Analysis
-
max time kernel
150s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 23:58
Static task
static1
Behavioral task
behavioral1
Sample
07f3f29eeb7728a9f073f42e13cec4ee_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
07f3f29eeb7728a9f073f42e13cec4ee_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
07f3f29eeb7728a9f073f42e13cec4ee_JaffaCakes118.exe
-
Size
444KB
-
MD5
07f3f29eeb7728a9f073f42e13cec4ee
-
SHA1
da7cb0eb9edb5e5506c0ee4c2fe4efbb54e6148b
-
SHA256
9b894e375e381a4db74bdf50059e435add2901193022767717ec8fcd71bbda56
-
SHA512
aa95e0df77854735e7d8395ba5eb5e1e7a3a188a92f87e5da039dd79ad363d2f515380a7ef9eb230ed03ad1dd5558467e3fbd101d8b32b3a99dcfdc530352de6
-
SSDEEP
6144:Qt5rjvFcipzmXQBCgYkkWcS7n6TjE4ukga/lLhYYIB6Rhwq406MQaYDYha6ib3u/:QnXTXYs9KSRZdMUyKqDhrixh8
Malware Config
Signatures
-
Executes dropped EXE 8 IoCs
pid Process 3740 vojo9rhtvxr9te30s60f.exe 5016 kqsetup_wm.exe 3020 dge_proxy.exe 3124 kqsetup_wm.exe 4536 hgjavaw.exe 4632 dge_proxy.exe 1008 kqsetup_wm.exe 2984 dge_proxy.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\kqsetup_wm = "C:\\Program Files (x86)\\Windows Media Player\\kqsetup_wm.exe" kqsetup_wm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\kqsetup_wm = "C:\\Program Files (x86)\\Windows Media Player\\kqsetup_wm.exe" vojo9rhtvxr9te30s60f.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Media Player\kqsetup_wm.exe vojo9rhtvxr9te30s60f.exe File opened for modification C:\Program Files (x86)\Windows Media Player\kqsetup_wm.exe dge_proxy.exe File opened for modification C:\Program Files (x86)\Windows Media Player\kqsetup_wm.exe kqsetup_wm.exe File created C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_77703\hgjavaw.exe dge_proxy.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\dge_proxy.exe kqsetup_wm.exe File opened for modification C:\Program Files (x86)\Windows Media Player\kqsetup_wm.exe kqsetup_wm.exe File opened for modification C:\Program Files (x86)\Windows Media Player\kqsetup_wm.exe vojo9rhtvxr9te30s60f.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\dge_proxy.exe kqsetup_wm.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\dge_proxy.exe kqsetup_wm.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_77703\hgjavaw.exe dge_proxy.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1364 5016 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kqsetup_wm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kqsetup_wm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dge_proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vojo9rhtvxr9te30s60f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dge_proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kqsetup_wm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hgjavaw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dge_proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07f3f29eeb7728a9f073f42e13cec4ee_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5016 kqsetup_wm.exe 5016 kqsetup_wm.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 5016 kqsetup_wm.exe 5016 kqsetup_wm.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 5016 kqsetup_wm.exe 5016 kqsetup_wm.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 5016 kqsetup_wm.exe 5016 kqsetup_wm.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 5016 kqsetup_wm.exe 5016 kqsetup_wm.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 5016 kqsetup_wm.exe 5016 kqsetup_wm.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 5016 kqsetup_wm.exe 5016 kqsetup_wm.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 5016 kqsetup_wm.exe 5016 kqsetup_wm.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 5016 kqsetup_wm.exe 5016 kqsetup_wm.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 5016 kqsetup_wm.exe 5016 kqsetup_wm.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 5016 kqsetup_wm.exe 5016 kqsetup_wm.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 5016 kqsetup_wm.exe 5016 kqsetup_wm.exe -
Suspicious use of SetWindowsHookEx 27 IoCs
pid Process 4800 07f3f29eeb7728a9f073f42e13cec4ee_JaffaCakes118.exe 4800 07f3f29eeb7728a9f073f42e13cec4ee_JaffaCakes118.exe 4800 07f3f29eeb7728a9f073f42e13cec4ee_JaffaCakes118.exe 3740 vojo9rhtvxr9te30s60f.exe 3740 vojo9rhtvxr9te30s60f.exe 3740 vojo9rhtvxr9te30s60f.exe 5016 kqsetup_wm.exe 5016 kqsetup_wm.exe 5016 kqsetup_wm.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 3020 dge_proxy.exe 3124 kqsetup_wm.exe 3124 kqsetup_wm.exe 3124 kqsetup_wm.exe 4536 hgjavaw.exe 4536 hgjavaw.exe 4536 hgjavaw.exe 4632 dge_proxy.exe 4632 dge_proxy.exe 4632 dge_proxy.exe 1008 kqsetup_wm.exe 1008 kqsetup_wm.exe 1008 kqsetup_wm.exe 2984 dge_proxy.exe 2984 dge_proxy.exe 2984 dge_proxy.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4800 wrote to memory of 3740 4800 07f3f29eeb7728a9f073f42e13cec4ee_JaffaCakes118.exe 82 PID 4800 wrote to memory of 3740 4800 07f3f29eeb7728a9f073f42e13cec4ee_JaffaCakes118.exe 82 PID 4800 wrote to memory of 3740 4800 07f3f29eeb7728a9f073f42e13cec4ee_JaffaCakes118.exe 82 PID 4800 wrote to memory of 3960 4800 07f3f29eeb7728a9f073f42e13cec4ee_JaffaCakes118.exe 83 PID 4800 wrote to memory of 3960 4800 07f3f29eeb7728a9f073f42e13cec4ee_JaffaCakes118.exe 83 PID 4800 wrote to memory of 3960 4800 07f3f29eeb7728a9f073f42e13cec4ee_JaffaCakes118.exe 83 PID 3960 wrote to memory of 3636 3960 cmd.exe 85 PID 3960 wrote to memory of 3636 3960 cmd.exe 85 PID 3960 wrote to memory of 3636 3960 cmd.exe 85 PID 3740 wrote to memory of 5016 3740 vojo9rhtvxr9te30s60f.exe 86 PID 3740 wrote to memory of 5016 3740 vojo9rhtvxr9te30s60f.exe 86 PID 3740 wrote to memory of 5016 3740 vojo9rhtvxr9te30s60f.exe 86 PID 3740 wrote to memory of 3180 3740 vojo9rhtvxr9te30s60f.exe 87 PID 3740 wrote to memory of 3180 3740 vojo9rhtvxr9te30s60f.exe 87 PID 3740 wrote to memory of 3180 3740 vojo9rhtvxr9te30s60f.exe 87 PID 3180 wrote to memory of 4480 3180 cmd.exe 89 PID 3180 wrote to memory of 4480 3180 cmd.exe 89 PID 3180 wrote to memory of 4480 3180 cmd.exe 89 PID 5016 wrote to memory of 3020 5016 kqsetup_wm.exe 92 PID 5016 wrote to memory of 3020 5016 kqsetup_wm.exe 92 PID 5016 wrote to memory of 3020 5016 kqsetup_wm.exe 92 PID 3020 wrote to memory of 3124 3020 dge_proxy.exe 93 PID 3020 wrote to memory of 3124 3020 dge_proxy.exe 93 PID 3020 wrote to memory of 3124 3020 dge_proxy.exe 93 PID 3020 wrote to memory of 4536 3020 dge_proxy.exe 96 PID 3020 wrote to memory of 4536 3020 dge_proxy.exe 96 PID 3020 wrote to memory of 4536 3020 dge_proxy.exe 96 PID 4536 wrote to memory of 4632 4536 hgjavaw.exe 97 PID 4536 wrote to memory of 4632 4536 hgjavaw.exe 97 PID 4536 wrote to memory of 4632 4536 hgjavaw.exe 97 PID 3020 wrote to memory of 1008 3020 dge_proxy.exe 106 PID 3020 wrote to memory of 1008 3020 dge_proxy.exe 106 PID 3020 wrote to memory of 1008 3020 dge_proxy.exe 106 PID 1008 wrote to memory of 2984 1008 kqsetup_wm.exe 107 PID 1008 wrote to memory of 2984 1008 kqsetup_wm.exe 107 PID 1008 wrote to memory of 2984 1008 kqsetup_wm.exe 107 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 3636 attrib.exe 4480 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\07f3f29eeb7728a9f073f42e13cec4ee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\07f3f29eeb7728a9f073f42e13cec4ee_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\vojo9rhtvxr9te30s60f.exeC:\Users\Admin\AppData\Local\Temp\vojo9rhtvxr9te30s60f.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Program Files (x86)\Windows Media Player\kqsetup_wm.exe"C:\Program Files (x86)\Windows Media Player\kqsetup_wm.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\dge_proxy.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\dge_proxy.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Windows Media Player\kqsetup_wm.exe"C:\Program Files (x86)\Windows Media Player\kqsetup_wm.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3124
-
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_77703\hgjavaw.exe"C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_77703\hgjavaw.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\dge_proxy.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\dge_proxy.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4632
-
-
-
C:\Program Files (x86)\Windows Media Player\kqsetup_wm.exe"C:\Program Files (x86)\Windows Media Player\kqsetup_wm.exe"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\dge_proxy.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\dge_proxy.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2984
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 24604⤵
- Program crash
PID:1364
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\oapqw30x.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\attrib.exeattrib -a -r -s -h "C:\Users\Admin\AppData\Local\Temp\vojo9rhtvxr9te30s60f.exe"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4480
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\oapqw30x.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\attrib.exeattrib -a -r -s -h "C:\Users\Admin\AppData\Local\Temp\07f3f29eeb7728a9f073f42e13cec4ee_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3636
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5016 -ip 50161⤵PID:5080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD51ae64efdecb1ac64917e92bc43289d28
SHA1ca91befcabd6211412d8ab0fb10632217f0ae2a8
SHA25616e5770ca154af6155fe48885a3507151925a2eab3ae9b5742da3dd3ac3d7c48
SHA51263b64a70961d0f00c9c7fcf586338fce78da1cf9bd5a1a5722d0cf1a894ae88584265b87e7a184ac5ba16cad7f74527fd8f2c44f9edd4ad820aedec081cd7f1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_71D00F0D3698C81F2158FA9703C4EFA3
Filesize471B
MD55bf2137247d2379eff75842658f0d939
SHA1a6958d374a4eab188f1f1334b4a33514d75fdf8e
SHA256fd88b824c176afac0d0410a5839ec76e85de47eedd7fdc3c4a9c06c2ae3a485b
SHA5124f07d3322814910768bc6e1cba7823026be7aaff71b1ec490b7f4f224c795dfe2a381ecb4fbc3c5914a5662bf9a7c0a4dd18cbbae00c473936501c21e7df9c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5a5b1c84e03313753d0228602981690ec
SHA113f56e02590825b737e0bc48e2751a261aa6e82d
SHA25644864e56684c98f86a00c75ffac9668799b4fb13598fb2a1e38a6ca2dcd6d917
SHA512f2c73706a1ebb6d6b95969ab84f660b2844f5eedd8d5953ae39d899c93a9d214484df6611cbea599099c2ba5f06d797c094c973c478b593c6c3b639bbb47375c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD51da559b3ab542e45c268b3b537a03be9
SHA12faa69ccc06d5c3858d92df879966c9f86423434
SHA2566ed7f380092a6da34822d9995c6051a079e4c1206282e8218fe33e27f578f71d
SHA51206f926b52f25c414f81d72dba301b5f47e2fead954c0e1fbdc5b464b3edf7a5ecb7a0d6c24166c85a152680cd4e0e9c810841c2af3f794e30e57262605541011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_71D00F0D3698C81F2158FA9703C4EFA3
Filesize406B
MD5ea97b7ce78c3dffe2c167aeb3ce8a375
SHA1b2f8dee7e3f5ba9a36fb40ef0da0fbebd3ca9125
SHA256930dce34f85a3d99eafa1b5c09d7880110ae91359268332fb61100263c71a3a8
SHA512e64abc82c82d2d605c1da0225775a0fc77b4fdf2ed4c90820abdde65a7405b8f997c57e8c2e1e58de956a183c2d07fc54b265aea2a146f33dfd9dfd0541070f0
-
Filesize
20KB
MD5877821ef9254498919831f3c0a4fc49f
SHA11c3184389b03db2b77f6b8c6e266a7c86d96d483
SHA2566122b32b894a5979983c5c12c9a117cbc656a415b83cb11773fa7384dc80f804
SHA512dd0b4298b0b3627564cab53b2aaf474585ee6af41c8d2ddce7dcd898feec17b83c1ab13349d7bfc322e55e1ee007758d23f71d5d2cc7e7c0caeb95f829c65eb8
-
Filesize
5KB
MD54869be8fcbdf86bac0c9487f0de4bc6a
SHA121c852e6fd4d0100ad13ea631bdb8e05b6fe5078
SHA2567f8cc8ef9e4954d92d497552af9757c35307285a61e56d6d3d496bee7c4fa950
SHA512fbd18dd878a37e2f624f6f4310c6faac05700d95bed4cfca21d73616bf93a37ee2770281d44efd282346ef298ed0fa20cc8ee783c954ecb9984b83e5c67902b0
-
Filesize
262B
MD5b742f8e94e2a87029c4c150bd7d29660
SHA1923eff235b27f6d777401196cdc0c609b058ad29
SHA256d19fcfcb85e74ff70c23a2774465f98b92344a99f723d143ebe5959c13fd2b80
SHA51207ee36be30dda31b17c294ad5b39f5623122e57abf0478030449222042630e13c5a9560cc1cba6f4bd21e182aee69642ec838af63c1229026a2e49b837b76bf1
-
Filesize
340B
MD50577771ee5abc9565959e6a57bab471a
SHA1a9a8fcb5303fcbeb381ab100c6730d49ff62efef
SHA256e4ea0fd2cf8d0f2c508326296756d9f542108410e53ff16d852a128291b0b57a
SHA512ac376bcbe49909c29d1ab359b68b543a72ddd403e8cba7ca869bcf1653dab4fc696bc818669496824d2f2c4c6a7891e175d012e7e54ad722daa47a78397868b5
-
Filesize
444KB
MD507f3f29eeb7728a9f073f42e13cec4ee
SHA1da7cb0eb9edb5e5506c0ee4c2fe4efbb54e6148b
SHA2569b894e375e381a4db74bdf50059e435add2901193022767717ec8fcd71bbda56
SHA512aa95e0df77854735e7d8395ba5eb5e1e7a3a188a92f87e5da039dd79ad363d2f515380a7ef9eb230ed03ad1dd5558467e3fbd101d8b32b3a99dcfdc530352de6