Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 06:29
Static task
static1
Behavioral task
behavioral1
Sample
09522872ca211fbc4d687b6711ed4b99_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
09522872ca211fbc4d687b6711ed4b99_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
09522872ca211fbc4d687b6711ed4b99_JaffaCakes118.exe
-
Size
40KB
-
MD5
09522872ca211fbc4d687b6711ed4b99
-
SHA1
7b84ee5a9887c32b3c56e7b7f60b23d8701a198d
-
SHA256
1a127f0d1d420481c6c9e6553534584a19be125b6068a9d00dfa9548d9de0e84
-
SHA512
375fa81e54892b21d9e60bc7d95ab5d9b611ad6ebc24b72f7b69acb7f846201bf297e27e004f085e31e84f403d689857e65474b42583bbebc5a8ab02cadc17ac
-
SSDEEP
768:f88hfKIZWpmZTCjMA2Un/bMk8y95AvI2ezWgP5yMHp0GjbOpAu:f/AmhCj/2UH5IIrfHCKu
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run 09522872ca211fbc4d687b6711ed4b99_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\moorff = "C:\\Users\\Admin\\AppData\\Local\\Temp\\09522872ca211fbc4d687b6711ed4b99_JaffaCakes118.exe" 09522872ca211fbc4d687b6711ed4b99_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\win.ini 09522872ca211fbc4d687b6711ed4b99_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09522872ca211fbc4d687b6711ed4b99_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9FD7E811-8087-11EF-93F3-6E739D7B0BBB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000d795095dd39061d1328aa2be68ce0888d68830c5476ba36c8d6393687cd874ef000000000e8000000002000020000000c66c56db275195c98dd0b4021b36a86c55fd7c93211564a7740d64ab97a388d520000000537acc84c4be2b0a1312d6d6e23dc145cba5ce5deeade79318d778753e3a211140000000f348936ec4c3f7b31d65f2e8ae4bd567ffcd0838cc36ab910c4c6f7d92f5e7c298d0ceac7085b34ade87c3d11e8835ded20dfea16495d76bccf22bd06c6851fc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 108e83769414db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://www.2298.cn" 09522872ca211fbc4d687b6711ed4b99_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.2298.cn" 09522872ca211fbc4d687b6711ed4b99_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2476 09522872ca211fbc4d687b6711ed4b99_JaffaCakes118.exe 2476 09522872ca211fbc4d687b6711ed4b99_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2476 09522872ca211fbc4d687b6711ed4b99_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1832 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1832 iexplore.exe 1832 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2476 wrote to memory of 1832 2476 09522872ca211fbc4d687b6711ed4b99_JaffaCakes118.exe 31 PID 2476 wrote to memory of 1832 2476 09522872ca211fbc4d687b6711ed4b99_JaffaCakes118.exe 31 PID 2476 wrote to memory of 1832 2476 09522872ca211fbc4d687b6711ed4b99_JaffaCakes118.exe 31 PID 2476 wrote to memory of 1832 2476 09522872ca211fbc4d687b6711ed4b99_JaffaCakes118.exe 31 PID 1832 wrote to memory of 2660 1832 iexplore.exe 32 PID 1832 wrote to memory of 2660 1832 iexplore.exe 32 PID 1832 wrote to memory of 2660 1832 iexplore.exe 32 PID 1832 wrote to memory of 2660 1832 iexplore.exe 32 PID 1832 wrote to memory of 2040 1832 iexplore.exe 35 PID 1832 wrote to memory of 2040 1832 iexplore.exe 35 PID 1832 wrote to memory of 2040 1832 iexplore.exe 35 PID 1832 wrote to memory of 2040 1832 iexplore.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\09522872ca211fbc4d687b6711ed4b99_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\09522872ca211fbc4d687b6711ed4b99_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\program files\internet explorer\iexplore.exe"C:\program files\internet explorer\iexplore.exe" "http://www.ieroc.cn/ok/install.asp?ver=090519&tgid=routie&address=6E-73-9D-7B-0B-BB®k=1&flag=8679ad71c9cfd4f1ac0a215dc6552f1d&frandom=0&alreg=0"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1832 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1832 CREDAT:1324039 /prefetch:23⤵PID:2040
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cf8cf6d54af91d11b45788e5f53caf9
SHA14b5a63c0bdad02a2bc28b77c81dc3369d4653e7d
SHA256c320da14a6d2e05642e8aeb5400c439e2654b54e3a5ed70b2ad3cacec141a837
SHA512ec319a83e528c532df5749fa33dd59653e3c1abf77bdd5ad98bff207d415da4f11976107cc5b5c9e9a6bcfb6acefba3d15ee4badd2949a1089c1d040ff3512e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514dd1f55535cb5027470c0f9d58965b9
SHA1c4dbecbff16e42379a95acaa2c7d9b2da34602eb
SHA25681d0c3017496bc6d981d91918ebcc6d3ec000ab69f09495d5c2c530f5ab73c09
SHA512accdef5d201498f3d9d5d5ebecc398f5377d1ad3d8e1dd64ed4e7876e08eb89bbffc35d596389e7afb79087b10aa214c690d7f2a28fd2f073b7926abcb81c99b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d091a4e546f575ab3fe48f4ad52e814
SHA1a4874c5a21321c91213ef261175190018bec6f83
SHA2560fa952dd644a9746f6e91d2e6560ca4e89abe0579746e883ac90d3c16fc8d029
SHA51222b259b855b3312935b5340f5aba859a6fef14cae1248b8823960a9ee97aa4dd170a759f8a983f613ca33556674c699e46de02b225de08b71302b74dcd4092f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550c10b5d0a8837ce5ce42df60a9c1539
SHA1372ac5d15210289d4083755ad941140774edc350
SHA2564699093dcd4708f2dca874704c1f285c05e59e85eb0f5df317fdc91b4eaecd8f
SHA512dc5f515ee067189553d8b6962b8a2615a945f43aacdd3f6eeb129af259b4b2e79bf84a7eae7f7b7dc92faed27cd4bc2110022de04a9bb760f4b45705189f9c40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571b3b42084fc5e34e54dcd8b28257aef
SHA124b5f26eafa7dca11ebc8660270a69fa89750d1b
SHA2562bc2dbcac513aaaf74fc7b47860291bd4b04c274b1cb63dca62827541c3fc9cf
SHA512b29d4bfb3b3792c4d344e9af76e2525721a1c4a72b9948b6efc591dd00e6145acc300317d6a30f06849c8da29e1cecc793c5f89bab426d4be771e8913fe0d086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5710df8e6685ff739e88d3283edc305cd
SHA1ea536e95666ff78fcdf54adbf30cb19e04a9f61a
SHA256297cb14924736e78c38c600df1ccf698a6305223bd3e4fe1aeab4db4f10a82b4
SHA512a1736ad25aff96692a34c8a5734d78d5b093ece1cc2781802d18c8d3fae62a19da8bcbb8a2c62aa3177c7f54dd112ffe58a611b8fe77060b6cdf82917c0e8ccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56414bcabc2a3ee45e65cadb32bdc118b
SHA18f2340e359af94d1450d46d59e24da6315673605
SHA256b82de3c5434c0f76835c87dc415ff49cff737da0950832e5a07986f2dd567e10
SHA512e5632378c356f985c7ccae32391c3ee9cdf0171fbc00955ece05132e604129791ba4be0745be51e79a733db73c001de720e93e9c04903ce849b2422b5ce567ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5310c006bd84153f7d1737015ce8a5415
SHA134dc665f289651b3e544a21d8f8ee40b7c2893a6
SHA256141659470dad8157ea25f7b3bcbee4dd58a9fb75ed5f043c4882644b44cd5bdf
SHA5127d890bbda27395b80ae3c9eb764380a52653275201bcafe5a315cee2385c360c8b182fe92e176660e42c1057ca69737d111d7ce0c50528ced99632b056ba9c0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59500c43cb7096138b79806c25a387187
SHA19b36092aabce9b474f5d65b26640823940068b7d
SHA25652b1ffe60b8fece0112fcae1e8990915dac4db0f08812054c4e9fc31d6a6af40
SHA512db5c89a7df910f2a45f586d360a89365c3ab311842271cb8c62511446f427ce0519164bb04123b7457f26e2cd993ac51e8e80ba1dcc2cbeca490c8d2601522f3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
16KB
MD5eeb1ae4f2c5ec0a3d19e8d78cf2b63cf
SHA18534328b6ec332db070f9bf2a238784d10f0932c
SHA2564f4a364af83e290e5968b4b0c5b92d179d483d8bdc6fc6b0d7c03e27f81a321e
SHA51249352a85b253b7eec3fbbdc32aaa503f418feed88b45fe57e7090e6a9ba3a97a4d73e99c42468a25f872d5b1ba7aa95c9b877892b59609deb08bcc9b0ea1c767
-
Filesize
116B
MD581c838fedad0ead4fd1d99d90748bca8
SHA1a790d66680ae2530f062583d6027db1961c43879
SHA256bfe2da7b2e0199b88bfaaefe19cff9b92182b2f9e0a480d07266a7ff1e10f690
SHA5129f1a756cd0f39432d1bcf07f6207f8c19821eff2e0bddfc7b7f878c9ca340cf3923921b8019ae7defc9bfb50cb3fac6aff546198826a0c77acbb03381509f2db