Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 23:32
Static task
static1
Behavioral task
behavioral1
Sample
dd3dc5980d375ee94dbd975749a03a52_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dd3dc5980d375ee94dbd975749a03a52_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dd3dc5980d375ee94dbd975749a03a52_JaffaCakes118.exe
-
Size
97KB
-
MD5
dd3dc5980d375ee94dbd975749a03a52
-
SHA1
cc0a461fa93db27123770de7277437b4ff04b002
-
SHA256
48e5de2484e584669ee217c3eabf88f2598a17e40b3a33cb076586f9e4dc9406
-
SHA512
166bd4a9ddba91658ad99dc18bbd5c596393c4c5c27337e0c0975a00eb8eb91a7b6ed63a3efd2158d34b95408066c2a5c2bfbacff7f6305e9c3bb25e8bf6a454
-
SSDEEP
1536:XRt4sooF0BWSKnwpId9CpWoAPlzTu78/H0VmK/ifTUqwg1Pr:Xj70dWnd8WoAJqYhRwgNr
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1380 dd3dc5980d375ee94dbd975749a03a52_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSSMSGS = "rundll32.exe winlvh32.rom,deeyYhjykxjs" dd3dc5980d375ee94dbd975749a03a52_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\winlvh32.rom dd3dc5980d375ee94dbd975749a03a52_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\winlvh32.rom dd3dc5980d375ee94dbd975749a03a52_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2792 1380 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd3dc5980d375ee94dbd975749a03a52_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3F9E4ED1-715F-11EF-98DB-E29800E22076} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432345807" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1300 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1300 iexplore.exe 1300 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1380 wrote to memory of 2448 1380 dd3dc5980d375ee94dbd975749a03a52_JaffaCakes118.exe 30 PID 1380 wrote to memory of 2448 1380 dd3dc5980d375ee94dbd975749a03a52_JaffaCakes118.exe 30 PID 1380 wrote to memory of 2448 1380 dd3dc5980d375ee94dbd975749a03a52_JaffaCakes118.exe 30 PID 1380 wrote to memory of 2448 1380 dd3dc5980d375ee94dbd975749a03a52_JaffaCakes118.exe 30 PID 2448 wrote to memory of 1300 2448 cmd.exe 32 PID 2448 wrote to memory of 1300 2448 cmd.exe 32 PID 2448 wrote to memory of 1300 2448 cmd.exe 32 PID 2448 wrote to memory of 1300 2448 cmd.exe 32 PID 1300 wrote to memory of 2744 1300 iexplore.exe 33 PID 1300 wrote to memory of 2744 1300 iexplore.exe 33 PID 1300 wrote to memory of 2744 1300 iexplore.exe 33 PID 1300 wrote to memory of 2744 1300 iexplore.exe 33 PID 1380 wrote to memory of 1300 1380 dd3dc5980d375ee94dbd975749a03a52_JaffaCakes118.exe 32 PID 1380 wrote to memory of 1300 1380 dd3dc5980d375ee94dbd975749a03a52_JaffaCakes118.exe 32 PID 1380 wrote to memory of 2716 1380 dd3dc5980d375ee94dbd975749a03a52_JaffaCakes118.exe 34 PID 1380 wrote to memory of 2716 1380 dd3dc5980d375ee94dbd975749a03a52_JaffaCakes118.exe 34 PID 1380 wrote to memory of 2716 1380 dd3dc5980d375ee94dbd975749a03a52_JaffaCakes118.exe 34 PID 1380 wrote to memory of 2716 1380 dd3dc5980d375ee94dbd975749a03a52_JaffaCakes118.exe 34 PID 1380 wrote to memory of 2792 1380 dd3dc5980d375ee94dbd975749a03a52_JaffaCakes118.exe 35 PID 1380 wrote to memory of 2792 1380 dd3dc5980d375ee94dbd975749a03a52_JaffaCakes118.exe 35 PID 1380 wrote to memory of 2792 1380 dd3dc5980d375ee94dbd975749a03a52_JaffaCakes118.exe 35 PID 1380 wrote to memory of 2792 1380 dd3dc5980d375ee94dbd975749a03a52_JaffaCakes118.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd3dc5980d375ee94dbd975749a03a52_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dd3dc5980d375ee94dbd975749a03a52_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1300 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cWbB145.bat"2⤵
- System Location Discovery: System Language Discovery
PID:2716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1380 -s 1082⤵
- Program crash
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5a9db5c8739fee738f9811dc7b59ead
SHA16805719b7be3fd596b9e50096aa9648540534415
SHA25610ef003bfbf28f6de36abf62cec3f404b3596c3a11da028992faff15e657b4ab
SHA5127d92cc7b70c0b9dab24507b49c55f8bcb2e916e8e33ffba2318005e2d543e018f5fe102d3e2ea98e4634c0247289dbb29b80ded9169621455d7b46648a92d4b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4b1c479ede45c1751cdc122749cab96
SHA184421b8ad6f725550df22b354cbc1f993a3eceda
SHA256bb1ed53c4773da1e48cf66a04eb5f181def9c8ec1aaf6203a4f7bac7ef511832
SHA51290c2f1b3832c0ab02fb95bd574d6367d8bb11920d2b4f29eb8c1e822edb78ae82d0552fa2c11d72e8d2790b802f9d1ce69c825a9dedc940b9e83bb385870d7e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586b8e6fd6eb915988dc5d53bc0b3074b
SHA172095a243f332d3ed86a407b333b79cb022e9d30
SHA25641b023117b2aabf458e819d559b811901b02e6be583310d9e33ab89c60e13c02
SHA512d552057867104ebdbe5b0d440680f11c6536cbba73ad8d3a4d1a0fa7d72a7a4a4aadd0900912b4f1aed12a9ca5adc72ca4ce60ba6fad9189592e4f260637ae97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbb7db31fb27cb00adf06e98917066f4
SHA1e6bc4b10974396b1a4202682d8fb5f62069238fb
SHA2566069b50d98771f3724dfd96d91887ddfb7ec427991548aa9cd47614f9dcf5f67
SHA512db7d7cff61fc09c33a4e1a8544565d4ff2086604d2589ee25fcbcd6891a2eb94efbf0c7fb2d3100fa46b998786049d004fb7fd9edcb259425ce200f0874744a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a51cef8cf2f73143abebc5a3e94da2c4
SHA1319ce6165671fa722472bd5d9934318596e13a59
SHA25658af46641aeb01a57f9f263a96908f6b533d9c91e7e8462bf3ee1c18ebee1074
SHA512a7b9b92bb2f37a5abf66d32fe16d28eb6256937ab5b036a276d2695d5ff8cd8d85693a1b7d9c7e81170fd628433dff691d054870d9ebee779720c8830e59d105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53efb404d3b2c90abb5421e80a6bff999
SHA1386b522c9e04cf9948fb7210c0bdfd1a4707ab41
SHA2567867cd00a358b46fbfcba9f4b7a5855cff033607f778c4955f5d689ebdb0f395
SHA512ea52ad807c117a087149cbd226c5ef0c00f45b6d4bc3f15b85a35a275ce72919e3e56ce88078fa6bac625fb313b5adc28a694a21da388eb7c699b4c5d78a141d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6b408d98450bd0779a18fbe56474265
SHA14c5debcf6c4f76f17b85b253b44b95f9b6bd25ff
SHA256a3074f597f1896c28e4791034640e684005ba3b5aa9828181689627cd40f3581
SHA512a5a6f3631ea08c95bc04eb63f4f9f6c3d9460ee2776a9facf24ef5e026c572e214052c62c1f951f3788a6a703c5eb4d5f7498156433a6b5480802a84b392916e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b474baec21dffa97ac6ccbbfe2adf949
SHA147a742191ff34336fbfce62705802fe156240c24
SHA256b49d62f2f7de336c4c7419cf8d4823a49c7122d1c091dbd758eb115a3aee0049
SHA5122abd1d04155797fc8cddbf7aac652957dd193318a152cc32c08fb1a9bd484f108b92a1d8fb9a1c4281ad5f255d6569a4b27b06ed5fe078092a23dbaada5b6653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd3fef2e6bd513a27e1d8b826ae89966
SHA1af7f724ca9d204a1d17e9d4928d5abf014a1e5f9
SHA25600dba6f2d3c3a332148e4986688f8c6c666cceddaeb1b5abf12c4b1cddfd4b40
SHA5122ca2dcfeaa750a5bd303f2cda7c9ef4b3606ab2f8a68d55148435a4f61c0f7f58112fcb111f6a73b9044355d6c9f1813d03d9f8ccd9e579a27817b271b113ed1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
188B
MD53db3241dd7388d7a7a03f9c71cdc1218
SHA1c08cc7da3decce95b8e2b430695371746e2b45e8
SHA2561d884dbb53c2efffb959836a35da604bc07c83580057fd1e9cb1406393ed6e76
SHA512416621c8736995ce448debbaed2e581dff230499f4c0d3164473b5a611bc4c2e5bffef1b90114c64eb350ccd73d915c4c6e07c6f9782b1e697f11cbcf78cc880
-
Filesize
80KB
MD5f11f3c562300f83fa210df122158d3c0
SHA1621ec380cdfe767139313d64de1a8dd8495280c5
SHA2563db28ea6d8733767974bba8f86e733dc965979a94de1e20754b020cfb077ff10
SHA5124147b6890fb218f8206fb14c141981f2005913a4c914face01ecab8c6cf7ba31daeb6811a835a47d71575637e5fc4f9052ca1ebc9167a7ae643a8668db8cad3b