Analysis
-
max time kernel
93s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:09
Static task
static1
Behavioral task
behavioral1
Sample
eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe
-
Size
615KB
-
MD5
eaa4e3b52b9b0276041c71129a3945c5
-
SHA1
d795782c66d8ab6c3fb64dc13cef644c97fb052f
-
SHA256
60a71b5151faf2646b9f4805e9b77ae69be8ae5f7267f076d2dce0e1e2e769b0
-
SHA512
ee1c24efcad441f63512abd7cc54e47228a8fc14c86cb187451081f7d996433e1fb578e3bd48a0941a2827bebd85fca1a91241d4bc8193e415070cd3093814be
-
SSDEEP
6144:aDdSjkAZ3bLuE8LsC7zhBiw6H5RyWufqoN7hsyyL8N6YAI6CI6fUzoyKcSs0uGot:EGZrLr8oCOt4VF14s31LAMs+cjtO+
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1144-0-0x0000000000400000-0x00000000004AB000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1144 set thread context of 4836 1144 eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1596 4836 WerFault.exe 82 776 4836 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31132242" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "547704926" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31132242" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31132242" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31132242" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{4C349DFA-7645-11EF-8D5B-F60A6DD2E828} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31132242" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "549110965" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433487522" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 705a7617520adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "549110965" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "646767589" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "547704926" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000262c84e5c2a8b24db398d3ff1cc735700000000002000000000010660000000100002000000097ce7c1430edbd6d545e16ef133b3a90ca8ce14da279451919ef1f28b691c55c000000000e800000000200002000000041cac03b7e5720bc8f695c2ca44666f76408a99258bdc56052ba1798add0466620000000a3029fba7b17693db9f8d548d99f4ccd0868e7b07fef2d8267c9f309d57f1e20400000005b83e481b38db444f898d5713b26b94c70d7ce451657ebde594044ca1c2035376d24c863d162e0cded7d86b395b7800f8853065a1a3b22cf5cf8927e03740b85 iexplore.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1144 eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe 1144 eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe 1144 eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe 4980 iexplore.exe 4980 iexplore.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1144 eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe 1144 eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe 1144 eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4980 iexplore.exe 4980 iexplore.exe 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 4980 iexplore.exe 4980 iexplore.exe 4796 IEXPLORE.EXE 4796 IEXPLORE.EXE 4796 IEXPLORE.EXE 4796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1144 wrote to memory of 4836 1144 eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe 82 PID 1144 wrote to memory of 4836 1144 eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe 82 PID 1144 wrote to memory of 4836 1144 eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe 82 PID 1144 wrote to memory of 4836 1144 eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe 82 PID 1144 wrote to memory of 4836 1144 eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe 82 PID 1144 wrote to memory of 4836 1144 eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe 82 PID 1144 wrote to memory of 4836 1144 eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe 82 PID 1144 wrote to memory of 4836 1144 eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe 82 PID 4836 wrote to memory of 4980 4836 eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe 83 PID 4836 wrote to memory of 4980 4836 eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe 83 PID 4980 wrote to memory of 2932 4980 iexplore.exe 84 PID 4980 wrote to memory of 2932 4980 iexplore.exe 84 PID 4980 wrote to memory of 2932 4980 iexplore.exe 84 PID 4836 wrote to memory of 2168 4836 eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe 90 PID 4836 wrote to memory of 2168 4836 eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe 90 PID 4980 wrote to memory of 4796 4980 iexplore.exe 92 PID 4980 wrote to memory of 4796 4980 iexplore.exe 92 PID 4980 wrote to memory of 4796 4980 iexplore.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaa4e3b52b9b0276041c71129a3945c5_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.pppp123456.cn:9999/welcome.php?k=t%2FK9qMCtzqrG67buxuvF1Mbrt%2FK38sbrwK3awLfyxdTA1sCtwK3Iy7fyv%2BzArbbuxuu27sbrv%2BzG67fyxuvH672owNa9qMCtvajA1r2owK29qMCtxuvL48bry%2BPG68vjxuvG68bry%2BPG68Ctvai9qMbrwNa9qMCtxuvArcbry%2BO9qL%2FsxuvArb2ovai9qL2oxuvA1r2osKLG68frxuvA1sbrx%2BvA1sCtwK3G67fyxuvG67buwK3H67fyvai38r2ot%2FLL48bryMvA1rfFwNa3xcCtt%2FLArbfFwNbOqsCttu7ArcXUwK3G67fywNbArbfFt%2FLG68Ctt8XArcCtt%2FK9qMDWzqrArcbrwK23xcCttu7A1rfFwK3Arbfyt%2FLArcirwK3F1MCtzqrArdrAwNa3xbfyy%2BPA1rfFxuu3xb2oyKvArcXUwK3OqsCt2sC9qMXUwK29qMbrtu7G68DWxuuwosbrsKLG67%2Fsxuu9qMbrv%2BzA1sCtt%2FLG68CtvajG67but%2FK38rfysKLA1sCtt%2FLArcCtsKK38sDWxuu27rCit8XArcXUwK2wosbrxdTA1sCtwK3F1Lfyy%2BPG67buxuvL48DWwK238sbrwK23xcCtwK238r2oxuu27g%3D%3D3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4980 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2932
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4980 CREDAT:17414 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4796
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.go2000.cn/?gl3⤵
- Modifies Internet Explorer settings
PID:2168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 4443⤵
- Program crash
PID:1596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 4483⤵
- Program crash
PID:776
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4836 -ip 48361⤵PID:2336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4836 -ip 48361⤵PID:1688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD533bac9325241193616461afd5a0deb0c
SHA1e78ed72996568bc9616f4d6b20403749252b4859
SHA256cb0b78d15b774b91ab6f6ef315a14f301b85b40122a72622818753212538f5b7
SHA5123054cbd1551e36a747fc4c7086d3cc484530ea13d44279b4f5f92d462d91d7e3322bb240edeedd517751c00949a6264b50322464e446290726fde18ac4eb2e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD52dd1b8335d7e0e3ab4725347fe4a3c1b
SHA10d9f9143212f17db6cda28ac31250d75c4f974c5
SHA2567fde8f33d7f0022f5bcbf0340be014722e3a670f6f46d8698629d6977e6868fa
SHA51283ff7fae08eb4672dddd72fd7a9af87725a096336c2c23116e1f61eda502163be262e651d8b89df37260a187a3f4d3e62dc2bb40e2c3a8a789e69bc0ef802ffc
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee