Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 19:57
Static task
static1
Behavioral task
behavioral1
Sample
0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe
-
Size
191KB
-
MD5
0c418c323d3add04390e99d2d52fd0dd
-
SHA1
a360e2dbcb12476d7403ec2b05835b55e63f98f6
-
SHA256
e4773f9190b39e602e586b626ae754dbfc4ba5461dbc2bbdee8a96b8165929ee
-
SHA512
8f4151432a31cea2e79252f527a0df316bc35bd57ce4536b7a536e1ea72bce678ad890e48ecdb488fc9347ff960b6636d197e5cce41a9d9907e1a25e97ff4c98
-
SSDEEP
3072:y1Xm4k5B7JLUxukQqt0361QyXW0koIPWgihWqg8lI1yXSz9oil:Emj7NA+qjlI16Sz9oil
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1808 Shell32Shield.exe 2104 Shell32Shield.exe 2080 Shell32Update.exe 1552 Shell32Update.exe -
Loads dropped DLL 11 IoCs
pid Process 2128 0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe 2128 0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe 1808 Shell32Shield.exe 2104 Shell32Shield.exe 2080 Shell32Update.exe 2080 Shell32Update.exe 2080 Shell32Update.exe 2080 Shell32Update.exe 1552 Shell32Update.exe 1552 Shell32Update.exe 1552 Shell32Update.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\UpdateFirewall32 = "C:\\Users\\Admin\\AppData\\Roaming\\Shell32Shield.exe" Shell32Shield.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\n: Shell32Update.exe File opened (read-only) \??\p: Shell32Update.exe File opened (read-only) \??\s: Shell32Update.exe File opened (read-only) \??\x: Shell32Update.exe File opened (read-only) \??\i: Shell32Update.exe File opened (read-only) \??\k: Shell32Update.exe File opened (read-only) \??\m: Shell32Update.exe File opened (read-only) \??\v: Shell32Update.exe File opened (read-only) \??\w: Shell32Update.exe File opened (read-only) \??\a: Shell32Update.exe File opened (read-only) \??\l: Shell32Update.exe File opened (read-only) \??\t: Shell32Update.exe File opened (read-only) \??\o: Shell32Update.exe File opened (read-only) \??\r: Shell32Update.exe File opened (read-only) \??\b: Shell32Update.exe File opened (read-only) \??\g: Shell32Update.exe File opened (read-only) \??\j: Shell32Update.exe File opened (read-only) \??\u: Shell32Update.exe File opened (read-only) \??\y: Shell32Update.exe File opened (read-only) \??\z: Shell32Update.exe File opened (read-only) \??\e: Shell32Update.exe File opened (read-only) \??\h: Shell32Update.exe File opened (read-only) \??\q: Shell32Update.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2296 set thread context of 2128 2296 0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe 30 PID 1808 set thread context of 2104 1808 Shell32Shield.exe 33 PID 2080 set thread context of 1552 2080 Shell32Update.exe 35 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Shell32Shield.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Shell32Shield.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Shell32Update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Shell32Update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main 0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main Shell32Shield.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main Shell32Update.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2296 0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe 2128 0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe 2128 0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe 2128 0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe 1808 Shell32Shield.exe 2104 Shell32Shield.exe 2104 Shell32Shield.exe 2104 Shell32Shield.exe 2080 Shell32Update.exe 1552 Shell32Update.exe 1552 Shell32Update.exe 1552 Shell32Update.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2128 2296 0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2128 2296 0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2128 2296 0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2128 2296 0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2128 2296 0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2128 2296 0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2128 2296 0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2128 2296 0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2128 2296 0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe 30 PID 2128 wrote to memory of 1808 2128 0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe 32 PID 2128 wrote to memory of 1808 2128 0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe 32 PID 2128 wrote to memory of 1808 2128 0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe 32 PID 2128 wrote to memory of 1808 2128 0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe 32 PID 1808 wrote to memory of 2104 1808 Shell32Shield.exe 33 PID 1808 wrote to memory of 2104 1808 Shell32Shield.exe 33 PID 1808 wrote to memory of 2104 1808 Shell32Shield.exe 33 PID 1808 wrote to memory of 2104 1808 Shell32Shield.exe 33 PID 1808 wrote to memory of 2104 1808 Shell32Shield.exe 33 PID 1808 wrote to memory of 2104 1808 Shell32Shield.exe 33 PID 1808 wrote to memory of 2104 1808 Shell32Shield.exe 33 PID 1808 wrote to memory of 2104 1808 Shell32Shield.exe 33 PID 1808 wrote to memory of 2104 1808 Shell32Shield.exe 33 PID 2104 wrote to memory of 2080 2104 Shell32Shield.exe 34 PID 2104 wrote to memory of 2080 2104 Shell32Shield.exe 34 PID 2104 wrote to memory of 2080 2104 Shell32Shield.exe 34 PID 2104 wrote to memory of 2080 2104 Shell32Shield.exe 34 PID 2104 wrote to memory of 2080 2104 Shell32Shield.exe 34 PID 2104 wrote to memory of 2080 2104 Shell32Shield.exe 34 PID 2104 wrote to memory of 2080 2104 Shell32Shield.exe 34 PID 2080 wrote to memory of 1552 2080 Shell32Update.exe 35 PID 2080 wrote to memory of 1552 2080 Shell32Update.exe 35 PID 2080 wrote to memory of 1552 2080 Shell32Update.exe 35 PID 2080 wrote to memory of 1552 2080 Shell32Update.exe 35 PID 2080 wrote to memory of 1552 2080 Shell32Update.exe 35 PID 2080 wrote to memory of 1552 2080 Shell32Update.exe 35 PID 2080 wrote to memory of 1552 2080 Shell32Update.exe 35 PID 2080 wrote to memory of 1552 2080 Shell32Update.exe 35 PID 2080 wrote to memory of 1552 2080 Shell32Update.exe 35 PID 2080 wrote to memory of 1552 2080 Shell32Update.exe 35 PID 2080 wrote to memory of 1552 2080 Shell32Update.exe 35 PID 2080 wrote to memory of 1552 2080 Shell32Update.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\0c418c323d3add04390e99d2d52fd0dd_JaffaCakes118.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Roaming\Shell32Shield.exeC:\Users\Admin\AppData\Roaming\Shell32Shield.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Roaming\Shell32Shield.exeC:\Users\Admin\AppData\Roaming\Shell32Shield.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Roaming\Shell32Update.exeC:\Users\Admin\AppData\Roaming\Shell32Update.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Roaming\Shell32Update.exeC:\Users\Admin\AppData\Roaming\Shell32Update.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1552
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4RXRX1VH\NewErrorPageTemplate[1]
Filesize1KB
MD5cdf81e591d9cbfb47a7f97a2bcdb70b9
SHA18f12010dfaacdecad77b70a3e781c707cf328496
SHA256204d95c6fb161368c795bb63e538fe0b11f9e406494bb5758b3b0d60c5f651bd
SHA512977dcc2c6488acaf0e5970cef1a7a72c9f9dc6bb82da54f057e0853c8e939e4ab01b163eb7a5058e093a8bc44ecad9d06880fdc883e67e28ac67fee4d070a4cc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\J7FHNNOW\dnserrordiagoff[1]
Filesize1KB
MD547f581b112d58eda23ea8b2e08cf0ff0
SHA16ec1df5eaec1439573aef0fb96dabfc953305e5b
SHA256b1c947d00db5fce43314c56c663dbeae0ffa13407c9c16225c17ccefc3afa928
SHA512187383eef3d646091e9f68eff680a11c7947b3d9b54a78cc6de4a04629d7037e9c97673ac054a6f1cf591235c110ca181a6b69ecba0e5032168f56f4486fff92
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\J7FHNNOW\errorPageStrings[2]
Filesize2KB
MD5e3e4a98353f119b80b323302f26b78fa
SHA120ee35a370cdd3a8a7d04b506410300fd0a6a864
SHA2569466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66
SHA512d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OX8Z8GR5\httpErrorPagesScripts[1]
Filesize8KB
MD53f57b781cb3ef114dd0b665151571b7b
SHA1ce6a63f996df3a1cccb81720e21204b825e0238c
SHA25646e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad
SHA5128cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa
-
Filesize
2KB
MD58bfcf44eb468bd8d016c0a378f5ce3b6
SHA111afc64a4248bf6856fc4f8481d6b62f50f86143
SHA25604aa3b55acb1d205869dda64310cd684169666980c1fc4f41d7364ee58a7f973
SHA5123e445d11ba096b13fca27dd4a7cd620eff4a31f90163f91002128baf96ad95bf58f4dd7143ca59789701aacc55fd9d68400e6bff350e1781696cdf0a95754ea8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3434294380-2554721341-1919518612-1000\699c4b9cdebca7aaea5193cae8a50098_d9071d2c-e5ad-4187-a976-30114bb93bf6
Filesize50B
MD55b63d4dd8c04c88c0e30e494ec6a609a
SHA1884d5a8bdc25fe794dc22ef9518009dcf0069d09
SHA2564d93c22555b3169e5c13716ca59b8b22892c69b3025aea841afe5259698102fd
SHA51215ff8551ac6b9de978050569bcdc26f44dfc06a0eaf445ac70fd45453a21bdafa3e4c8b4857d6a1c3226f4102a639682bdfb71d7b255062fb81a51c9126896cb
-
Filesize
191KB
MD50c418c323d3add04390e99d2d52fd0dd
SHA1a360e2dbcb12476d7403ec2b05835b55e63f98f6
SHA256e4773f9190b39e602e586b626ae754dbfc4ba5461dbc2bbdee8a96b8165929ee
SHA5128f4151432a31cea2e79252f527a0df316bc35bd57ce4536b7a536e1ea72bce678ad890e48ecdb488fc9347ff960b6636d197e5cce41a9d9907e1a25e97ff4c98