Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 23:56
Static task
static1
Behavioral task
behavioral1
Sample
d0ae798e9ed4e29829be4a63c153a83d_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d0ae798e9ed4e29829be4a63c153a83d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d0ae798e9ed4e29829be4a63c153a83d_JaffaCakes118.exe
-
Size
96KB
-
MD5
d0ae798e9ed4e29829be4a63c153a83d
-
SHA1
18cc3576bae077f37fb2e6ecb45e5f8972b6e589
-
SHA256
2e1e76b3154a9b2946a3bd60ee74d620c6dfcb1f732b55adff41bcf9e668c7fd
-
SHA512
77cffb713aaeab0bce41d4bd905fcdb38a028185dab70354589aee12f8155751e43c28f710c03c01ded85e03ae4f71a78ea595346ce36bf9d8f7bdbab9f46192
-
SSDEEP
1536:Wt80qzTsJg1GnxJezBZTkgHDJpRRSMjsQITBos2/JmdjNkI2:W6TiTn8TkgbDpRIoL/JmFNkI2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000df8ab638b06f996aad0d4f244ac1e9ea1a95e52d225c12de1fca09f3d58c980c000000000e80000000020000200000009f440bb2a9c74d728fa57ffa5e55b598d7fbec4163658f583fad5f95124a5af82000000033731ed38cc836a1c95b0a4949830bc50db1a15464f743a7007497d63490b1b1400000005df3d2723fcac05559f1f3fc6029bfe7553cfa4458063da77ad8462bf6154cd4aa029f3bedccf4def5f5fa135292f749a7131cf42059777b3a12f698156abc61 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0BEA9C1-6CAB-11EF-9DFD-D67B43388B6B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e08ce175b800db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431828854" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2800 2384 iexplore.exe 30 PID 2384 wrote to memory of 2800 2384 iexplore.exe 30 PID 2384 wrote to memory of 2800 2384 iexplore.exe 30 PID 2384 wrote to memory of 2800 2384 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0ae798e9ed4e29829be4a63c153a83d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d0ae798e9ed4e29829be4a63c153a83d_JaffaCakes118.exe"1⤵PID:1308
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ddfe7e5ad30b788a6b11271f64d7108
SHA1bbd353aa5b2d7b718c426ceb861eae999d4328e8
SHA256ff5196dea6ae366ca8e626809c1765a4191c4bd651cedb86a7005fdc9e6259cc
SHA512b42eb560a63e9cab3233dfad2e44ee354cbd6a32785721df30e4bb4174457e4744650f9e0ee351dd4b7a072c4139854b2f06a81635d6b39702a8075f99527b3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d82db109d507ffe402c87f8c15c2b97b
SHA1d5a5bf94c6629d34f9d50209eed8236e5a4f4d77
SHA2565490581d53e0ee4ba1e2fae7e6555d49a652de56fd44b5d8849fa33db664d06d
SHA512ad5874959c421409320440a310d17645b48a5c5f2f0d42fa14e0c988084d25f7d3f42a342b7d763eb05bbec5318474c5ec863d49231f71dc88f6c1e08f1dde58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565635bf18bf7758f46732b672f7715e0
SHA14d1cdf03a1ceaccdd4121b2b0fa9a77562614023
SHA2568b910af6b209214def6798c74820cf5eedcf0aa5791ebcd91e4a5afb2a4d72dd
SHA512595b593944256cf31e87e008c20660c9e1cc3d427fe85fb0b47c43985c8e9a5493082bfdc9df15999dc12c499ef29f78c54ae6d7aa64055ac1f1148b97c00e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4703e0717382a94823c3263635fb7b3
SHA11ba5527e1f9ce12ea506df325cb4ea6d52804455
SHA256131e743b8f44f0d2e7cbd2db1e55c82a251f0022166a3a7cb91f943e38cbf451
SHA512f88634603b510379e201b107e741409f318806c65b9893fcfb0639b68bce32fcf0e2052bf4afb002b4513ac8d424713248a68ffb248222154d4bdf518e15a880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5612e5fb8ce02b41b0aff76c5ec247e8a
SHA1aea930d865503e16ba408a618a6a7b96040315df
SHA256fd950897c5c8d048f905c460c4647c22babcfd15c611392a04a7296d78e7d8a5
SHA512a43b38be87d9c9a9502730f6ee52edeeeb4c5cd1236d840c60f06b03d0b2e5e5e59903110e4d5d0d34c800f8ef0f7698179202882a8ea26d9aaa13643d01ecd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbeac4f6821c1ff86bd4d6a2c3c2b615
SHA1af3a092f7c4669f9796c9d1424080a26692bff40
SHA2568fde28f4d8f1e50437203b2843a9621801c8723cc8ae16a2f482e6600e6fd0e6
SHA51248882ea96b9565b350366e08fdedbee47b0d05b57de5caba2273199619df837cfb4ef5eb7d5edeb3ee9d095d16d4cff5acf396b03c35da1b1a01f2015167cdf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c979c2bdd0e0852da6dca937edaf3e3
SHA1a790b9fb0b7fa8d9396d5a9928fd39e0134d89dd
SHA2567ecc6f161a47248a85e3aa49e717be22d47e45a0d548cefead80719ef4db3c40
SHA5122e572a585a6097e249f5edb5403b2bcd46b594617127fcc4d0cc15963872ff047e46caeed4eba935168df114508f68eb30fbe12289567e23a16d0b0fdea20dec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d58e565f4c49ed92c50156ab85e22940
SHA17717a144cf4adbf8f9102634525cb8695614683b
SHA2569d44cddbb8436b0873c9bda8095707b7ec0114f66eac4b8c01da7ebe8a7a64a9
SHA5121e00203992ef67013f94b3a23968e3170bc65bad72e3dd599f2b84073ee38480163225c043702c68b784e7a2dccdf6dcac3f0d3b6a8365ec3301fdb03b2ea904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517f14b464318b3d88ba9d0a4b2f11154
SHA19e504eac4c9c29b24be0d98ce1b2969916853316
SHA256bf204c0be559513d690b9a0b64e1ece63fa54719f05e1d492bec64ba4fe1813e
SHA5126e41970a468f56e14b283bb4f52956ab6d8dc36ed152d1b3d59a7fb38767ce291c2d432192d633db1e5cde35eaaa7c05e2f024856301cc19e218c6833cef7590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a78ed0db5cdca70f0e4a4fc7dd8b6f11
SHA1347f0855d09d4862ba1e3f541bd5a1c09f99ee51
SHA256bf0fe79e23360e52fce705397b2dc0170dd882f2a0d3d66ec6d15dfd75b37a26
SHA512d8b8742eb73ac45e62b6693ddec7419408e65c277418657af53d7891b075579cea0d80476593d6d957c564ee4eb25ea65d4c29cca82f16a7c344d79f50c12b6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527025885ebb6f480c6b14430085f3f94
SHA19ca92866ca40e38e3b3cb8ff23d8901222b2ae79
SHA256213d80165f1914176962bf4128fee00ddc762bcbcb932f9a4eb919fee93cfb18
SHA512b37a69b29b4f93c65d348c8786abfdf1339135040cfff1c28ae2dcb606d473ab99cbe74c5984ebdb43f79646d13b492c53d18e1208abb57b93532ef5ae3513ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b77eb57d5bb630a3636be20ed02b8d3
SHA1db8202285fc17db12203cd945c2ed92bb6f3b720
SHA25695ffea67f21852736afc8fd46475bd044747284af647482d060934a9057a418c
SHA5125092c487c38d627403a4b7e63fa38097a698fd744d2cad7085595dde64d0277e0e5dc3f4099b4d2a92522cf1dfebe0a9fe14c60df64b2e961b1493cd1dc3826c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571462ef648301c27fae55e0dd72e0694
SHA1fab7bc6942fc1c3ebfd7946c9ea15d9bb1abba2a
SHA2568b188ba3c8b47b3c9a3dd7474c8b0a459dc13f7d8465c7e9d4a2448bef3112b8
SHA512bdae1f528d0e45f6e9d2682896f63feb79d5aad8dee75982403c736471a373edc96be7055ee87286bba4062626584f5bf0b805177f4d573821a6f01724ff352c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d007d3351d672605f0d30a53de821af
SHA104b968ab869541f65473956f1cb9d821e323a7b3
SHA25624f7314e4e1eb25bd482881dcf32434bd4b2eae9ffe305b5576f4a626c90a96b
SHA5129fa48dd6fcc346e356d11cb0b9e8897a45a1baee38f670766165c718e77fb6a4cf93e81be29b60743cf93685849bd6c23831f3711bffddc14d03f80c2f18a732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50804aefbccd5f0c54e79af86766c4668
SHA1e5a6f885d1f753e15dd2209d893e2be5e1438966
SHA256ed634ba5a72b7245a71e7d30b2b98dbfd8863b53935441d764997927193963de
SHA512073f3603a67b9420f7944ee97a1641f5385f015e3b93ef69e747bdb4cfdcc8169cfb8d957854366a288025e2051e53d1657f0dc3d9c13231b058aafb8b35ddca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546f6467fc6a45f156c0d211c013e9b88
SHA1d5f2755d85536b4094e127f0d01be232f5d51bc2
SHA256f88231b571fed029c8fd6f0068042cb97a6884c3ad2e87bee1e4c8f5cb4a9ae4
SHA512d7f8ea9edcdc238fc0d122129fd6e6ed133a626c191b7fc2cd8c3d034e88c7c0a1b40024567762bc226994fe9c68f318c450a0bdad810c1ca71671a00e8ab5ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59107c720789840ff151d5cd2aa9523fe
SHA183ac31d3511124c64f0c07dd4b66c8f84f9d5ba2
SHA2566db89bde6c14c6facc00bc35f6769bdec3b8be6e49fe0f7901c6ef8a838b1f58
SHA5120811c64f4beb24626c03cdbb6650c3f7254d684af185df4fb855401b15cde1cc2907f88de551037c449271db19bb53a7100b9f8ce41fe12f656c01be9702a4af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad63d242242cac7a95045cd65a0b236d
SHA1419948a843b148d31ec0632e71241b7c6c90bf4d
SHA256041027e3376978ea16ddec331c440a544cf781d47a56945ab00be258729544fc
SHA512da9e31517e7389e159f088b4b62c911181825f7e379cebbd94232b3d59903b89449ede7052875969f0842a9814822e8ce91e2de5d813a75c9600d4fb7f3dce4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589f1a969e8e39cd6a1f38fb58c9e5f5e
SHA1d3c9760b9f75b89299c48435d389c0db8ed7496e
SHA256ced16972488fdbd0fb6749d82541b862136be127da8897024c75615c5629746d
SHA5126abf3201ce742e2b166a93ec4d1340f7c22586583159a34d2cf290330ec6d5ead6e63be9b2f608a7fef184e358f0a571b6efe7b559805dcf8d6698cbcbae7dfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c227c8f8d22f3bb6adbcaf7773b1733e
SHA127bc623b8638db94bc2091a37b2f7f6c1fc34775
SHA256e783f16d93c1fe41f2effcd966f9eb87f67f51df834f39d146a86ca82b083d96
SHA512af945a6ec6edd2ea293ca423471fb8f58b395de31bf852b3ea83d312b2e1f56d642340889f01c1cec907bd91f0277f30e4be58ea1322f2ac05a0a331f78e6a84
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b