Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 20:10
Static task
static1
Behavioral task
behavioral1
Sample
f085f337dffd82aac309f93fb69ffc2a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f085f337dffd82aac309f93fb69ffc2a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f085f337dffd82aac309f93fb69ffc2a_JaffaCakes118.exe
-
Size
103KB
-
MD5
f085f337dffd82aac309f93fb69ffc2a
-
SHA1
e96d1ef84c3560a0ca6cfc320300af11fbf89c91
-
SHA256
dc5e3ccec9014264bff3bdb337c99eb9374d5218e47d9ec5274b5d1d4a642cd1
-
SHA512
f320f3aa7eff578072204b471bb20812f2824d891aad3d8ecdf5c565ef48a9df3282cf8a4d0babebb607930a4dcb7c35ce25a7934d92773cfe7343b1f92533bd
-
SSDEEP
768:OrlsJ+XAKEAREKr9zmrpQQDc8yrld+Ki4qnw:yXAKEARZC6cyeKi4b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f085f337dffd82aac309f93fb69ffc2a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0074527f620cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A4DBACA1-7855-11EF-856C-4E0B11BE40FD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000004fbe450981ac7f9590ac3388d3e2b803cf7060c9f625dba260448f103510dfe9000000000e8000000002000020000000293b851ede233f16af2681888d8da15cddc4a15a53dad800ceb15b89d27d3c4b2000000059ad257e436d3d8b732514ae47fb9e268efe164d9a8422f88302549de6ecac8e4000000019a0b8a50eb71cd57665f29714680c2cd5e2e3f57b76660bf6499edcd451795939dbbadcbdae70352b8eadeab7240b86fd10d76f32170f59a7e19e95728fdfcd iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433111344" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2324 3012 f085f337dffd82aac309f93fb69ffc2a_JaffaCakes118.exe 31 PID 3012 wrote to memory of 2324 3012 f085f337dffd82aac309f93fb69ffc2a_JaffaCakes118.exe 31 PID 3012 wrote to memory of 2324 3012 f085f337dffd82aac309f93fb69ffc2a_JaffaCakes118.exe 31 PID 3012 wrote to memory of 2324 3012 f085f337dffd82aac309f93fb69ffc2a_JaffaCakes118.exe 31 PID 2324 wrote to memory of 2292 2324 iexplore.exe 32 PID 2324 wrote to memory of 2292 2324 iexplore.exe 32 PID 2324 wrote to memory of 2292 2324 iexplore.exe 32 PID 2324 wrote to memory of 2292 2324 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f085f337dffd82aac309f93fb69ffc2a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f085f337dffd82aac309f93fb69ffc2a_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.visualware.com/install.html?e=errorcodes&n=10091&x=f085f337dffd82aac309f93fb69ffc2a_JaffaCakes118.exe#errorcodes2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2292
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
867B
MD5c5dfb849ca051355ee2dba1ac33eb028
SHA1d69b561148f01c77c54578c10926df5b856976ad
SHA256cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b
SHA51288289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5425243f5d2e78a278dbf2067721b71a7
SHA10259144c96bed6aafbd48bf57d6c217a1e8f413f
SHA256a51c8a8f5571cf8ccec91d8b49125c70b6915df9847648677aba48db3fd986bc
SHA5127ef78d40495b3267448fb1fd501ea615a49e960ada1599fc17641c1d045dfd2884bb2c8dbf481b7c7772a06ce4b176d4dbae0b0a6df28011e1f6a6f1c69fc604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aa22f9fbf032e3e0a8d6323fa1880bb
SHA1bc2801857e697d13cd232bc4159ca851ae292b91
SHA25699c433df98c57aa9749be5554bb05a18c2fba07b8a927a9397a66b7d9ff0b202
SHA512c728eb3d1471571c43f73f017095e98ba5d94c9fe1954f2950a1a69554d72bb23f64d4eb67f3113e407e1364f4293be02008afd714cf34484def4b465de271d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5587c6d78294af8fe05a89c46b4746dc5
SHA12b1971bc56e1cd1392561b0ba953ed1ea2f235bc
SHA2569761b1e8bf7c15c059298f555203680b2bc9b2ff16815f09efc74ef31dd26a5f
SHA512ac5584c2f9ac1b1f74099bced4598fbd568e56a84da2c5d26738896017fef2ae8b5db988513f2989717d84ae187dd9c8455fc92c1ab47e2f593505b04cd38f45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2923e863b05e85661a756c06fb0eb36
SHA1b9b595cf58afc6d9794188f1d8431f6dc75ec0e3
SHA256ca4c6a72af38a1dc4c96f56ea335c2946a0f7d2072d77ae166703a352d6e3f38
SHA512073d331199eaa4d78a9444329e21bc02cec0f4faae7fd6d455992afb24a6a080c9501c9dfc9fe70bb5914d6a90943d885a25edfe267fad5409aa6425cd0fc8b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53103f5c1067031340073ab2436f68d90
SHA1eb6342b875caf8a71590be4abcdd9df8f7d7f69e
SHA25657c506ee936606520eb414a15741bc654dfb0a64b952be1c4a2749286d1e7a99
SHA512b9808d3144eedb6438cd559e05ff19b2a4d867c999876fee3ebc554ea81049d4542dce25982af2a0b6b68cd5d6c10818b4d8f26dd22f05cb0f8fd5601b430262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5addee51879a5ab32dc35ee779cf30c28
SHA1fee1ea2145e2b910b6a78a92c930a0b30bcea183
SHA2564fbfa9da5df965b0aa84f689b17e70b9bde735ce5c79fe144c4e4f79d6bb4a63
SHA512708f833c5476cb36febb3b4a1f1a1a3eafd5ef0936f7e4bc3e2f023259ce6899cccf45cedd2e0fa37628092879d8a4f9290e8d46348e928bbecafd48f6dceb5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b924c1908564ae9b6996039fdc136150
SHA103d057d9fa880121d4d223e5720cabbe7a2b52da
SHA2566a6ecd6793fa068e06716b0e93a083d93577301a2daa4ac4ece3c51d98df5882
SHA512f4eb99c7037f946953316c388adb830aed025b84891d226520e480f912b0e39a31d3076b0dffaa59dea1682ea79972b4e09f47a1e8696a1a74fccaa7d809b02a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517c0766c816b17acafb2de554beda9c8
SHA14ade84955fdff906b148078c065b4df4662ed9a7
SHA256aa970130d708c67c29a02ac884235bc03f5adeff208abf015ed8fb74240fc393
SHA5128b88fbeb8e864fba640bb7cba0c2a6dd1de99c9360a4dd56401d09248c9283918685d0623382de8c9db7efba8bb6c14e9a1cfb45fdcfcfac70d2e9ee98d51fb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513c4260f72a3def5b8e3041ed33b04d0
SHA14172c14a6df8d63ce5f53612fd6382421cbe5a0e
SHA256414c30b72d52cc8bbaf070a0cae179e27dc83b70b52e24d0248624f1f159065a
SHA512ba2474ffa617de7fb9f3b5b7bb7012e9f5906a1ba48e9adea70fdcd575f3e78b8199731b86dcea988cbd1e0073675228aa9f58509e2cc583010cac4e85d98194
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511302ca4c0c9d5521d3a12d9a2b1d4ba
SHA1ea16b54681d9fb02b7bb4bfe454e591405e26237
SHA2565ae4a1f26b8f5c935b25ca35774300f95cb5923fbce436137a79d6cbdd10dbae
SHA5124dfd41526f5a00d39550b600e18b0fc925e5f6237f93f3d4a27e51650ab11705a184f264c9dac6555732b8d45358e29bc6d4a2b24e7b2a7f60ff79563ad16124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5390af678fcea78cc3181f4f2d8a0b34f
SHA1d61c50673fb58666b0341fdada3264f13364837f
SHA256976354f854d4adc8d6a0ef7806090c1ee3b1fd7f10066ff77b6123c332851a75
SHA512b2a65852098fade6898010f354ffc9f49507c43a96d6d33b09ea8c54b26c22b74585ac4d34d60afd50300d6bbe3664bc04b2ea6ec15d28546fda434c98d73157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a9b7f6737cd81e4e15273524bf18871
SHA1785b3e48813f13650cfd9de9665503ca828621a5
SHA25693cab0a9b96efa235ed8308fc9ae6c8cd6d2d53aaa70628ae6b5a60512db545e
SHA51250911db7fe93171a222288c509562aa026137bb224547969d6dd86b2ecd90769029e684147a69990791a348e0f95d9396e7e02e5fca661997b2ddbac92a5c651
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4d85e5776c6d8b41115b1adbb94bdd1
SHA1d6421cb39840325c4ad48faddeadee31b05f4b80
SHA25634b3f71b8569fc978c22e661a8e1006cca697abf9e10e257b9e895dd414c273c
SHA512ab9bf21b9d31a2c1cd664ed1f1502f9421086972592b2da08ccfc2607613cf7d0f162c5988e2cc44e55222f4ccbf0b517c066f41c5317de9e4ae00ae40d73624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535ff3c8e8edd5e8cf0ce94d7cb67d35b
SHA17527784a1e4b52cee9c163a9ff01235c9b92feb7
SHA2565a9730c3f476a8a3fd5030754f9d799165c02d5560cb8e8ec5f807f842b4ef9f
SHA5120cb50a69decb31f5d21f834bdc41e9225bbe5d5b32066eb30419418449ebb80329be95060fbe8b14e23a9dd37d3d1d0ebb8b3eeacb2a94b54fefeab7e2c90d28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c688f26982e3bca6c1abd5636710ae5c
SHA102e6c8b5d1179876ea5124dc7bd934c964baea23
SHA256ffa259979da8962484e5bffc5ed604376b1c65e953eb525a958a517fc3615330
SHA5120cfb4bab33ad1e6966aff18b483e38a04e28b482777f1f7a771a75b41c9ca0b48bada94ec72a9189d0da3b2752ed09cf5ebcafb409880566b21f12b9e5a38233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1
Filesize242B
MD50ec98b5317abccedc7470b86e666d434
SHA10411127560f438d16d1c34046053456030777177
SHA256b34f3a9419c6687f3051cb3841cfb76b986b6c19fc913d942fed7d4ea8665203
SHA5121f99f2ebe8065e382200027577684172be48e8c9df42578e7069abe00bf5b2560441ddc70c96abd6e613ae46cc8f4f890b8f6fad52d0a06b158451191c8c0a99
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b