Analysis
-
max time kernel
140s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 00:49
Behavioral task
behavioral1
Sample
cde7bc198a51a823398382a3eec26875_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
cde7bc198a51a823398382a3eec26875_JaffaCakes118.exe
-
Size
191KB
-
MD5
cde7bc198a51a823398382a3eec26875
-
SHA1
b756585570e704278d663a1726d97e012f5bb389
-
SHA256
a5d97582f00ce0f573d94b1b699c9bd7024aff7f72abc0ecadb56c84f6659f23
-
SHA512
0b75d47116e506f51d8d468bd836e1d4dda47528f7f1634f3ae5a909d32872b709bf6f65fb9176960654350c4f951d6e7abe1f29e4c0a4fae9bd7af29ff3875b
-
SSDEEP
3072:FdTejYQcRkBtZy/kqtcGxekIQ8bqJLSjDexH0THKLW15Y5dyO5SDLm9qJV8Vd1vX:PWfUkBPyrtBxgQTMK0TKpxS3H8j0b0
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2124-0-0x0000000000400000-0x000000000056B000-memory.dmp upx behavioral1/memory/2124-33-0x0000000000400000-0x000000000056B000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cde7bc198a51a823398382a3eec26875_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cde7bc198a51a823398382a3eec26875_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf710000000002000000000010660000000100002000000045f54028d68dd6379ac41a0565ad67d6197e64284215f4270368926a6468697d000000000e80000000020000200000001617d5783e7c4c83bedd6451a7d957d0a3be20d01a956f3bc4a77099e4a16a9c20000000860868eaabba80a30041cf0713f67b60a8fb8f88ce4ac583bf5f6232558d288e40000000ccbe1ea324bc0d8d48a194b9788a48660e9ba192b78ee6e4cb158a5bb2ab7c744acfb7002eac87f9d04619fc9d4a65b7818b00c19f03d86ad373f184791478f5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main cde7bc198a51a823398382a3eec26875_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 408875ea08fcda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{140E5D81-67FC-11EF-B96D-66D8C57E4E43} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431313660" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 528 iexplore.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2124 cde7bc198a51a823398382a3eec26875_JaffaCakes118.exe 2124 cde7bc198a51a823398382a3eec26875_JaffaCakes118.exe 2124 cde7bc198a51a823398382a3eec26875_JaffaCakes118.exe 528 iexplore.exe 528 iexplore.exe 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2124 wrote to memory of 528 2124 cde7bc198a51a823398382a3eec26875_JaffaCakes118.exe 30 PID 2124 wrote to memory of 528 2124 cde7bc198a51a823398382a3eec26875_JaffaCakes118.exe 30 PID 2124 wrote to memory of 528 2124 cde7bc198a51a823398382a3eec26875_JaffaCakes118.exe 30 PID 2124 wrote to memory of 528 2124 cde7bc198a51a823398382a3eec26875_JaffaCakes118.exe 30 PID 528 wrote to memory of 2296 528 iexplore.exe 31 PID 528 wrote to memory of 2296 528 iexplore.exe 31 PID 528 wrote to memory of 2296 528 iexplore.exe 31 PID 528 wrote to memory of 2296 528 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\cde7bc198a51a823398382a3eec26875_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cde7bc198a51a823398382a3eec26875_JaffaCakes118.exe"1⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.bigfishgames.com/download-games/876/masterofdefense/download.html?afcode=af628d3a27a22⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:528 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2296
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9bcfa62c0446fc044fdce7bc17d7d99
SHA11c4d3e7bca16b2233e9d792e0d8f8648d9121eef
SHA256aec726a2ed460d70c85e988bf1a8f873f3bc70ec622b9e0b9b61e41f5b50063c
SHA5120c54dcdd894f460a6f81c3d07e1ef763fe812c1ce05985f1db3100d866dedbadbba3a97b9bf4f79367752f9540ea670e9a682b981a03b5b193d34f812feb28be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d243b8185c0c8d9853e387184b7b563d
SHA12ffd6cfc2d5f77e17473f76bdaf2c35ba8ae111e
SHA256c3389882cc73ecbadad9587b2387af6aed7aab14dc9e303454b9db68f7a91008
SHA51222442e54cc2f93f7e3858be71a5ac45ef8b1f410428678d5a6b4b62703c0ef3bfc4cd332dd281cf857e7fb071417b338c9fa5a4f6337adab32fd5a2845512ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1413080fd9d0dc886ce979a2e601270
SHA161e94a4142df44614043ebbdcd5e15418edf1c9b
SHA2561d69ec33bab83b3ec95e93ed94f6c7e29ce61adbc2dcca9ef9b741954954429a
SHA5127bf32d5a568c15b0948a1a41e58faf10bc199878e6102280867b1ce795443a77b7b9d1239dd7723f4fbfbabbf9f2055d9063ea29e8191f5ac498231864e869a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57939789162159fb4fb7ab78fc15700aa
SHA116d1c219144b5385b6f8f07fe4f8cf490e33a72f
SHA256ebeb099aa54ce0d8fc4e8f9b8d1dd3e9cf470429c3e4f871886512a59de4d8d9
SHA5120d0fab0515162a0326e77278230804fecf33841b17f04ab6ff908d3fa86a8263e4bcf533818845819a1b87361bd7e856228c2b79127239b0e51b03bc5fccb41b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5570f24f3fcd80e373dc70df775a20d75
SHA15dd33f52d790f38f346926171aadd622f045144b
SHA256229dbf3dbfd28457a4dbee6e860b77441f12cd4eae1923bcc4614bc8f85cf0da
SHA51275c498ecc2a71bf083057ca1437cf668780436d627f2806ba48379bae693c0ff800280cdf03c0e15e4120e10c631679eda0c64ddee5c8fcc06289df85a127fe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8c7fe98105ba906ad86dbc09a6f3af3
SHA1008873b14aca40a748cfe72b5f447f4343861884
SHA25668e36f2a4730e736b92b332e3ceb5c7fc717bf061b933e0209d495dc1784e173
SHA5123dd5057fdb4dfa734f2d16c0a41b20b3a4b2a00afebb5f691e73c21e255dfd5efa8e76cc0a0169e748399a8c0133d9c05b710258dec6305b541299a2cb581031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ab2d7fd883e7f31dadff9ddd2dfafe
SHA15cb21fa0820e95a42a420b3edffb35bd6b1ba7a6
SHA256fe5fd5140e23c5799fd6a6636d2403f791d8443f3ca8ded1c959162d0966e143
SHA512154421fe9d2a5bd7308383583d67d6aa1909e63d5c62fc5bcc7a97e19edd03033177dc389b195eb484ed7ef226b1d7e97124c3d01b7ca0791d54bd2dc98e5804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a35c9062062236974cf414e1acb114bf
SHA174c19ec479aa8045c79b7f547d02da45fd57ba23
SHA2566842a569937b8296c47d422317bd0fe4d820e324c0c6038eba93c0dfa7cd3e33
SHA51205bf2149ce56a11788b33aa4aff1539e35cde1de52acb49b784a2d3d353059b00d170b1a4cb176834a5bf94527cdfba9a8133cd751f4b9e783071d7d814800e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c910c4d9035997a0cc497e9b0307776f
SHA169e0eb4ac854cc717299a2e42f9619d6f9d8b31e
SHA2566ca3a125194ad18640955a79f7e89b63e71e1d43ad8b0c236640c51c908af0fe
SHA5122298cb4cc3c509e067f3df3133a842939e987280d7359fa028eae569b148561eb7d91f8a917b0f83828c5a1415fc0c6eb30b780505c8a26cf082401154324bfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3b60910dcfd983c66e5399530376f74
SHA149103d2ac685dcf031c2531dae016397d825f9b7
SHA256a1a19db875e7e48f9e8d72fd45e011974a4ce63260c642849ca206e602d50763
SHA512a6e7f5f38bcd27039770d53f7a079804109bb206661b654f90abdb0c9c184b32862c7b5778a6af7b9eabc307706e7d08e13f8bdb9ecefb3befb09003a00ca041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf1d3a8fc3c2dd9f873ac75766f1d30e
SHA1a6366c8496d74d8eb7d859cec3af9192a0716f96
SHA25663e7acd051b15858e340f7d44b428bf22ca661a546ce924b2d72dfe0d23f1a25
SHA512dde301d9cf99e27d0a319a190579046def9a32423a6253aff1112aedddf84d622c1b8f000acdd2a824b7c5779bedb240a239c484c5deec807e55e6808b0aca79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6674af6503dbbabd5bbf198c38df2b5
SHA1fb3cc90f6d0df484894bf00de67abcb936a882c4
SHA2562bf711f90b8b51ecd85ca9d1cd9b84cf2e1ce509b3216483aa1f9655c164331c
SHA512c595988505268e8e6da8f38c9187c4a91182c1b2f7eecd27ea3d495a68e715dfff326b0024a86da88b853f84779a138dafc157d5759e78e5ba162f0efdb6c4fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5980813db014be1d4a38cda0b4aeceb41
SHA10256206dea346506d9306f3a8d9eccde29f7549a
SHA256a8e4832edcb9c38620801c72cefea5f8f79ebb088d7397b3c413b25eb7d21f52
SHA512f9e2a22a444e8d67a9ac11f7b88f7f6e33242d19559942d3feee5cbaac0a36edf7fa26322056be1135d9d6656787d6b0b0095b5f0e797232a357ee062bd40d9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52793a889f07cf24770ac6ca3b9ddb916
SHA190c0e6237deba0b3c552c376071b00716ee5746c
SHA256963e891d7545f630a2c2cce77a2746f089bd45b5b1ecc714ecfe623f1bac9250
SHA512e230f29a0cf05efce13173067d2bd1ddcfd6e656d027271dece39db693bc9a7a76abb0a0819b3e1b258c2f0077fc1b69b8b9269f9e95a180e063bbb4326b1aeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5552c0b0c787d9a31c70c8c420d6bf4
SHA1c6f00c66bef0d102dbf22726e3a4d54f26c0146a
SHA2560c0b4cd21ccd293e66527563450a0f7f6ccd6e072682d7d62980230959909d44
SHA51213f421ff4446580ee6003e466efd986003883a77324781cea970a8a227a3488256a14a1a1c08bcc10ef22b3eec5d16a4869a1b88e8c0f272401bbfb07c54ddd5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
192B
MD50fcf82b5a915470e8a79d3516f582a36
SHA175f81b41607905b231521243129aff3554a58db0
SHA256076264d4f165cef82f0cb07f6795f1d5ffa74741a943fca42cdeac65823bcae4
SHA512adf69ec56756fe672677b039cb44bb13fc3adfac569f5ea4eda4e7b35de5ebe0229c5825ca8337aa2c623a773bdf775ddd3689e9fae03a7af1f694576d954293
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b