Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 06:52
Static task
static1
Behavioral task
behavioral1
Sample
d3c9518739bc6582c3b356608130ed88_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d3c9518739bc6582c3b356608130ed88_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d3c9518739bc6582c3b356608130ed88_JaffaCakes118.exe
-
Size
540KB
-
MD5
d3c9518739bc6582c3b356608130ed88
-
SHA1
27015c5e8f5a8747abb56afe4bd0a5b86ab001f3
-
SHA256
ec73ff3a9aad8ca7820e1faf2b7ea36534721ec6fae8520ebb9e07e04d020e96
-
SHA512
f7526c52e31db9e70361d1a2b5722ca2e314a05e24797eb108107062403a01c49559200d658826003ed2efa171fa3d159e90e7ac80640de797c5f2d5b0d47923
-
SSDEEP
3072:y+ybqai10SJ6/ot4AgMShQgN8f7NqXLW:AqaA6At4AqQk8DNqX
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\wmplayer = "C:\\MessengerPlus\\mplayer2.exe" d3c9518739bc6582c3b356608130ed88_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3c9518739bc6582c3b356608130ed88_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "00000001" d3c9518739bc6582c3b356608130ed88_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000a515cd87c196b3bb0441d9b1c655d7adef1df7a088935ba69db54db1190525dd000000000e8000000002000020000000a70ce05b1fe7ca3bdea757ddf460793eab3c7af4a080648e3494b6942668abbe90000000a8ac42f804bb86cfda2fa77501db9945685d2df54ec1ca6d10af07344e2fef5f534b4dbea11ce4cc6b3be41e81dcca745d2370b24faab3332d5d2f0780e5ea10d8133cffc770de93058473b1f0ed2dd38dafa01742ccd29d2d075fcd90482e66f114b7306f96af3a7aafd59e3858a18c46380a0fd06b4bf368e0bac4d2909395bc3d408166c99c1e3b16a2ce907aec52400000008a17bb938f6d5f251d1b99174e91fe24dbfcafa13633202735765ade28111bc1785b27c96c8a4e7bdb04d85124e2347c74b55bd392fa8c76e7ee221b40a7258d iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" d3c9518739bc6582c3b356608130ed88_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Download d3c9518739bc6582c3b356608130ed88_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ECA29DC1-6DAE-11EF-AC29-D6FE44FD4752} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000a0f1964655406600dc217808ff935d71e72505c1ef9cb5bf05670510a9069295000000000e8000000002000020000000f359b85b14bb50c73ac4811fd0df14156e561c14ca4129f1d82b27bbda0db6e620000000638f6b92c502f9615edbc102f00a4021c136834fd1f137770f7fc5eebe0744e1400000002fdd5e94428ccf69ba72f7fd775ba997758bd618f3c226b53c079d7568868a4b485bf84ed3571cc957633c459e3d3baf24eccbd2935ee64529de2ad126a2487d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50d7f9c1bb01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431940222" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2448 d3c9518739bc6582c3b356608130ed88_JaffaCakes118.exe 2272 iexplore.exe 2272 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2272 2448 d3c9518739bc6582c3b356608130ed88_JaffaCakes118.exe 30 PID 2448 wrote to memory of 2272 2448 d3c9518739bc6582c3b356608130ed88_JaffaCakes118.exe 30 PID 2448 wrote to memory of 2272 2448 d3c9518739bc6582c3b356608130ed88_JaffaCakes118.exe 30 PID 2448 wrote to memory of 2272 2448 d3c9518739bc6582c3b356608130ed88_JaffaCakes118.exe 30 PID 2272 wrote to memory of 2800 2272 iexplore.exe 31 PID 2272 wrote to memory of 2800 2272 iexplore.exe 31 PID 2272 wrote to memory of 2800 2272 iexplore.exe 31 PID 2272 wrote to memory of 2800 2272 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3c9518739bc6582c3b356608130ed88_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d3c9518739bc6582c3b356608130ed88_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.curtoegrosso.net/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eb75166d157e4151fccba2caabfecba
SHA15ffede54bde02dd39bc44b360cb697ce7a53469b
SHA256be871e35ed1705218d6be6d6a07178c27dcc5abaacf6e9e45cee6f430b411e0d
SHA512c06d9fc818e92b1c2c371a77b8d49d5db7e3411eb9ac4f9d61964c1ed4c07ce8bfde304195eacf9b9db4da1b812908777ee9a29b2bb3b6e1e771d07c12423f72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aabbc98815a4e6e267640fb48ab331d4
SHA11f3c0697d7903bcf9209b9ee7bd966c85df38f6b
SHA2568b459805eaa00c0e27f70acca3d0b05b08d2bd27256f615a772bd38eb3902a9a
SHA512822614cb6136b735f4cf547f4835d54f76c642e4bcb37354ca38ad478a542bff0fc77644dad71a6506dd689bb64b0b11aadf02b63e844ba85a384db58df15fdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5829fda48172ca83036664a9a8f47516f
SHA1dec12a73e9781b4b8576464ddff6891f9317fa30
SHA25652b90381dd1f0ed87dbc528aa6428de0235f6d222c15244dc93c1a20fd2ffdda
SHA5126a767054abfce665ba7cfe935a5378050e8d60f0992179c13dd14814291050d8f56cbe411057a0663174f46a0bc9c56eb5e8f5747bae1c02a68149d9acfa380e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5916b55e6739c9da8c0406186483b4c49
SHA1b3d3468654722f00b98c4f5c787d555741c2dcd5
SHA2565d2d9a17bf0378f6588d5070c29ef04310ac650ea7416106bdffd602674491b6
SHA512387fed30cdee30abc8edacb0d14f670e03dae783e513b8e177aa22ac2e004477e600b26576d0123ce5ce24f197d208753ee45d4a822ddb2236ee4cb05c89848c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd85f531338943b1930d9ea5b1d61719
SHA11390bcfd364268d9dd6517b78f5aacfd25fde64c
SHA256c8a2ce0fa3daac85a1f0d6c0a387e6165cecd866d3ffde5a3b57b927b9fae0f0
SHA51226756c132cb16f9c29b435b0b0d14804817743ca9a46f7486172fa278719feec1596d4b2ce1b2f7887a816237b0e457872635a7191d3df7e36b2ca650aa3b3ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecce6eb998f6da7b448b7aa8fcf24d5e
SHA1e83c122af8c4cdf239a4a6ebc8ce4cf3febf464c
SHA2569f8553186f57dd21422e9ed44b1f6fe00d03810392d24041e5f5725d71c172ce
SHA512612eec908f178a68c084bb91dcf92e1548d4bd4b5fd49e26914651695d8654e6df072d752287326c9ad0edbfed38b2119db61b2d2c3a3c5e8090bb2fe0666a56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f6ddfc237d13221e8570b457ff6568e
SHA1bb23ce19a09a8d26a3a0c1b788a8266f6dee3f5f
SHA2563a481453e19b172d1e117ea30fa534525f89ff728caf8520abc81ab3f995efc2
SHA512f62dfb53278860de2c384d3fb6337cd4f8e949f9c7af4845283ee67edaf157299c91369fe73e4cdd47a546e48d1c356cac512416db9b633fe8b1d0b87e7f7907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e83d754d62fd68e3f0eeea4b40ee3247
SHA1d43c6214e7333a70d4ce5421644a19e5c267ef24
SHA256f9602d4454c3fdf79b299f990fc624e859905d8421fdcf43666b9d3ec3d4abca
SHA5125995192e2e3bf65b5b7831476604574f49bd1cf6c28d0f360ec6ffea3ee1b45da6e14071df5d6a12c21bf926241a868cff8c6652ec137b3fd20fcc9ee08082d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562d5b765e7d1debc6bd92072b59801b2
SHA1693bb9f4a5ff0d7de9eb893be2e5a4d7d0631ca9
SHA256e1d94166c8ca3eccc853558bb9902fb17604d05a71c5b5f959e20f3adc94d352
SHA51212afd08a325d444f0860e45c26a9f5d6ce593fdf16ecb13026ca3dcf9eaa660e090abbe6271e9545856153088ce1f8d3cca2510e655f423473670473384b8339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581b54d26bdb1458c29af91ebfbb6e590
SHA181727d309dd160d2290d845bd38e50170b32479d
SHA2568ce84632759b544dacf767588b78900af20f1150ef888cbd6f49130260a7564f
SHA512c6595743911454730b7cf468ac75ede371d15a06eb32bdcff5b61027570eadfccafdb4d9da12e6dd633f5e18621179eed31de7837183defb884d76f67e5b98df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552fbeefc39db5dc9051422bab9e2bdac
SHA106723b8a67ce9a81086fd0baf503ec99a4350fc8
SHA2560c081895f1e529dac120b183ca437eebbede23ac8f7a08a7446036ca3db0c425
SHA512344044f9f0e3c1fe3b1c5aa41265e5081753f0d264e156d50889acc4d9dea045cade8fa178b96857349495b4375a43a1c0ebda659df7b4d3aab0c0b2f86d33db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cbda4c50b3e89a7a1904db67bdf2a53
SHA160f3628f91c65e267d1a21a45a7c06b78b4c946e
SHA256317cbea017366c29a87bb6f7cace8bdb5863c2766109955be931b64266f4c67e
SHA51252658c7ebe9695068eac2d5ffd4032ac4ad8ffe339ba2183e48926517d69d9dcfec730044f4a80582af2202404dc27d35d08a07d7e4192705cf08819c51d0b93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2657c13caafe8bcad777c083ebf9999
SHA1dfcc45d0755fdea265954975241a4ea8afccd583
SHA25634f28c1cc2cbe10fbf1557c74b4c2b5fe2c32453c631f895b6c85da851122be1
SHA51242eb444f2aec582193bc87c78ceb570a4463d9d8e71eafff9e5474f38165d7dbd0f5fbe0a24f682b42df04e3c87bb0aa35faa97ad9026a0bffe14555cce83f68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca0614def7631517fa8a3509f0e0c108
SHA11923d4a68d3d67e3da35af6a2198101518ae77b8
SHA2565b4916442ef567b9c5eb54d3efcec03f5e45d5336e90c5a8022f547740bcb1c0
SHA512c3490e11f10b48669d34d0ebdfe5bd3bf9baea1bc7ddfac4796cf8209021204db09c9c7013a3a95c807e856258dfd86ebe6b9ff1aca13f583821f7d2c8590006
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b