Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe
-
Size
64KB
-
MD5
f6bcda3158de325660710f0e3d7b950a
-
SHA1
fb3bccb8a0015c1a4503afefaec288a4a7fa968c
-
SHA256
8c35aaf7043b5a6e29c96e48877afb8f055b558650d9120ee922cf245732b138
-
SHA512
f5bd2f7e1e5c4a46e15e35a1eb03bf12d63b8a33c82359225954d2bcf756e59736a40296b2eac14367b3ec9a558343b7fb3eb402831ebcefa269a036d8db201c
-
SSDEEP
768:LVh3DVlvqMb9EGDtvN7ES5VNvXNGlmQtLD6W7qptyybbJE1C0csF4RY:zDVlvqMqwtvNI8NvdGAGLD6OqpTmC0eq
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\doopp = "C:\\Users\\Admin\\AppData\\Roaming\\doop32.exe" f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2684 set thread context of 2376 2684 f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4B33371-7B76-11EF-875C-F2BBDB1F0DCB} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2376 2684 f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2376 2684 f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2376 2684 f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2376 2684 f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2376 2684 f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2376 2684 f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2376 2684 f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2376 2684 f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe 30 PID 2376 wrote to memory of 2488 2376 f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2488 2376 f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2488 2376 f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2488 2376 f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2328 2488 iexplore.exe 32 PID 2488 wrote to memory of 2328 2488 iexplore.exe 32 PID 2488 wrote to memory of 2328 2488 iexplore.exe 32 PID 2488 wrote to memory of 2328 2488 iexplore.exe 32 PID 2328 wrote to memory of 2260 2328 IEXPLORE.EXE 33 PID 2328 wrote to memory of 2260 2328 IEXPLORE.EXE 33 PID 2328 wrote to memory of 2260 2328 IEXPLORE.EXE 33 PID 2328 wrote to memory of 2260 2328 IEXPLORE.EXE 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" superquicksearch.com3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" superquicksearch.com4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2260
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD51ba60f1f9a1223cd9087b18de673335f
SHA1d0fda4854b6f44373407c019e6a9171b404130aa
SHA256e46f9ae69dc358efdf48984d7003f818bad8358ba619138d11b975b7d9168654
SHA5129a2f05b6f8e6d161ac7dc5aeaca03f8f4ce94243820c47e89bfe85ae3ac0cb197420f30568edf2d7a7fa98baf2ef3d9e4fd3a36b94a0d94496a63cad4a492b4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5456f405094116940bcdbe137b52cd08a
SHA1ea4fd2737a7097501f7e58b1cc168fcc327fbfc1
SHA25603c92cebdc9ecd7d844d3169374d8c0a85550bbe802fd1aeb62cb6922be34737
SHA51261b05fa00e69088d8eb080ccc329cb4995136ef78350e36605b2483ec73809156e12b35c218ed35d96a4b6c162399ac8e59d8abed00d6db238f8c03a8aae223b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f703bdd7d52b3bf75c7cadf9efbf9cd
SHA1a3304a955500d66f19db10aa51a71a8a29109a3a
SHA256768f3aa298b1ad37b783ba0f27c51acb359cbeae9d0cb30666e0554a416070b3
SHA5129d31fce9d1edecf7322295a94cc19edfc312dead278168cb44cf1931e547b35d4ecea272a30fe584cc9045d647fa51958602a52b3472f980e707090df0e93b55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa00d206a33df1e928d62470a60b61e6
SHA1a3f4880e0ae70ca340da7efb15a32f9d61e0770e
SHA25628094df8b802d60f23024cb668278a84787300b4dfa9bc7b6fe914b11eca5168
SHA51276886dcc007e2d729ad52023d9d73b79b19bf44fcda5b462862b5927db1b8ec0e1bbb8a27ebe983424b8a3f5478cfa5f8f72628b6c8881a3078f056f7b04e317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c61e7a5687374e19ae0108c68b339291
SHA190dc04ec147057a04de753ce784e74c39ec38274
SHA256eea7a17f2d4568798137c187e5ff889623ccd9820ee474382e5dc84a1cbbdb1d
SHA512c5b98969e54cab118afddb74989eae1fc5dcd091a7cabcbfae337f867393dc8ff46ab282d49329bbfc5e8eacec12ffb578f8e0e8cc2fcfb8768a8143b20b7374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549254e0119c77d0e92973946e5710d6e
SHA1ddcc37dc22b2a176c1149a109991f81bae4d46b9
SHA256041835a78ba039833888c283e969d23214a24889b306f175a3f22b3cdf8c1be4
SHA512761b3c6993fb8855b506fb465ac78371aafa3465acbf427122be50f3955bb2a775de07fc02ad4a382f77e5095cb5a16a782cfdf62333b4ad155efd9900354f60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54259b32218fe640b02d0bc2f2be7c2e4
SHA172378e8fd352345cab0c1f023355923b050ebd17
SHA2562f4508cb4988e95f10c5a2827aab094e11f5a17c99b37d1c25f1d7e6a7b598e5
SHA5122bec51017f7c1fc1518288445c3ec205b9154dc6cebbb27d031ac1fa62a1b71509be5ef2606f53c656931b82cc1be6028862299b866adbccd2bf0d12802fc958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a918adbeff29d0a5a5b5a098eb4a7e91
SHA161d7cc68c2dce71f0f0f7e4107d6ed1f49205f1e
SHA25658e6091f4939e9136bb367d28c85cf84c8a62bc4f31d3567b0ae774fd6070127
SHA512ccbe6f5117839b447733260d6d8dff838263a805ae3685570b91a2370290bb31fffe1c74097649982c28c7fdee62434727f5d1218f21a5cc60eb9b4bf94fe033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a97ff26ae8def2452ef5b65b57dc60dd
SHA158b26efb6d2627ac74d683cc6c5dcdb9a7876186
SHA2564820c8eac55d1a2eb3edc2e00f242ea3a1a064ace64285c5743607e38e72f8e2
SHA512a20b947b3266f0390589f8e3c25b73ea045845129baccca74780d6507b36c563305c31612fb565b4d266af7db955229231908596e9add5d775ad31257497aac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df3bbe6a90e59943c8db1f0e90f9e18c
SHA16ac37f87e791d8bd2c5e84b2c5310c5f164b2568
SHA25677187c1d6950e6dfb8cf2443fc12e337ca0a8fe3bc2880d3638c320755120ff0
SHA5126afe5bc34e3a9b56dc6ea851fe215543b77d59ebfc9c6e14eaaa1efe599fbca71e2aa3eedaaade6d020abddf98af94da4501da2818d17a882055353e6adff6c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b00ff794e7bfc61acc37fc1fdfa7f01a
SHA1a5db9f72947995f12f072e8784704cc27188f265
SHA25650d0978ee8fda5447fa62c7a708dcc6e9fd54c5da6e97bc246e1bf90e34ca2d2
SHA512783d3d20ef73f4024c0a17f283ca9ff90dd5b4b86c447f51522bf9a03625c3d6c149f417d9a85324418d907d9644667a353208e24a76fc1d1122ce682dc95e9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533b99695bf6e5fa7bd18d89db9b444be
SHA13a616614b5b85407cb607f835dba79f623dcd3de
SHA256d75d646a35be05bd538a3a5b863dc0652d0c9c0dec918ab037196753b4957375
SHA512332930841765afc7b4d611e1733ece40d7aeeca439bb2913e921dfcbb4d2ca1a030d29af713384264e7dfb7f037357c7e8c8f46271a93db66fb79de9f2fcafbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b3406e53e0c4bbbede4ca57b576887c
SHA11f0da4146292b8d572942fc0cc4427c602f978db
SHA2565a5ada35673cf3c3aa2624dc2d9f0466aa798b2cca4ec83994313da71220c85b
SHA5125f54fb06719370d9da9bf346896e0bd93f7fa7293081e48816a6d7f75fbbee9997ea8f68d6370962e0ace400cadcefb58862b8167ea541d940268229b3d3706f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de6a01ceb1d24418fa5af63fae5ce1cb
SHA1918af8f517a3004d7dd7e7e84f008e60ac4e9025
SHA25668990128675604dd950037485c6244cbbb3198e3a7721d886339efe24e911737
SHA51241ae8e44f813c4e75d75c65a4d6f1f49feafff2abdd7447b11b3f47458fa57748ee3b64fc133cb4ca07b5f695ae57dafe18922995e4ace45232a0e2a773ec893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bc0cf338b503ff86e50ff52d0e803a5
SHA1afdb968325d138c42ffc8955581c7c20845bf177
SHA256cc3c3a7964057471b2c8ed2eff6d30339bf1aa71cc791e82ff97467e8a842151
SHA51227682d93b72f0756ef0c1ed682c3506dacdb1b2871d26215ed7079bf43829ae84af368bf472d4b0e65ea8483427d9da4b14acb36632747e3e2bb1dba046868be
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b