Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
de4435461b3fbd589fe7b27952dce2e1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de4435461b3fbd589fe7b27952dce2e1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
de4435461b3fbd589fe7b27952dce2e1_JaffaCakes118.exe
-
Size
699KB
-
MD5
de4435461b3fbd589fe7b27952dce2e1
-
SHA1
0d8eec668188bf0ae06e0d09a08616aca8786f3b
-
SHA256
fe57792f8046ec05e1f0043e6d382a517e851a786d548b7a575535a69e2a6e16
-
SHA512
8cd4a3f470a4bb82a660ce88d5ecdeba82080f5603b3e567d18c08d6bcb7ee17aee837fe3d6e1ecb9d302c07823fb6f8bfe4cf6f71fb435956ef8e15fe05aff7
-
SSDEEP
12288:61+UP9zYXhSERUyzQxG0qijd5w7/kJJ0ghNNmXp7r2KkMbLT1h8S9yfnM:uxdYuyGLnw7cFNAcObLT1h8S9QnM
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1448 set thread context of 2188 1448 de4435461b3fbd589fe7b27952dce2e1_JaffaCakes118.exe 30 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\F_Server.exe de4435461b3fbd589fe7b27952dce2e1_JaffaCakes118.exe File opened for modification C:\Windows\F_Server.exe de4435461b3fbd589fe7b27952dce2e1_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de4435461b3fbd589fe7b27952dce2e1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432389888" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E3AF6F21-71C5-11EF-8778-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2188 1448 de4435461b3fbd589fe7b27952dce2e1_JaffaCakes118.exe 30 PID 1448 wrote to memory of 2188 1448 de4435461b3fbd589fe7b27952dce2e1_JaffaCakes118.exe 30 PID 1448 wrote to memory of 2188 1448 de4435461b3fbd589fe7b27952dce2e1_JaffaCakes118.exe 30 PID 1448 wrote to memory of 2188 1448 de4435461b3fbd589fe7b27952dce2e1_JaffaCakes118.exe 30 PID 1448 wrote to memory of 2188 1448 de4435461b3fbd589fe7b27952dce2e1_JaffaCakes118.exe 30 PID 2188 wrote to memory of 2688 2188 iexplore.exe 31 PID 2188 wrote to memory of 2688 2188 iexplore.exe 31 PID 2188 wrote to memory of 2688 2188 iexplore.exe 31 PID 2188 wrote to memory of 2688 2188 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\de4435461b3fbd589fe7b27952dce2e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\de4435461b3fbd589fe7b27952dce2e1_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" ¨Á2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d9b22b783ca5477a6ab91507a86444c
SHA15a16237c2bd9f54a6f139e7f6ad6b329ac3875a7
SHA25627ddafa1771154e0b41d09775f8052e04ce6a53114078d7b39f88b217eaf5b2a
SHA51283baba5ba339e9174441af1b9b6477fe66ca007036de566284b2e688e409299acf92950d050570a3208d199532050a67ac5f4c745c8949e48cefde4c1421504e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5449d9d4966dfbaa72b767198c83a5969
SHA1ed7815c8625babfbbf2e776a7bae5dde94a485c1
SHA25633b6b942d525b1d31ce214abcfd1dbd766e68ec5a5b81d663e36c62ed8169442
SHA5120ed3b01c998b7468d1ffb24565e0a0bbd58c0d64d3aa68c2d6721b0c4680158286fef032aab9475549d1e2249bb71313249cbf6ace6d5559aa1e1484b9c774d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae71969c98000c36e79bab1708bd5da3
SHA138446c109e00dd1d0cf6c108b2c4f082cf5e7c06
SHA256e1f77590b48ced5ffc953ca285dbcb1a11856da17d01143aac0a343eb8c07cff
SHA512a29d4cb71db3e82aae50a52803b3ab547759971014d37128c4d13aedb8a8a86d7acfd3d8433e95448b760aa9566dff091a0ce95ff112f4ee219a89fe24b6d627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5915920944b31af3872e46d6af460ce47
SHA1431a943b70ce686b4cf5e26078c06ea2ed71fe5d
SHA2569c1906b18073078795e14a052c65fe87001f91651bab318a29d6ee7f83838447
SHA512ce7ca2d5a1b92a848a5beed401adf897365a181a0432739cf1823f16216e0dd4f02cd091dd36000e1254cf36233e00684d56c32392cf96ac9c4b490a7bc1c649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5981109f20b95fca8ea3451c2ef0a0f64
SHA188f61fec39cdc9dc445e91b92c8bd766a911cc8f
SHA256247b4cc775946ce4f4903141b4323ccedf1092e7181eccd18030ed378e2010eb
SHA51233bd299f8571aa7eb0afb9ba2b731b562733be5d61f27c508229ffc11168fa315d6412b55cf86a1324e3b95fa0ff9c418ebab9f631808ede90fdb3f33bbd1d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f059a97d1b52450e50fa01a433bb730
SHA134dbb095b52745ed29076867dbc2bee9c2ed7c95
SHA25621cda8d08562f74a3fd36470089ebf02a66d3739691f4be918bb52e8151bfcdc
SHA5126d17c21041d82c7a78613965be423868dec352481ce48c1c43572f584467db2278df36b1251b07c9d56994714a4aa1eedd7cd9ca80c2e15dbbdc6b2e25b9def3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58114e8b62febec7adee8dbc9438055dc
SHA1fcfef75b7843ac54c24924af7c5b12c75c576bfd
SHA2566d3af46001381d5419ce7a7a2ec4c251c2e78c8a35ec6ececcf3e4a683b6ae96
SHA512888f53748cf9c5aac11bb15495afb99e2b09f91403439b863ac66a9d2b2020b8d2c8030344d223380adaa43c7acedc20b82e8d72a328c356eaa9f9f48b959416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6ed3a546dca61d6e9638e0175c1fb4b
SHA1d9a0a6577e21763debf27bc0d6a974cd073f2846
SHA256db947a82d42c15a705add8d1ef638170c7975fb48ebd7b3985c10268b5307b7f
SHA51276b5b881b1d808e0611f21e4e4372a886f062f63c0591858d747b520923573dc0dbc8eab69a31f28c5f04a6b48524806e5c4fc067abeef0f2534684d72866b0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525e61acd29a155d58101f1dc117e5dcd
SHA15f0e79fc33fa5b9d493d92f494bf7cd7d8bf4ff1
SHA256dfcf37bc7bcde0531f242c5766e41355789172b89b06104e988253d1c6b88aab
SHA512f671f1c668f735659d628f72b36b60baf10565e0c2581e1e003132b58d15c0e08a896c95dda95e24d65a1617b82f2734f79d951000780d2ead939664f2822943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a80f7f575c04f18f81319f1536344efd
SHA140428a3d431413c2a7ae2b09f4258420880a72a6
SHA2561557242c3405a3e3a93f96a0987f72f15f26a5af54201e24b513c06f19b6be88
SHA512862eecfa654aa8889e116b7fd818e8edaaaf55fe611bd229f8705dc9791801cc37dc8136c5bf945e87d952a8f7c68d09d464c5f676a600a40dc45fc6cef4835b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533479a0ff88fa64720e17beea93e76ac
SHA1ae4eeb4d51dba8891b442c4780b3fc723c6e242a
SHA256cd273be9d1f6e6a0e6fa1d66eae4740f281df041a06a9a56cc07d95f727e2dfb
SHA51277e2a805fade19b1113d8791eee53bb07536da628a5813982a6bc7b0808f50709a9999ed74abc7cd3392b442350b086c3abb5181d48d5bbaaebb36bbb59fa34d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526f6bd08bddcf14d4a77a977148cc3ca
SHA106940456237dd86b74383825182ce6ae024f9161
SHA256c91b727adcbaa10effdb55d4aa55a449aad1712bc5de844c48b7c4c3148f4da2
SHA5125d82da116db72fc5ae3dc928ce136862d1ca8e319fc150a2437d9a00a834d08b81c603df0a5575be7355c5e416294f9e6a8cbfafeab4a15cc5c7dda61e2313be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514089f35cdee487157718fe26fe848ae
SHA134ae636bfa9bd13da1a8aa366e8e4c2bf23a8933
SHA2560f0e96a9e30e370890d5ce8a196646f41077343931b952e437647aaba0977c40
SHA512afe054e716d3b5156db99ad98996ea72a4fa5282951317092624106e73fa2cec0464862694bc7898c096c82e36083d25d94cea48cb938ee194958fc63424750d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52844c6486cd43097ba88b1061128cd8b
SHA13202708579d955367ee9dea5c84d3cef0cd3b336
SHA2561f20a87772293fa010088db6da6a7341ed1c521156c6b8b47720f28286d2465b
SHA512bd562ad21a067bf1e95928ace3816a7e6f59021618d843ea66d1dbbe29e88e3b14cf4bbd62536aa51356ced174bb1a2130a7b75521b0e636caedbff1d52dd330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef567c3d763fb8e52b681897ef71fead
SHA1d0a61d914d9e57bf292fdbf8c2e3d22751586296
SHA256694d807762b2760c2523c795c16f96d95ea8d2999de42b2f1a1cab8b6de731de
SHA5122c9fb816ddf935936ca89672637eaeeccf5b8d19fffd1f314c1467720bed994bd7bd848ee61cf32a43f49df4937502da792f5a24bafc75445cd341a2659a620b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f26d97aac3a0f1cc883a379313ed72af
SHA101c3ced32c53c87f30f44205ff8d7ef31142f93c
SHA256c495d91b7bf6ecf06ea57788c62eb56368458c18cb81dc59d9c9a46ad235b57f
SHA512c94910a00e13446b21b12dc3659f8a070962d78210a378baf8db712ada99bd0f8da30f467c50f9762c766e9651f96aa441a10b3ab4f5d38f969c2524546769cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaa855ec692e30f23db5b7d1c349b56e
SHA1769d2b68883e40dc8377d65dc911ef9df8a08617
SHA2560eb475199c9929b183367ba9d93462a90af804e4e354934e96c2ffc716121e87
SHA5129f9c5e710710c3ea9415533a64af31d1b0d3c699159ef0c44e55dbb38766b7b64c005b4aff47cb0e83dfb87fcdaf171507aac2a1472186ed7570cd68e2869860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598360697f3556dc99102c83bf8dba2f8
SHA168357ba4b3cebc45562469200c0d594a6f65bc73
SHA2563091b79e409e006f651fa4c0abdff8e159b1bea8f80a25cc633e514da80fb99a
SHA512a06f944a08cd5f905b9ea7cfd4625d01d43b8ce019edabf9ac172a1254592572e69d1c839e03bdfb7f8ec1d1a4a2679046894909a9d8e0f149a164b03b03e46d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecb1bb2e982d2db42f4772ff2b5bcfcc
SHA1a0e88a7a79c36be79501b9ef39b2ad0ef3a5295f
SHA2560fbec51dba6e22d059fae179ba102f0b0d7a4116ac5f31fca4f6daab35c3a288
SHA5124fae26c339a358a5b863ffc4227be5b12fabd51de8c830d146e4bf7c472fad86ac16fbacc6c8ef97f087747a4560ebe242f3d72ced75c44b52213925cc04e918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a0f874fe1accd017296786c49ca738c
SHA155ffde789536da186c75de42e6a183c527128917
SHA2565d2de94bb295de6adf2ad8b0a93bec5dd17c32e69cff8ee72646bb3430471db0
SHA512c78d1102813174b333ecab05f612c234530d87ef4170dadd251ef8a78d70919b08b0bfd26ac974d0a8c872bd8d32d502326100bdddaaaa2d86e913659559299c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582cbd30b23dce55825d28c8b9e07ec32
SHA1cdaaf83350d96100108b47425293a5306af6b88b
SHA2561aed4b4b86224caf8f3c41e9654fc8ed6c4ddab09becc34cf2bcf5c447b0be65
SHA5126d02a0528b945e3cb29ff43097cc27838dac91959fed4d817e1d6500efc9e542cb034be9f78959b9e5091b8a93ebfd7ba858ff294fbf7f0a027dc019714a9863
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b