Analysis
-
max time kernel
121s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 19:48
Static task
static1
Behavioral task
behavioral1
Sample
f6bdca574f5c9b7e89838be0ecd5590e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6bdca574f5c9b7e89838be0ecd5590e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f6bdca574f5c9b7e89838be0ecd5590e_JaffaCakes118.exe
-
Size
756KB
-
MD5
f6bdca574f5c9b7e89838be0ecd5590e
-
SHA1
26091cfbb35d7bbae1e8da4ba34c1a7897f6cbd6
-
SHA256
6191f08d4740985a89e8ae44300c9222a2a6d25d7960bd96f14060e09532ee08
-
SHA512
65e00c43c319527a1217ebccf3bc5183898ab142823a180a09b7121bf59e6a8928f7c4ed788130bef3b5ba2a8ae79e285269809ab336aff1ff1ed84a337620b6
-
SSDEEP
12288:jPWiTY3YVq5fgC19VZmqrC3TVj0HVhUmpR0rHtmM0IDZlm0JjE7sPowwvuShFbM+:jPZTY3YmfgqLryTuVimpar898zTBy3Uc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6bdca574f5c9b7e89838be0ecd5590e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70caf405840fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main f6bdca574f5c9b7e89838be0ecd5590e_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{315E6811-7B77-11EF-B5A6-7A9F8CACAEA3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433455600" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000020bd589a5131d7a5a96be374d6e565988dfe8c8f21194aeb1a86e1fc26329ca8000000000e80000000020000200000008c7fdd7827a2257d54025b6548e665f08ca7d7de7b7267a8dd190564f8be602020000000ea9930a2e141f8598395f897d971375a313c8c35a1c6d3439eb9f786acdd25444000000047f360165021961028ac11e0096922479ac9949de3795c8554147b012503b83217f261933db26845456f5fcf9097d593ea2ab8ffb761e6da93e93d7a5d13612e iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2892 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2148 f6bdca574f5c9b7e89838be0ecd5590e_JaffaCakes118.exe 2148 f6bdca574f5c9b7e89838be0ecd5590e_JaffaCakes118.exe 2892 iexplore.exe 2892 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2892 2148 f6bdca574f5c9b7e89838be0ecd5590e_JaffaCakes118.exe 32 PID 2148 wrote to memory of 2892 2148 f6bdca574f5c9b7e89838be0ecd5590e_JaffaCakes118.exe 32 PID 2148 wrote to memory of 2892 2148 f6bdca574f5c9b7e89838be0ecd5590e_JaffaCakes118.exe 32 PID 2148 wrote to memory of 2892 2148 f6bdca574f5c9b7e89838be0ecd5590e_JaffaCakes118.exe 32 PID 2892 wrote to memory of 2948 2892 iexplore.exe 33 PID 2892 wrote to memory of 2948 2892 iexplore.exe 33 PID 2892 wrote to memory of 2948 2892 iexplore.exe 33 PID 2892 wrote to memory of 2948 2892 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6bdca574f5c9b7e89838be0ecd5590e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6bdca574f5c9b7e89838be0ecd5590e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://frostwirefreedownload.net/download/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2892 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e51d18d2d66a3c82e2b562ebf293a49
SHA1b14c72be7a6ddb9c727952b4be1e0ed7175e8c50
SHA2569b2b10e30d08307246f46832c98b25756e7d2df2688d665b7f3eb2ee773965f1
SHA512c1a9f3a78743ad4c49a532e481e703f66402268ddb06b48c9f9d5d8af9714c475ab942adfd855c260d0be42cb235fa10c59ceffc7b7fef91af031ea2ebdbcc2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ffb720adb949f0c9eb013464eef6cb1
SHA1a61147b13e1e2e16cdd60894888a1b22418bde83
SHA2566f2dee38d3137115d4acb723d4b49871613a14b15bc93266e1ada8dc85657b37
SHA512dcfb9dfbc56f236e1d4c61214d267b442449d8d078987622ab34569073cd7b156f8303c311f4f4391b29202f65597407bb3785a138b21cb3903ee39153ea0076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4a23e01fa9db45c8acb2f747dc8d652
SHA18e6400c123ac33706ab19cd5b173bb3114613e11
SHA2562a27145b56c09552287cce8153605f4193011a2b8a239526fb53cb4307fc36d3
SHA5129a7078172c166fe612a63f213e9bf42fb90f8e53f00658f47787160fcb1bb3609b93f3e5ea43f4f2e2acd7372289551aa59b19e44845e5b372c1ee761ac5792f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb8d1641b5254af99ba30ccbf5804eca
SHA14e5a92fc7b586e6ccb2e1dacd3d148017ddf6737
SHA256876c42d1a6e2c44e1fee0409e4753ab4e9f9a4a0e07f687d85747da02d72e0ce
SHA512079a0900bd799001f609b49fe48fa964721f1e53d030a53aaa0fdfa1932e9c05bf5637ea255a33ccf903cff922789ab3cd9f7e4fa3beea6bdfd308bc6feab50e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533dacdd8876f24ee5714295e96e013cf
SHA11446e2fd46529724a4dbba840ce319b8b41b25dd
SHA256fa1a3f1cd3396835028539365b442601357acbe51fa322ee5fca28bcef8ddda7
SHA512cda7884a58514c84d7374cef99da88ac04ab7ec383a348369bd1a757f771ccb0c6c1dbd1481a3e7c1cac536669677711f86e892c42ad74746252b00e5c2bdb3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564d00eda7dfeb7351dbee307f6b2d198
SHA160a592943ca6409ae2be61522fa67147b81fff55
SHA256da3ad5b1d189ca2fefbe83b073a228e1ecbde99130818e35e5aa4277bd8cae77
SHA5122f6c4cac5cbca77d81eacba742d22ed461abe4d47b77611b26c14d5a468ca52534346a9f9dc35e32f4e9a8d2d1f6901d108e2c4dd32acd082662af040696e468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f46519c5c83398ec989f46d16c47ac0f
SHA18e30289e673234b776895eb44b5131d42b1acfa4
SHA256be66472b4b83c5ced16ffd139bca23a70e5fad55ea5722d4af0514e4ad48ae07
SHA512901094f2977d65f0a76f5183f01ea4f6db2a25e3bceb26b401aa805806c11dd72a0ed01cc70d98a65e23746bb3aa5b61a8b37559a307e0159927a32d088f7a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc9bfbf6392df3c4f75ffa46e17621c7
SHA1f32299c8af83edf43de68753cbce5fe3292afe98
SHA2562d5d4a63b1cd4144e4f2d2088c84264846555ab94edd40a014d13a4fb897a488
SHA51286e158a658a9e30838b33e5fa64c6290b4335a7f89fb0e2f2bc5cb1dfe063a8248fb7bc84929ccbfe3b7b11d948471ca92c367e722dedf7a883d855854f8cbd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f4f88ee7c9d85624d4eeff41f190ff1
SHA1eb8b0447463b0dba310db7d66a00a67366936751
SHA2566f86344a911797841133935270de9cd2cf7f70ccf9a2700c7192a44f06fe5e96
SHA512368fde0eeb0a139ef9e63bf8df51d24b36c5a86ef70b329a18514223ed26d200a507c52d99c56a3561a9e148a0a5d1ecdcd39f7e5dc3dd4d549700f0a2f10397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54423972ef93874a0f20054c3a3c8c8f4
SHA10e2e97b126bf8cf3a9dccef1ac94673ce06061c0
SHA256461d256bb295d211b87a26ea108c3304814499074b908c2bd94f2e7b64f611de
SHA51200e20366f340f4461d24911d34216542b7c9f7ae2c99e4f9ce9f24cd3f32ecfa014d11d75cd7d24662ccc3108811838b7d5163d54bbcb4f2685c580752614179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53564bf84cb8c70739f0f9173f7ec3949
SHA1839d1a471eadf4e98a96ebc7267f7817f5495405
SHA25640cc29f544df24bc6b511c9c17e599febc9fa0233992d595fa1cce43a187da16
SHA5120f6dbd72fe1d8de6f21f79cfb900abec18f2421aa783c4ead9a410dad831cf1642c7d695b02cbc4c55b94df942fb68474b4ad73bbb62679539671d5d7dd2311c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5825ce725d980ddebbd330b05712dd0a3
SHA140fa0488f5c9e96dddf49b4e14aa32df6926a9f4
SHA2560e81a69f3e125238c42646f9b989b156f1e7aa7511a173f2b3721baa799e3fae
SHA512e9a4a954b0b337b7103415031e76737ace4146a9cdb749fa15fd8a3e7094423e02c7b240904381ea451466c7b3b2e16ba8d4ab58542e334e29eb38120e0928db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feafc42ad8f7e6057603d800c88eabe4
SHA12bed284381b9e9a3ad308d9e0f4e80c7160333df
SHA2564a115eb12e3f76942b13742d5715ab86efc32163c0daf527c9c602d0d9a5e35f
SHA512649f5abc07a695f1fb27d454634f97fa91622a71a6ed3ecb5f3e4dec4eb59763d8f7c3df6ef5f11d128b8bf03c0fd5962e9a206281351eab111667df6993e595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1a09a84865176b4b6aae1c615f996f4
SHA19def81534192bee2fc4b853f351d392f50e165d2
SHA256c8e94d14ae195064752550ccb4adf26ed70a74b3ae274a95f482b75cf6dec4e9
SHA5122eed4719edecb05076504abdeee2b34bc975bdda939ecfbee90db843574476c1546c2c83e70db5b68a8f7dd9560997d5e1394fe0ea2aad6c458453d101d38676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50487e3d8a74b30e0469540b6a68815cf
SHA19ee5fe502156bfea939f61fcaed6bb63330aa42c
SHA25693fdbbe6c06c7d0e5c1ece3c75c20b9e68d7952ff385d46c7815b3a3da066bfb
SHA5121a1f80ad5951eaac3cc554a41148d0925f6da722de95b619f81322e39d2b740e3de98f1ee8006c5ff8e3948741f56788c4451b7f9069d941ae9956359df99855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab7751d6ca2cb3d34cd0bc9c5d3df6b1
SHA1b730bfe8355df47180a1ee0ae320fedf71a3c7ba
SHA2566215cb7fb5cf256550ac18ce987335e7f760039ec35424360eef2ef616ab1e59
SHA5121d1d5afa175b3dcbf53d6f1dac34d1ac47c2f2f944040ac74f265db4401fb195436b9dbfa5b05318cc0323bcf2aaeedd5649f92cc284bd4544c3720ed239cdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b