Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 17:58
Behavioral task
behavioral1
Sample
f68eb59eafa160073dde400a0a8f3f5a_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f68eb59eafa160073dde400a0a8f3f5a_JaffaCakes118.exe
-
Size
176KB
-
MD5
f68eb59eafa160073dde400a0a8f3f5a
-
SHA1
62860f21fcb1b434b5905b712b99aa5506271130
-
SHA256
4155fbc8cb8459d3397729c25bcb6b15ec7b563264088150b5b8801b4b0e550c
-
SHA512
bd3f215ad81732d4205664094eb5b9a429518b007dfd88e95fc820e53da72113bff8772b9c1ce0dbd751b1d4de5cbf34b592d290c759a9c271090c22962e44f0
-
SSDEEP
3072:gPgsWY2pv14vYPZr7A1D1s4hboCUiUdv6R/W2THidfUQnLFmEZ/Z3pMhac90h:GgsWYwaAhr7S1s0pRUdv6Re2THidfU8+
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/540-0-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/540-3-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/540-501-0x0000000000400000-0x0000000000474000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\DSC00657.JPG f68eb59eafa160073dde400a0a8f3f5a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f68eb59eafa160073dde400a0a8f3f5a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433448968" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BFF560C1-7B67-11EF-A045-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000019863e13679aeb7421f6008f3eca60f2663c44e52681fd7544e6c0c6c84a9201000000000e80000000020000200000000f32ffa67a0a339d1a3ded79119cfb0ea8db094eb7ab3b62521d4270ca7640b72000000031b23b407814fe22e3b62c79ffd96759d7dcdd345f73929de3ce268436cb1a0d400000000778d1ff6c2e17a84e2f5a976329a9c031b284beff3c7bc055650c42c188465f4b62cb12cfcc8b57575f788bf4436b81d046eb3d4d32825f2a67b209dc67c960 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90db2ea0740fdb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3008 iexplore.exe 3008 iexplore.exe 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 540 wrote to memory of 3008 540 f68eb59eafa160073dde400a0a8f3f5a_JaffaCakes118.exe 31 PID 540 wrote to memory of 3008 540 f68eb59eafa160073dde400a0a8f3f5a_JaffaCakes118.exe 31 PID 540 wrote to memory of 3008 540 f68eb59eafa160073dde400a0a8f3f5a_JaffaCakes118.exe 31 PID 540 wrote to memory of 3008 540 f68eb59eafa160073dde400a0a8f3f5a_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2960 3008 iexplore.exe 32 PID 3008 wrote to memory of 2960 3008 iexplore.exe 32 PID 3008 wrote to memory of 2960 3008 iexplore.exe 32 PID 3008 wrote to memory of 2960 3008 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f68eb59eafa160073dde400a0a8f3f5a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f68eb59eafa160073dde400a0a8f3f5a_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/watch?v=WliszZ-Yza02⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2960
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5484c3c730c7bef45b9697085a4b23280
SHA1a7442bb09b1c93814345a2855f0d0fb9ea76406e
SHA256b962064eb6fa0a6adcf4ef5325cdd576a5a794765bb9e7de276b29843901ebf4
SHA51250c71d35d1c1dda76bfe7f8815e72fc6ef0c0f24ec89c7f8d85c0bb266246dd72dc0c64c2fe312f518524cbe75ea220f9ce62b1a10f15e378086b0e6683916ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a301f96fffe17a3ab2bbff44e2431c5f
SHA11704b0d4d679ca02bf7a4aa355b601ea1d878933
SHA256d8803250856ec473c9100b55e6117f04c1ac47dc988edfc521cc2697ea8d53c5
SHA512dfe532838ce09c1dcefebcb41d07a720154cd50cd07c001bdde87070af8de336cf6c752a45c0abd84317c8dd63e756158d38a9463b60cbae99b1b4a9e9f0a21b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56895305ec1a6683ce0413549a550168d
SHA15d1cef5da0df87204d3cfc88d7ec2db8fe726827
SHA2568f4e328772df73dd4e5b703bfd0568c0ea64c92a0aeb33ffc4c2d7e9a40c0515
SHA51218122cd003b1c11ad71d523c29075feecdafc8de077f1921d6b70377d936c92d21289917f922cff7201e94ae5db98f2dd2aaece1849ae3b881d4f4a05ef7042f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524b6f5f12fb0bf687dfd41db318b060a
SHA107c4845bf29e12d7e3ccd5b9fa044bf9ed7a1cc7
SHA2566cd9a68437050df333d7033868b23de08528c46cbfc71d73f2263211b9234a05
SHA51279e62299b37ca5805cc9c003a82d1afb591b0024271108866289f5c614bdb120f1aeb921edf82170aecfc3749b193d52383cfa56f21b11fb17564034000f3c1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516d7991e66025efc288bd385c8b1ffb2
SHA1c95c59ba4383ee81da03c1118a1c8e95b8ea1091
SHA2562d3157ca749d91e61bad246ea7f2ccdb3c5aafc89df68c0ecbaea8b867680457
SHA5127a2e0604869aeeda51c0ff46c8babdc49b11e60d52112faba4839e3b2bf8894f477e956a9b3c06eac7dc930e1a6a8ab6c9dcd502251746749bb96bd8f105c098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8b9634123806ac49ac8d30a0f6f4174
SHA19ebfa7239fda3c1d0a8f3f3a57b44eb0f58f847c
SHA256431f6ef933da2cf09946d2d59b554db2f51c2b3ffdbd3d346f2deb83c876c41c
SHA5124fb28a14e8f1800b6d92e4109cf32778a7076f1f4c781a639e5eab2b63ed5e4177133ecbfb9c9052b13b7d984bc3e963f833d3ee183eb5b89d1169e9fd350959
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ac3b75d329ea23ee21f0989e7f8572c
SHA1efbe1cc0d47aebbe0927e3ee2630f4ed41326df5
SHA25647c66afe93b86bb28e5511f34a10b7c2ce52411a336cb6bfafe7c11ede6945c4
SHA5121728ddfa49373525085b9ad74437de81877b2b837c9d7afa8e9bccd97732e121261f0739b23d44cb13937760406c361b9bc15dc608d9c8c10bf28d015103ec28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c53ff6a2fb7ba83d78ba160424fc1b2f
SHA13e8b9f1108d73bdd4cb2b7ca1c41b9f558c018e9
SHA256a58c4457b86bf47056a0efc846944028fa961a655bb18dec9b0ec98936ff6816
SHA512c07afe83e7e54a210f4c3d7a7bda99ddb69fd8772585521f3f6ff6af8da0951b2d28a8ce0efae6f45ebe3b18ab739c0cd318c9fb3bc25f6d823eae776c63bf63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55541368f1edf830f758417da276dea34
SHA1824ea32e8f4fb91401e0480163ef62ef8891e6fc
SHA256d4c5b4c9aed999d6fbc9b895c1895fd3cbdfa967d01546667a42256b1e3ffc20
SHA512931b87379e3217298b4089cc8a16aa83f90494c2e4162701bb4c1585b20afd68d5dbb522690838aa7732482b652d01dd95d8608832a93de1fbc553c565c1e2d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5482eb10a41d33562a759cec1b12d1f14
SHA15b29da948dfa1cbef4faeec741e02683957ff040
SHA256d5d6bdd8e770884e6f8dbf9ce9fef3f49538bf9946bd6e23ae0c58f1bd735c22
SHA512202200b4adab772cd224dcc4564f64309b8d37b26f67e8518f6eb1d698a0f0a7411d7e4cd46640a01ec2777b0db7e5a269e6ae66190022d09a8b34b954ae0bc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fbcfec6bbbd9223274fa1a98ef9804e
SHA185a0d979755f1b150e50544af13641cfee97c659
SHA2560421859181586290d4a1bc852a57deca7f90b8b0fa80bdeadf7f42c22743bab1
SHA51275371e4d3f57ab59e74fcb087ca56e1091989e7f7ef0ba213b7ea83653f800ccf6be0784ab633166eaa78989a608cc3cb053a2f092f74fb7f75358037e5c93d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c292a689db8f0f86a21011635892b7cb
SHA1783011faa1b8d34c980587b9c41ea65149430c8a
SHA256d8e30872f5b34bb833470a7571e7d7f126f22ca3964b9fbd971c00b86108c230
SHA512100aeefc4e9e2f61f2c09750956bdfedb919adf061f6bfc40a7f3899678432ed05a058c80113dd466c8346b2350bddb6a8320b0dd949c6d9a639d00055215536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f842be954c233e05bc11de208ba36988
SHA1222e15e8c00ac8702f9d95b51fb0d5dfd497e438
SHA256f39480a138613395a60fa6fd0908fd4f14576dcfb1c528a330b50979e2f7b563
SHA512b903441566cf096aa3fc0ac7634cf40f2f666db6eae2b5e6ed5c6816bca8f3fa26af3a5964e849f88d1ed0d4c938008c6823ca14baae25358b094af29fad58f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5a7b0cc3434cc40bfb1f8ae6b31d106
SHA19cfecf5639b31dc5e3f3e64f96697b6fed36b6bc
SHA256e662af085c988c315d7c3e829985af50f2770b3122d7f3e2ef63f33a707b3f2f
SHA5122f560cbd92d10686639a805a9633b70a0e9dc16ff5bf734573e8814ac1184ef1e92b6321817787c6e63101d9ec53deb38d41afd49c5e5824d8085ec3907ba97b
-
Filesize
1KB
MD5c7aa56b1857b991d5bbc64673ecbb277
SHA1f2ea10660e30f040d6afb5fd8cc4a61b312db412
SHA256dfdb1e709883f4e71fc8af5ac415892c741bf426a5fd37255eb6f1d6dfc17f94
SHA512d6839229c9cd7d9e99931087e5a6b494532e989805858110815d033c7f7af60c933391900074a5602c117c86e243b826fbab539303b289360ec7abc7d0032d08
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y1738IZL\favicon[1].ico
Filesize1KB
MD5f2a495d85735b9a0ac65deb19c129985
SHA1f2e22853e5da3e1017d5e1e319eeefe4f622e8c8
SHA2568bb1d0fa43a17436d59dd546f6f74c76dc44735def7522c22d8031166db8911d
SHA5126ca6a89de3fa98ca1efcf0b19b8a80420e023f38ed00f4496dc0f821cea23d24fb0992cee58c6d089f093fdefca42b60bb3a0a0b16c97b9862d75b269ae8463b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b