Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 07:46
Static task
static1
Behavioral task
behavioral1
Sample
ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe
-
Size
98KB
-
MD5
ddfbff326a2ab9980e7727f229781b7d
-
SHA1
5fec191c0f19440840d5b5de192608abc44344ab
-
SHA256
d80bef1f46615840f43eadae64c78177686274850b0754548b226999ebd69064
-
SHA512
bff757ba1771d9f1c87dad125521e384a5dc8d912dc1981fd7ae1fd01c105a01e27d1beb37612e0e16d4d9636f392018b8af4936933e29fc5dd6550329ccfb45
-
SSDEEP
3072:2ne8xI6Gy0XlTutN1nFaWNCJmfZfLfptTFrFrDGHMd:m0XBulnFaPJWLjTFrF+sd
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1120 ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSSMSGS = "rundll32.exe winqwp32.rom,qDrsgPZ" ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\winqwp32.rom ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\winqwp32.rom ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2748 1120 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3F7C2AE1-71A4-11EF-B956-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432375441" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2884 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2884 iexplore.exe 2884 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1120 wrote to memory of 2340 1120 ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe 29 PID 1120 wrote to memory of 2340 1120 ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe 29 PID 1120 wrote to memory of 2340 1120 ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe 29 PID 1120 wrote to memory of 2340 1120 ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe 29 PID 2340 wrote to memory of 2884 2340 cmd.exe 31 PID 2340 wrote to memory of 2884 2340 cmd.exe 31 PID 2340 wrote to memory of 2884 2340 cmd.exe 31 PID 2340 wrote to memory of 2884 2340 cmd.exe 31 PID 2884 wrote to memory of 2704 2884 iexplore.exe 32 PID 2884 wrote to memory of 2704 2884 iexplore.exe 32 PID 2884 wrote to memory of 2704 2884 iexplore.exe 32 PID 2884 wrote to memory of 2704 2884 iexplore.exe 32 PID 1120 wrote to memory of 2884 1120 ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe 31 PID 1120 wrote to memory of 2884 1120 ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe 31 PID 1120 wrote to memory of 2728 1120 ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe 33 PID 1120 wrote to memory of 2728 1120 ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe 33 PID 1120 wrote to memory of 2728 1120 ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe 33 PID 1120 wrote to memory of 2728 1120 ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe 33 PID 1120 wrote to memory of 2748 1120 ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe 34 PID 1120 wrote to memory of 2748 1120 ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe 34 PID 1120 wrote to memory of 2748 1120 ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe 34 PID 1120 wrote to memory of 2748 1120 ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2884 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\gOEF68F.bat"2⤵
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 1082⤵
- Program crash
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bed4af4481723a29ab32476460443a24
SHA1a2bf0eee5dc42dcd5a6aba4e6b6696338ca35e74
SHA2568733818d652e9bbfbc9cdce439cdf916626bfca327b26304e850d8167ea4e4f0
SHA51226c6042dd7a6876f90cecf007cd335f9eaf31d8e6a284f489ddfafbca367120fc5d9ef3c37da52c6476608091a0f2f71387a943b74fb28f1833546dfdfe964b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c166e2de1ae34c696d5fb2596aaf82c
SHA116480ff36bdb7c64fbc9c6863f3d1603f9a6b141
SHA256abfec0a2e06dba867614f430ba60fd0836495ca80933f4cf5e46ad7db2dfd4d8
SHA512a6b831989d2df17cad21408eb06f1b7d6d7f6ca99b4a316920918dbeb22f9b76093d97caf7b7dd23294afa6ab749131e098e3e89dccfe9a0b2927bd7de5b9f70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae27d26f0a767e2c23e806a4a160fee2
SHA102ef8fc5ba9eb93189b5c9137c451d607dc8dfb6
SHA256f1c757bb59c13c3f69e1dcc1663d5e8f32cddc85aebae287a73ea96bd54b49e9
SHA512fe21d090b13be4559ca38fe3e57a7e20edef0cf1defaa6195b5b7ada9c9f67b165a0b5fe67fc03215fc452c9309ceb25a5fa5f591ae3853549499c8d1bf15871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5149576b8a34d63239e4d8fb4efd543c5
SHA1b600cee2b4a70eb5c259e43bd045015be3c8eeb4
SHA256d2edb8811013ce6c52d497e25db42a07a3e8cffcecd8e1c7b34e5f240e254be5
SHA512c3aa90ef8bc42beb7a0bb284524f21ed92892a80cdb3071b2b0121d9bcb0e20e3f5f35d739e78fe788610b5cca6229752ba23357116b8b344b94de7638932c67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e3e83df77ec959986ef7caad6c63ffb
SHA11dd965bf66395f19f8d8af7fcd180f1bb18332f4
SHA2565d837445d681c07da3731e60e475dda9a9f28e306cc3bcb3da6ae5c91e6190c5
SHA5126e17d42f4c5c6a00bbe7417d25add6a27072acae716cd2fb7e0a0513d81911654366cc8b3574496996e0f60461c2c8553bf6d81216c51bb795006a2bfd4388cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588438ae4cae88aad41fe7e393093c299
SHA1d5cb4d5173a2e9fca2e6cb9cb922976e2d8901f8
SHA2564d3d4646d782cd0892efbcbd74022fb995f5ee1dd4bd0b3881de71b31285daaa
SHA512204c5890855b8691bedf213989e48d943c67794af2ae3f3b2ef64d2c33db96145ebb6702cb48c072a676e993e4ff7c7d050380492b39b9c029138e71644d80c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5763fad5ca84f3bfbe07f0f0bfddfa0d0
SHA157361d3296b1b5b74af259ec943614b3543fcf42
SHA256ff67cfb0973ea38e51c3e3d55094354b1b4b6cb6d6a632d780e9795c8919a810
SHA512d6a879ec35c3898e9e696f361545d7efb3bc3efe11f3c43d0cf141e5e4b82df8ea0cab38d678aa6c27185c1594669385eae6216eaa16edaba2b9ae0fc656546d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5831bb443f6930cd61337ab57e8a03f45
SHA1809629deb54a70bbf8803b9070e45033afb91c7b
SHA256d4e1c52f83075a77a44bce91e7b1c34e60bc5b93aa79fb0f227a4130adc99ade
SHA512ba1334f5caed23a7edd97164c0ae3fee427aa1c0dcf49079c038d327d2245ef0bde2c792c1f51d4396f3541ebde8b5ff4de96aa7227b7626c14a3fbbfdd34944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ac518f31280ab8558ba143e5c7fd6a1
SHA15fa8b69f0cc68438757af0eae7ddfec403d22958
SHA256ae1feade56223d6662ce083dde4218e6c21d44e4268256cb873be860093791ac
SHA5124ea1ccea933d42cb3500352cadd78fb81d0d2f5befdb43909935a28571c119a0b4f99039bd122a4d902a4cc22f24bf6ce0b3ae56122e823b68f3f1fc06ad8a0f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
188B
MD54e533016fc7045799f77b192a955e8de
SHA1c4896af9f498a55db7a6b00e5258cc1f34ca0d62
SHA256cbdd94d679e3a2e8b7b16888dee37ebbf9730b5535cf8346960a480e50424d77
SHA5128f1f4242a8793c1870132d62420ad3da01fbaad3f4aa7224e01c7894498e09a63b7fc0db25efcbbd37dd1668a1992976f44318f61800abb93d220b577c87ac77
-
Filesize
80KB
MD5d683a293e2c9835b59739695780052d5
SHA16f582acf697fe48e4aa1cb41b506c9e978b7eecf
SHA256e552b60cb48adb8f5d529b5f778bef741ff1580438fc77e03daf999ec0bb65bf
SHA512d68d6ac62d17a1ff9359c59d010b0a3d5fbe6f6734fd04a732d52b9ace641128027519b2cf693206a7de92af6d6aa2e9d2f3cc462077989f9723c9f99da20ed5