Analysis
-
max time kernel
118s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 13:48
Static task
static1
Behavioral task
behavioral1
Sample
da7b19cd3ff4e2cc69dcc84d67d59e74_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da7b19cd3ff4e2cc69dcc84d67d59e74_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
da7b19cd3ff4e2cc69dcc84d67d59e74_JaffaCakes118.exe
-
Size
307KB
-
MD5
da7b19cd3ff4e2cc69dcc84d67d59e74
-
SHA1
1c333ab53ad7760af547f4729e6779ef252028f3
-
SHA256
49e93f3641fe493554ff0aaba5d086695c6e7cea6e5833effdcccba408881c19
-
SHA512
32324fb17a19175bc9fadfd0186ce2911ff5ce2760caf084711be8187ed7301fd23beb259d6feb130db343c17f90ead2f7266cdb264b6b7abc439d72fb8c16a9
-
SSDEEP
6144:SgC0gRIGJMoiMMZ9U00Ae4vPt9SU8gPbctu/2k/cqc9SeZuF:Sug3sMQ9JemPDSjLtPF9S
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2788 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2760 G_Server.exe -
Drops file in System32 directory 43 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\DNTException\Low IEXPLORE.EXE File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7E6B7001-7044-11EF-A7B5-EAF82BEC9AF0}.dat IEXPLORE.EXE File opened for modification C:\Windows\System32\config\systemprofile\Favorites\Links IEXPLORE.EXE File created C:\Windows\system32\config\systemprofile\Favorites\Links\Suggested Sites.url IEXPLORE.EXE File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-2845162440\msapplication.xml IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\Low IEXPLORE.EXE File opened for modification C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini ie4uinit.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\TabRoaming IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~ IEXPLORE.EXE File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ieonline.microsoft[1] IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico IEXPLORE.EXE File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{7E6B7003-7044-11EF-A7B5-EAF82BEC9AF0}.dat IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~ IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\Suggested Sites~.feed-ms IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\History\Low IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\Favorites\Links\Suggested Sites.url IEXPLORE.EXE File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\Suggested Sites~.feed-ms IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Feeds\FeedsStore.feedsdb-ms IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\Favorites IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\PrivacIE\Low IEXPLORE.EXE File opened for modification C:\Windows\System32\config\systemprofile\Favorites\Links\desktop.ini IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 IEXPLORE.EXE File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\favicon[1].ico IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\Favorites\desktop.ini IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low IEXPLORE.EXE File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk ie4uinit.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\UserData\Low IEXPLORE.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat IEXPLORE.EXE File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Feeds\FeedsStore.feedsdb-ms IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357 IEXPLORE.EXE File created C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico IEXPLORE.EXE File opened for modification C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch ie4uinit.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\IECompatCache\Low IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357 IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7E6B7001-7044-11EF-A7B5-EAF82BEC9AF0}.dat IEXPLORE.EXE File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{7E6B700C-7044-11EF-A7B5-EAF82BEC9AF0}.dat IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\IECompatUACache\Low IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-2845162440\msapplication.xml IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 IEXPLORE.EXE -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\G_Server.exe da7b19cd3ff4e2cc69dcc84d67d59e74_JaffaCakes118.exe File opened for modification C:\Windows\G_Server.exe da7b19cd3ff4e2cc69dcc84d67d59e74_JaffaCakes118.exe File created C:\Windows\G_Server.DLL G_Server.exe File opened for modification C:\Windows\G_Server.DLL G_Server.exe File created C:\Windows\uninstal.bat da7b19cd3ff4e2cc69dcc84d67d59e74_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language G_Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7b19cd3ff4e2cc69dcc84d67d59e74_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021494-0000-0000-C000-000000000046}\Enum\Implementing = 1c00000001000000e807090003000b000d0030001800d00000000000 IEXPLORE.EXE Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\Suggested Sites\MigrationTime = 80bf92415104db01 IEXPLORE.EXE Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 ie4uinit.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\Flags = "1024" IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\LinksBar IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{00021494-0000-0000-C000-000000000046} IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA IEXPLORE.EXE Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Flags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed IEXPLORE.EXE Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{72853161-30C5-4D22-B7F9-0BBC1D38A37E}\iexplore\Blocked = "2" IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\LowRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates IEXPLORE.EXE Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{72853161-30C5-4D22-B7F9-0BBC1D38A37E}\Flags = "512" IEXPLORE.EXE Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00c7000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{95792F08-64FC-465F-BE05-60D46A5BD9C1} IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs IEXPLORE.EXE Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021493-0000-0000-C000-000000000046}\Enum\Implementing = 1c00000001000000e807090003000b000d0030001700ae0302000000e11a542af65b6546a8a3cfa9672e4291644ea2ef78b0d01189e400c04fc9e26e IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Connection Wizard G_Server.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\Software\Microsoft\Internet Explorer IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@ieframe.dll,-12512 = "Bing" IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Favorites\Links IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad IEXPLORE.EXE Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Count = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\62-50-97-c4-7f-40\WpadDecisionReason = "1" IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021494-0000-0000-C000-000000000046} IEXPLORE.EXE Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\Setup\HaveCreatedQuickLaunchItems = "1" ie4uinit.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs IEXPLORE.EXE Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\KnownProvidersUpgradeTime = 403a91445104db01 IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{95792F08-64FC-465F-BE05-60D46A5BD9C1}\62-50-97-c4-7f-40 IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021493-0000-0000-C000-000000000046}\Enum IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder IEXPLORE.EXE Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{00021494-0000-0000-C000-000000000046}\Enum\Implementing = 1c00000001000000e807090003000b000d0030001400e80200000000 IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Feeds IEXPLORE.EXE Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{95792F08-64FC-465F-BE05-60D46A5BD9C1}\WpadDecision = "0" IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021493-0000-0000-C000-000000000046}\Enum IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates IEXPLORE.EXE Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{72853161-30C5-4D22-B7F9-0BBC1D38A37E}\iexplore\Time = e807090003000b000d00300011008d00 IEXPLORE.EXE Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\DiscardLoadTimes = a0b74d415104db01 IEXPLORE.EXE Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\Main\ImageStoreRandomFolder = "aav09ki" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2712 2760 G_Server.exe 31 PID 2760 wrote to memory of 2712 2760 G_Server.exe 31 PID 2760 wrote to memory of 2712 2760 G_Server.exe 31 PID 2760 wrote to memory of 2712 2760 G_Server.exe 31 PID 572 wrote to memory of 2788 572 da7b19cd3ff4e2cc69dcc84d67d59e74_JaffaCakes118.exe 32 PID 572 wrote to memory of 2788 572 da7b19cd3ff4e2cc69dcc84d67d59e74_JaffaCakes118.exe 32 PID 572 wrote to memory of 2788 572 da7b19cd3ff4e2cc69dcc84d67d59e74_JaffaCakes118.exe 32 PID 572 wrote to memory of 2788 572 da7b19cd3ff4e2cc69dcc84d67d59e74_JaffaCakes118.exe 32 PID 572 wrote to memory of 2788 572 da7b19cd3ff4e2cc69dcc84d67d59e74_JaffaCakes118.exe 32 PID 572 wrote to memory of 2788 572 da7b19cd3ff4e2cc69dcc84d67d59e74_JaffaCakes118.exe 32 PID 572 wrote to memory of 2788 572 da7b19cd3ff4e2cc69dcc84d67d59e74_JaffaCakes118.exe 32 PID 2712 wrote to memory of 2856 2712 IEXPLORE.EXE 33 PID 2712 wrote to memory of 2856 2712 IEXPLORE.EXE 33 PID 2712 wrote to memory of 2856 2712 IEXPLORE.EXE 33 PID 2712 wrote to memory of 2708 2712 IEXPLORE.EXE 35 PID 2712 wrote to memory of 2708 2712 IEXPLORE.EXE 35 PID 2712 wrote to memory of 2708 2712 IEXPLORE.EXE 35 PID 2712 wrote to memory of 2708 2712 IEXPLORE.EXE 35 PID 2760 wrote to memory of 2712 2760 G_Server.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\da7b19cd3ff4e2cc69dcc84d67d59e74_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da7b19cd3ff4e2cc69dcc84d67d59e74_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2788
-
-
C:\Windows\G_Server.exeC:\Windows\G_Server.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" about:blank2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\System32\ie4uinit.exe"C:\Windows\System32\ie4uinit.exe" -ShowQLIcon3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2856
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:23⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD5da7b19cd3ff4e2cc69dcc84d67d59e74
SHA11c333ab53ad7760af547f4729e6779ef252028f3
SHA25649e93f3641fe493554ff0aaba5d086695c6e7cea6e5833effdcccba408881c19
SHA51232324fb17a19175bc9fadfd0186ce2911ff5ce2760caf084711be8187ed7301fd23beb259d6feb130db343c17f90ead2f7266cdb264b6b7abc439d72fb8c16a9
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5e9a18b314891bb4967bd6856000154fd
SHA1ef7fe228e68c094f5877a6b7c5d3c593508c93a3
SHA256d59b726c01b31874fd237045eca737a1b74eafe948185c3594974a038f3d8378
SHA5128c84ad60dd75bb54f0a02a1153e84ff6366d6f258acd8489f470379a2b5daeabbd66c1824a5b3dc596e74b606e661cb718cbd15ba39bd78e7efaaad22085f86e
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511c2a757c07bcc6fa8a5ceb0c630b363
SHA1f9bda46049edf9dd1aa4b63b6a8dd3ac72d266d4
SHA256674c16cfbc889e004df7ba5fdbeb60f7f7bea11ddd3a494dc44682549d4afac5
SHA512831171da5d9ca67cace78e9cceee5e6cc49aeab26cd1c7b0a6163969b193d7481439a50819d7a0545cb6a8f10004a5221eaac8cfa16ca9bba0e77b1a3632314f
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fda8ec417486963c2428b9f43e94256
SHA149d3ada73b9b9e2e18e3625cd6bbd0fda1474f9d
SHA2567193c741f9f3d3eacf6aa30bbd47ce81a054131bccfb52fb0a2e170e6b36fe62
SHA5128825d0ce6aad690f089149bd960035b2435db67df38aaf4403d33eb02ac5d9adc46eba0372d21d9de6857c81b41603508598f88775b715a5d1b7eec7e72bea3f
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4dabcbec5ab5b80bbfa52e5588ec175
SHA1a2b91a26512b044479e4bedee1e78040a5fef3af
SHA2569f337f0b457e5dfb5010f7186cbcfc7d0cc394168d9b2c4518ab10ea358ffd15
SHA512a5663ab4caf6a1f2f8028142867f327385feb4914067af7175cad5bccd7bb7fc17b6e250ce2b276cbf1202fb01a21c6f5d9c848d657f1adddb44f22c35eee9a1
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a0c576bc4804d32a323f74aaa089157
SHA118da221b69a8a9371c2dba08c68b8569163b8357
SHA25669f15ea363424268bc94d2408f0b2b5df53dea6f61d9bded4a628d5ccd75894d
SHA5129f80c5ee458e1d0f49f67af7e051a77ac93a26b6b52a78929f23b9b6155f8a2446b0703bf6891d1b762ceed4fdf99ad616a85f9593943d7429d8f3b900c56cfc
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5487913496e473081cf02cfc3eb47f74e
SHA19d53fa0604aa23bc257593424e1d178bf1b1f296
SHA256873e8f691109999657f03c915048f473fc643d96a2d8836567f42a78b2968a08
SHA51297bc3f832915047dc6e6fc35a0bf975549c853d3aaf23e867dc70f3760a97abd6820bb2191f42f7857ee90e2542878e2f117316c85dcf980db2220adc1a4fe60
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569dcf464710dae73b181b7a934fbc139
SHA129328761464f597938b9222e4fa05fe786d22c61
SHA25631bd295511a95634e7e5132be43b6357548b186e660da6b104399bcefc7d11e3
SHA5127ff5b211f3285607d10d60b2c565a4b9ab2e21459b0f6152169406b10b8caf6b2ce563bc5f60d2de9d8468a00ceb83746aff7a6376005b6805ab0a264105923e
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ecb122009fc2590bee14b18f8573f78
SHA1b9c3c5788e52f7c05987e36ee4674b20715a307e
SHA256d4b754f6d8521ab1704de16f0cb631ad53e694d6479a76bcaf214f3867acd171
SHA512b731434118d22a3590f295954da2372b90e1ae23c42ffa68b3d6429514068424f1b4689d64775761bc3ab359367ffa0d2c7e51b82d17b81a87d044c4406ce455
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54638aa9954110eb911725b0425745c72
SHA1c012acce10d4e00b5bd0f6cb5f1e7a477983467e
SHA2563bc4a5f0980c12f49f0d86f238241f5d0292ccff63a7727fbb44b7e4e6979b1b
SHA512bb223cff0579a7a07f40553f67ee602d3d0a564fc179033e588ef39675fa0c6e2d8d81f7180a17bc3c016afc598c45274388ea71d48cc9ce94f5b34a72588271
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e95963071c60aa091ec4dd933ffc9f4a
SHA1115fbf5f391dfb64ef263d92de30a5f999c37eba
SHA256c4e03a7476d553a8c357a83aaf08db5fd241cc8822027972a8c1dcc3ededa5a6
SHA512c09310609511e152391cfd1c1e52c8345bdfd59361043f9fc29a452da5dc81ed61d300dfeea89b68cbfb0256352d302b8f848c69a6367e3c090b3079185c5009
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c703990f55ed830b2ad863dd860f6e99
SHA17b32e9f4fd74e99bd87e47802fe89ffdf17946c0
SHA2562a100cc05a9bff9a6996a39ec8ba38de72233a689421486f39fe7e3b302ec6a4
SHA512fbb98c957cd86fc06b8a8138c5534913caec29c0a755ad5516c032b3b0a886eee77ebbb49af1dab25357ef97814044b757ccc9f8ddd893101ab975637a1bcf9e
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549fc3b31c3fcd1d3f7942d128492bfff
SHA159a3ec4eb8771e90eaa39afd47c801f63639b05b
SHA256dd83df0be20ccde38c223209d1ed80928397ce25e83a0188199945d3968742fb
SHA512d9f681aa445410396fa4ed35ef3b7d2549dfa6c8796d0655acca212f8180627e366f1c0dd1d4e5340c124484efd27212d02c735de1da13a31b45ad3a740bf4a1
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc0d0efe0a7f175ce75bac2f6999baa1
SHA14131dd0cc50a7c1255eebd99f98d863a16a10a61
SHA2567e099b703b60f348dea357c392b0a3620c773582a5e50de07b866816d8217c90
SHA512d24dab05018653a0f946ea8ac067fe27e3d798e048dbe3f86149a9894b97db5a4d25c539c4d5ca81bb8d97195ae354336239f3108e98342bc23c10954d3ae980
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b7ebd77d511baf9044a144cacbdf838
SHA1c024f5d7d8e59b5e1e3c8265034516a2a84e0ba0
SHA256ff19143cc1ecd330901f76e6593868e31f798e5ce668f69ce982f812f41224ba
SHA5123112698d3ec192dfedd8b6bc8d64d2fe36f666d1b1ff9615906d3fc9529c4f2ca64cf091c9e985765ed21495764665fc0b416276db2ae748f3bd70d07193fc7d
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb5c86f660438667a67b0a372651cc7a
SHA131293c3290948d001a51c44c0178f668981276c8
SHA256b6e73910017a6db65b8f7da2aafc259a1d7067fcb93fea0929eb51826c2818ef
SHA51201e63d1fd1f0a08215673e44b03c83545225bcd5056fd3debfa45ff9261a225bc9165333ef3c20bc5f8617881f11f1cbf6762ee19f1241d3d9619e88831f369e
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7471c47d158e3885a4fa93ed966690a
SHA1a6a9e1b4663421158dac047b0f3d7e245eb687be
SHA256eeae9b251ef87ea853eec5af60de57ca38c4661dc588a43d16a3403b021bcee3
SHA512ec4725eb8f0bd748263605322f67682ec613ffb99ecbdf8bd8d2d20b56075699a6d6ef5cdceb98a1e752f200e30c40aa98286b8d210b698cde0a4ea2cc83641a
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e7acc75454ae55ccf70fae54b90f3fb
SHA1bb0f92eb7318ced9e1a9a61a2fb9884d9d6d1d5c
SHA25683ab0dd4b63388df26a69d10e158a0c9e2e59e7be888a98639393d229ec7ddbd
SHA5123324ce3bc4b23eb5e128f8850b92fff24f867139b67ff0066b9284acdc5880902af98779b1cc46b95828cfc052a82009c41bc5cd120b50d581fb430a8de5474d
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cc0f134748d08a9eb725b63e095a9f4
SHA188a8ec38bc7afb349b137ce7b2acaa4b728824c7
SHA256492a84acf10d3f8746ab1bd4805684820c1b90e53a75f6eeaf552f1f1e54e9e7
SHA512c14070341d90de0b49087d05a943c48cc1737740e67889a6e375740d33de67092f1a3dd67f145af3af34ce67dbbd1ae6ebe3838c5c71b7f1f467e11343a4da24
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512a337d09760e64543b26100423296e6
SHA149a259efb75d2f71fe54e2c01712a9b558aa66eb
SHA2568da32a6610cf6bffc4144dfa48d8e9b271559b510a3fe77eee1d2138c98acdea
SHA512082620e9714837573183fe6654a6434e6a916fe9495d13081d8445927cdced4296efcb3ab4e945b5cf1c4eb592778b0f7df63cd6af1aa140c80ce525cbf9eaab
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD550887ec876a1e93344ed29d852ec7a46
SHA1474d2ad3769188877440112166833b6d535bd9ce
SHA25618a42906a08c92e2c11e294e8549ffab4dd357d2e2bf44abf4c7aadf970957a3
SHA512b69aa38c3df97bf069e4dd88acbe740c292ba8035e47c30ec51b2bd4fb541c7d82c088ef54b8e7d4a5b32e4da5ae5b5a819193f2f062b9fa694f1ecbcab97362
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
129B
MD52578ef0db08f1e1e7578068186a1be0f
SHA187dca2f554fa51a98726f0a7a9ac0120be0c4572
SHA256bdc63d9fd191114227a6e0ac32aaf4de85b91fc602fcb8555c0f3816ac8620b3
SHA512b42be0e6f438362d107f0f3a7e4809753cf3491ab15145f9ffa4def413606243f4dfffc0449687bd1bb01c653e9339e26b97c286382743d14a2f0ed52e72f7ee
-
Filesize
216B
MD52ce792bc1394673282b741a25d6148a2
SHA15835c389ea0f0c1423fa26f98b84a875a11d19b1
SHA256992031e95ad1e0f4305479e8d132c1ff14ed0eb913da33f23c576cd89f14fa48
SHA512cdcc4d9967570018ec7dc3d825ff96b4817fecfbd424d30b74ba9ab6cc16cb035434f680b3d035f7959ceb0cc9e3c56f8dc78b06adb1dd2289930cc9acc87749
-
Filesize
236B
MD511cede0563d1d61930e433cd638d6419
SHA1366b26547292482b871404b33930cefca8810dbd
SHA256e3ab045d746a0821cfb0c34aee9f98ce658caab2c99841464c68d49ab2cd85d9
SHA512d9a4cdd3d3970d1f3812f7b5d21bb9ae1f1347d0ddfe079a1b5ef15ec1367778056b64b865b21dd52692134771655461760db75309c78dc6f372cc4d0ab7c752
-
Filesize
80B
MD53c106f431417240da12fd827323b7724
SHA12345cc77576f666b812b55ea7420b8d2c4d2a0b5
SHA256e469ed17b4b54595b335dc51817a52b81fcf13aad7b7b994626f84ec097c5d57
SHA512c7391b6b9c4e00494910303e8a6c4dca5a5fc0c461047ef95e3be1c8764928af344a29e2e7c92819174894b51ae0e69b5e11a9dc7cb093f984553d34d5e737bb
-
Filesize
402B
MD5881dfac93652edb0a8228029ba92d0f5
SHA15b317253a63fecb167bf07befa05c5ed09c4ccea
SHA256a45e345556901cd98b9bf8700b2a263f1da2b2e53dbdf69b9e6cfab6e0bd3464
SHA512592b24deb837d6b82c692da781b8a69d9fa20bbaa3041d6c651839e72f45ac075a86cb967ea2df08fa0635ae28d6064a900f5d15180b9037bb8ba02f9e8e1810
-
Filesize
29KB
MD5d59a6b36c5a94916241a3ead50222b6f
SHA1e274e9486d318c383bc4b9812844ba56f0cff3c6
SHA256a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53
SHA51217012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
81KB
MD5b13f51572f55a2d31ed9f266d581e9ea
SHA17eef3111b878e159e520f34410ad87adecf0ca92
SHA256725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15
SHA512f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
218B
MD5afdbc547c59b3bfd1a1e047c41c8619f
SHA1355be7f9e3dc890a866b3457d4a2aef121908f43
SHA25663fa8f7d6445e1ee07380b49de1508e4f49721c14f2ff51529243d6f2c44034a
SHA512a467612680f88e651818b8904add3692d41496c87cc5ec82556d175abb0d7fc25c7cf7b4897c41a77000a8877bf681fffacb66ba19c767a93023909399d42c01