Analysis
-
max time kernel
94s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:37
Static task
static1
Behavioral task
behavioral1
Sample
ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe
-
Size
144KB
-
MD5
ea9924aed16afdb27aac285cc44d1ad5
-
SHA1
9b6cab66782375117813c13c06cb97b72b9e876e
-
SHA256
8a19a3437ec0cb72050391cf8878d441bc2720702b206922f305d6d7cb223a05
-
SHA512
edf8f9d0bc8df1f06c7674f4844992b099536d51825c0f176a70f8f8278e9511aa14e29e29e26d268879b77d93e30666176e7475a07b285bc2b63f4a1640e5b7
-
SSDEEP
1536:RVlu4cogaDGwYSjZRGseTkqOSk6xP63qcWYELN+t7u8LplsO4:j+ogUGwYSjPGseTjO+6abYELN+t68nI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 5088 wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{E23E3E34-7640-11EF-84CD-762C928CCA03} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31132237" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009f792707ad2f014a935b50bc1110c16d00000000020000000000106600000001000020000000bd2ce14d7c8c3ce253bd5ca073cf7a1f0eb16509a089f8f4b04eb45a6e26165b000000000e8000000002000020000000592459491211c60a8442ec1680370eaf1bae32cec7ca6c19e280af69b97d010620000000be3f8615ef933a4fe6d617efe9b3dc71d4373fca8e32da75ff67d05c41f3d2a8400000002bdaeccdc29d5ded4ef33b680d80ab62bec3ac1810a29ad49f21c1a857bc59792df5f0ce6296e720786477b713183c983add12c1d3dbe7af69a4b6c79f313258 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3065543001" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3065856072" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20f31eb74d0adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 101f26b74d0adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3065543001" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31132237" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31132237" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3065856072" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433485626" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31132237" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009f792707ad2f014a935b50bc1110c16d0000000002000000000010660000000100002000000008e9d988074b1d7e65cb70d2b250507c278b05d501d8531a643a1f5071655daa000000000e80000000020000200000006f8bef68358a6048efaec7f7312010dde1b9a1ec9eeba9f8e39d8e102e08aff6200000005877cce8ba97efd98c7021cc4d7cf9e04352d2b4b92d7dbbd077ddd82653cd5640000000b464d8cd385dd5381e7ccf83349ee187ff9246d4d227ff3b72df3c050ddb9fd6916c88dbb945b12da09752fc8f5c52c0d9b78be97e6b7037c512e8a50fa119ce iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder\ ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\ = "????(&O)" ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\????(&O) ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\IntroText = "Internet Explorer" ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849} ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE" ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\????(&O) ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\????(&O)\Command ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\firefoxxFile\ScriptEngine\ = "JScript.Encode" ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\firefoxxFile\shell\ = "open" ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\firefoxxFile\DefaultIcon\ = "C:\\Program Files\\Mozilla Firefox\\firefox.exe" ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\ = "????(&O)" ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ = "Internet Explorer" ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\????(&O)\ = "????(&O)" ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.firefoxx ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\firefoxxFile\ = "????" ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\firefoxxFile\DefaultIcon ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\firefoxxFile\shell\open\CLSID = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\DefaultIcon ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\????(&O)\ = "????(&O)" ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder\ ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\LocalizedString = "Internet Explorer" ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.firefoxx\ = "firefoxxFile" ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\{e17d4fc0-5564-11d1-83f2-00a0c90dc849} ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\firefoxxFile\CLSID ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ = "Internet Explorer" ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849} ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\DefaultIcon ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\????(&O)\Command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\" http://www.5136688.com/?wg999" ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\firefoxxFile\shell\open\command\ = "%SystemRoot%\\SysWow64\\WScript.exe \"%1\" %*" ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\????(&O)\Command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\" http://www.5136688.com/?wg999" ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE" ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\????(&O)\Command ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\firefoxxFile\NeverShowExt ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\firefoxxFile\shell ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\firefoxxFile\shell\open\command ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder\Attributes = "1" ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\firefoxxFile ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\firefoxxFile\ScriptEngine ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\firefoxxFile\CLSID\ = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\firefoxxFile\shell\open ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder\Attributes = "1" ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe -
Runs .reg file with regedit 2 IoCs
pid Process 2264 regedit.exe 3448 regedit.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4520 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4912 ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe 4520 iexplore.exe 4520 iexplore.exe 3824 IEXPLORE.EXE 3824 IEXPLORE.EXE 3824 IEXPLORE.EXE 3824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4912 wrote to memory of 4876 4912 ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe 82 PID 4912 wrote to memory of 4876 4912 ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe 82 PID 4912 wrote to memory of 4876 4912 ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe 82 PID 4876 wrote to memory of 2264 4876 cmd.exe 84 PID 4876 wrote to memory of 2264 4876 cmd.exe 84 PID 4876 wrote to memory of 2264 4876 cmd.exe 84 PID 4912 wrote to memory of 4520 4912 ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe 85 PID 4912 wrote to memory of 4520 4912 ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe 85 PID 4912 wrote to memory of 3500 4912 ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe 86 PID 4912 wrote to memory of 3500 4912 ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe 86 PID 4912 wrote to memory of 3500 4912 ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe 86 PID 3500 wrote to memory of 3448 3500 cmd.exe 88 PID 3500 wrote to memory of 3448 3500 cmd.exe 88 PID 3500 wrote to memory of 3448 3500 cmd.exe 88 PID 4520 wrote to memory of 3824 4520 iexplore.exe 89 PID 4520 wrote to memory of 3824 4520 iexplore.exe 89 PID 4520 wrote to memory of 3824 4520 iexplore.exe 89 PID 4912 wrote to memory of 5088 4912 ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe 91 PID 4912 wrote to memory of 5088 4912 ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe 91 PID 4912 wrote to memory of 5088 4912 ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea9924aed16afdb27aac285cc44d1ad5_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\cmd.execmd.exe /c regedit /s c:\reg.reg2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\regedit.exeregedit /s c:\reg.reg3⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2264
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.5136688.com/?t2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4520 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3824
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regedit /s c:\reg2.reg2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\regedit.exeregedit /s c:\reg2.reg3⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3448
-
-
-
\??\c:\windows\SysWOW64\wscript.exec:\windows\system32\wscript.exe C:\Users\Admin\AppData\Local\Temp\Killme.vbs2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:5088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD533bac9325241193616461afd5a0deb0c
SHA1e78ed72996568bc9616f4d6b20403749252b4859
SHA256cb0b78d15b774b91ab6f6ef315a14f301b85b40122a72622818753212538f5b7
SHA5123054cbd1551e36a747fc4c7086d3cc484530ea13d44279b4f5f92d462d91d7e3322bb240edeedd517751c00949a6264b50322464e446290726fde18ac4eb2e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5f07ec6762144a544710b0af33ab93448
SHA182d53891e8184a335ac80fc3bf376c26f6880adb
SHA25639005d4e20847aed96e96e5c8d1da23ffd3b1aa23f510b85a081889ac540025c
SHA5121424ac62502a1f540d8eef5d8e188c2f86fa2947a58e08ca1118e7374489529185435e31edd5b826c14bf9e56b9eac3454792e058c3fd1f5f9c218e9550c606a
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
289B
MD59334344f85a5b5b5da26caebbc05f680
SHA1167d0d8d7e7c2a6950224d5f63de4193cdb9fc98
SHA256727fcaccf02a12575304f73e6feef2db58e2de0683f5deca98149fcc709b70a4
SHA512550da1ed9b55c25f87be3ba1d930b61a877bf2836bc07c22f30fd6630de5ee06a0e35e6810e82c7c11360329845f26af5add452d1475c101ace305e0569e0dd7
-
Filesize
195B
MD5d074af1950aed38a9507428f23df9ad2
SHA10313b03e880b283cfacf64aea25c54259d388201
SHA2565f3cd51950de3b9c7f8bb8a14cf5c39f3d480270d89a7c8fabb54900c9c34ca8
SHA512484029eb461a182a9b088f9912047d455749381eab696d15af719f020f4982b6a331b20f1ab5437a8f9312724770ac26791f83d20c79e0e1b1340e53d1122fbc
-
Filesize
450B
MD52944837920fafc0892eb196e7d774b23
SHA131269a61616a0064576e0e6a93e23722cf5a2057
SHA2561c2c0c933e0023e7a24cdd4dd5bf363b00449094d3dc9ff3e7188d893e2580dc
SHA512027b5677254eb8582a672cee88cd5c82dce09170fdc2fd47e9dfaacbd29b691719a5c7ecacbae1fb8c3a5d4a5243e9d3aad64be63e9c788e01f6dfd24f0e003f