
SHA512a4ef48cff0305be8bf625af3dfbe9607136da0b4421a1946acc108a8653330c8dfd324009e17c3e024d1c51b2c8c499f13a265a80b9d522ad20242bcb1157636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599b4fd7d18a72f34e863bf8373e83e5d
SHA10abe2f9b1cc2c6f34f62333797b6e1aca1c82569
SHA256d718632a96a9f148aeb05d335f3bb1f994650c30a6219969c454f59d0f65f089
SHA51256ab7d0b9d283942ad2dd0542fce277fe926fa4915bb2a9167f5e0aa87ddd277702d130cfd47f883d6ef79b7c42d6dae5e7e6bb3be3c937a8a06c16baf64c6c1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
192B
MD50fcf82b5a915470e8a79d3516f582a36
SHA175f81b41607905b231521243129aff3554a58db0
SHA256076264d4f165cef82f0cb07f6795f1d5ffa74741a943fca42cdeac65823bcae4
SHA512adf69ec56756fe672677b039cb44bb13fc3adfac569f5ea4eda4e7b35de5ebe0229c5825ca8337aa2c623a773bdf775ddd3689e9fae03a7af1f694576d954293
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b