Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 00:13
Static task
static1
Behavioral task
behavioral1
Sample
ea3ba60e60f5f03ca2cc19a933a6afbb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea3ba60e60f5f03ca2cc19a933a6afbb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea3ba60e60f5f03ca2cc19a933a6afbb_JaffaCakes118.exe
-
Size
53KB
-
MD5
ea3ba60e60f5f03ca2cc19a933a6afbb
-
SHA1
73a1aff34dd4ca3abcdeb3f20ca455d2b19f8118
-
SHA256
966dfa7b98c286d5fba0cb9f35d1bb1d5db9378303c0303fd8d93babb4d2b473
-
SHA512
8ffaafdafe2fe0c83b463854dba645308df20dd44e178eea9c324de4ac5ca218351ebe51a723b963660fc92b570decdbe21fc0248253dbb2e1174924c986316f
-
SSDEEP
1536:hcZIKbMEHr1CR6XAjXgBJlvxzr6967XVYr7Wr:ivtLa6XIgTlvQAXU7k
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3020 ea3ba60e60f5f03ca2cc19a933a6afbb_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSSMSGS = "rundll32.exe winkor32.rom,JCOKUmOAPBFQ" ea3ba60e60f5f03ca2cc19a933a6afbb_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\winkor32.rom ea3ba60e60f5f03ca2cc19a933a6afbb_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\winkor32.rom ea3ba60e60f5f03ca2cc19a933a6afbb_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2408 3020 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea3ba60e60f5f03ca2cc19a933a6afbb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{015D5B41-761C-11EF-8778-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432866679" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2800 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2800 iexplore.exe 2800 iexplore.exe 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2784 3020 ea3ba60e60f5f03ca2cc19a933a6afbb_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2784 3020 ea3ba60e60f5f03ca2cc19a933a6afbb_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2784 3020 ea3ba60e60f5f03ca2cc19a933a6afbb_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2784 3020 ea3ba60e60f5f03ca2cc19a933a6afbb_JaffaCakes118.exe 30 PID 2784 wrote to memory of 2800 2784 cmd.exe 32 PID 2784 wrote to memory of 2800 2784 cmd.exe 32 PID 2784 wrote to memory of 2800 2784 cmd.exe 32 PID 2784 wrote to memory of 2800 2784 cmd.exe 32 PID 2800 wrote to memory of 2612 2800 iexplore.exe 33 PID 2800 wrote to memory of 2612 2800 iexplore.exe 33 PID 2800 wrote to memory of 2612 2800 iexplore.exe 33 PID 2800 wrote to memory of 2612 2800 iexplore.exe 33 PID 3020 wrote to memory of 2800 3020 ea3ba60e60f5f03ca2cc19a933a6afbb_JaffaCakes118.exe 32 PID 3020 wrote to memory of 2800 3020 ea3ba60e60f5f03ca2cc19a933a6afbb_JaffaCakes118.exe 32 PID 3020 wrote to memory of 2888 3020 ea3ba60e60f5f03ca2cc19a933a6afbb_JaffaCakes118.exe 34 PID 3020 wrote to memory of 2888 3020 ea3ba60e60f5f03ca2cc19a933a6afbb_JaffaCakes118.exe 34 PID 3020 wrote to memory of 2888 3020 ea3ba60e60f5f03ca2cc19a933a6afbb_JaffaCakes118.exe 34 PID 3020 wrote to memory of 2888 3020 ea3ba60e60f5f03ca2cc19a933a6afbb_JaffaCakes118.exe 34 PID 3020 wrote to memory of 2408 3020 ea3ba60e60f5f03ca2cc19a933a6afbb_JaffaCakes118.exe 35 PID 3020 wrote to memory of 2408 3020 ea3ba60e60f5f03ca2cc19a933a6afbb_JaffaCakes118.exe 35 PID 3020 wrote to memory of 2408 3020 ea3ba60e60f5f03ca2cc19a933a6afbb_JaffaCakes118.exe 35 PID 3020 wrote to memory of 2408 3020 ea3ba60e60f5f03ca2cc19a933a6afbb_JaffaCakes118.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea3ba60e60f5f03ca2cc19a933a6afbb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea3ba60e60f5f03ca2cc19a933a6afbb_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2612
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\chrA1E.bat"2⤵
- System Location Discovery: System Language Discovery
PID:2888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 1242⤵
- Program crash
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b73e98d4d50f56ff39c6ab12401f2d3
SHA185d9679cf4d6bcdffd8fa005f086f3b680389960
SHA25637ea5ae54c290510cf500938ec377ba585763bf5b154a185830e98a634bc7e24
SHA512233b56d0cf97672e70e864c07a28fdff6a132faf0ddbc637fbb4598d32a1cc33910fdb2e69c35577de4c09439400b88358c6dbc1a7c797f8bded26542dcacece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f34b86939d6f79309c6beac9271b6a5
SHA102120754b287f89a6cd107b8fb685d1756fea491
SHA256cdaa96884a7869ff2778658a2536ee8f2e959d42e7bc96e6378fa79a4864975e
SHA5126904aa40b97e8ec2256ac284d105cd2614bf600158f8441be1f2d88d3ee7483e6a96f034c59e26f7ded2b9f1977dcbeadcbc3259adbea58652bb0a41e4657363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca1cd9f077c2b872280f69a9fd2deb04
SHA16c1bda720a4e7fec39fecf2e23835945f0e8cee3
SHA256be7a019bba3d94911dbfefb62ef6ee9e3d6156d6b57753d6cef3c9ce68e88995
SHA512d68b88fd632536daacbba1f5e203871d6497a40506b7c40466cf6607fc4e27eb74e423a330d39632cca3435f070b94a67df0253fbf8b656db417aec4fa711af1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5380b22e66120103267131a6e2eec9531
SHA1f2735c1e4e288afecf68cea40146e5e436b9f5d2
SHA2563464a0ad9bbfd85d8e2137ba0325c3d6225d7fc5b087d918530106cc1056c1a5
SHA51224638622467749a88a723a4ffbf78f6b599f95c486f2e71cb78ce2599de81f3b012f46d239a2dcf4f3f35648019713a68d2b9337b18313b8217d73093f4c8567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9af8574e016a65a201c835b381682ed
SHA1c123cb7489a22d9e6c7141bd7f86838243c20897
SHA2561b98a0cde54dfec03604c8950cbd437ba85638222ea798f0e5b61f5e4ecda142
SHA51208238c97671df02f7a088bd35eb7a9de217c9f6c809acbf810228842f41cf37a4e2ac4a444ea226fb54b20179e4f475f36d3d5bbef0f1c088e5f42bb8970d181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa44169b56ce041e646d19385c796e7a
SHA129c5a77ed3f86ece27ffc55e2891ee4b27d3277e
SHA256f792878e591dd3713940ad564c2cccb60aae9a64fe60b8fcb7c50e4451080798
SHA5124b03ef0652ece10b54e854d1221fde0eb588218f6271c1b79d43e6d007a2dd9dbfd7fb62d5d9f2e089067d98bb56b012460116ed898281e22618751dbf3cf540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511e923c0aeeacadf3c9a9b98ac4b7867
SHA14ce9f34cf8d19cbfabdbdc6f8ddb47f3777aa26f
SHA2561496d1a66e144bf50204f944c59ee37fa36bcc8e27fe41f9ffc54cf84859b95a
SHA51291371543c853c00bb11e41bfd93e9eafe31326c093ba16423de8ae2080f1e254f658e04c322c520ead15e869a47830ea77722e3041ab7896587808d844cf8ee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516ac61d47a8ad9cc6719f2731bb7e5d7
SHA126b7e5cd1b4c2f8a0ca3671ca286f55027207870
SHA2564d9c0425769e317720005aaa29c5b5f0992d82ba6f1d9ea1047403ef76f1b832
SHA5123a817251aace8ccd11aa0e4ae254531a6e62ba4eadcbcdf2a34772c52037381992d08f751362e1e88e28584a9798bd01ada673d054058ddf5b1ab07d1acd838e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b33c89c40eb432933b909ee4d2387f5
SHA1cbd172c012e9fefb1c6ec882f3b2db0fe9716564
SHA2560f8b1866b9d22f780abbe7d6d4cefd56a6fb52fae27ebb57c1e3af106956610d
SHA5127a3315994c5fa849cdf952b075e24583629ca025898326bb43bd50378998ea8a3fcccf059b27b9b682c940f240012853dc7f466ded154fe706313b0b99458529
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
185B
MD596d24e2c909329b4512a9eb2779a41e6
SHA14be7608a764a89d6f78a576911314515e0252ace
SHA25603c73f8274827f699ae13dd154a4398e1dd41f3e8b03b9a5d9d9b7b061b72c04
SHA512bee5180e644c40fc97452701f8b9aaa0626a332938cd961d622a76a0ed4c1485563243a83c36d70f2806d9a6d6a4d4a803424ae5dd47fa2e47c9be32f38bc550
-
Filesize
36KB
MD5a62361bd403ce34dda16565646d8254a
SHA1437126ed64ba06a5eac459484bd07ba1214b0584
SHA25679ffb362bcef31256c87c16c6f4b805e45cf27b3ef5d619a4207ccf0d5efc00b
SHA5128c51e3cdda1f475dbf4a72ce220607351f528964cbfaa1a1a994dbf0f45d024ade170129a1a5a2d6a690c787965c9857f7d9e985474a71a9dd1d7f04d55c6455