Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 16:01
Static task
static1
Behavioral task
behavioral1
Sample
14054c005497c4dd0335ecc5a8c3f1e2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
14054c005497c4dd0335ecc5a8c3f1e2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
14054c005497c4dd0335ecc5a8c3f1e2_JaffaCakes118.exe
-
Size
33KB
-
MD5
14054c005497c4dd0335ecc5a8c3f1e2
-
SHA1
a22ab5315217be24b00123c0d054cbcf98da20b5
-
SHA256
b9eaf38b83f065ad428fd3e31f8a41a13a6eeac6ecfb1c789ea6b3ccfb3e1a63
-
SHA512
e8a425e3b2b6f500855dcc1ae33237c1118f9f751c4fc549d7798c68b4711caa5584690f13d3bf5552230319d62981fd7281a7830ddca4ff6181ec37671a306a
-
SSDEEP
768:cslwGVFfiRx536uukAX/s7MInl11uVZnm4kH7W:cQVFfiRjqupAvs7MInZk84ka
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3540 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\svchost.exe" svchost.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\n2.ini 14054c005497c4dd0335ecc5a8c3f1e2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\n2.ini 14054c005497c4dd0335ecc5a8c3f1e2_JaffaCakes118.exe File created C:\Windows\SysWOW64\n.ini 14054c005497c4dd0335ecc5a8c3f1e2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\n.ini 14054c005497c4dd0335ecc5a8c3f1e2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\n2.ini svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe 14054c005497c4dd0335ecc5a8c3f1e2_JaffaCakes118.exe File opened for modification C:\Windows\svchost.exe 14054c005497c4dd0335ecc5a8c3f1e2_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14054c005497c4dd0335ecc5a8c3f1e2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ielowutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" svchost.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31135350" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31135350" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3200801314" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31135350" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000262c84e5c2a8b24db398d3ff1cc7357000000000020000000000106600000001000020000000997684116f172c0f07ff07e328b18060639f9c8de2dc68804b043f76ec6b5816000000000e80000000020000200000007fdf0f4b5e35be0866d3cd9abad89c32748872ee92d11653e7c1dca2166b8c5020000000b7ed6ef94803de2d4dc5e7dbd583016b62a4811114d77eb5b693f7596e31c954400000005a4174c7d1bd79df456f61902663a9adaa30f32f9d5ffac847cc4dc6090d2969f48972a3e25ddce810c7d078cd707f44fc3807935360bda324189bb192e5c14d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9091b5c37616db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434822663" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{EA4231A9-8269-11EF-8D5B-D60584CC4361} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3199707528" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 804cbac37616db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31135350" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3200801314" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000262c84e5c2a8b24db398d3ff1cc73570000000000200000000001066000000010000200000006ac899f6e22a0bd935cde44b444d8731a4ba5b163c5b1a78ef61b8c284d1165a000000000e80000000020000200000008019788ae84e7e7e9c78c583d4e687fce411a0d3bf3b301499343e6e03473c54200000004c22e1920f76703fa784d2c2f920acabf63beee8a1bd940ea778fdd2db1f2ba240000000e27886ba327e3e88de7cadefba5e04d76fee608b13cc80eb8d92545ac586c9dcb2f0745163d258db6d631925c13da20ce4b6d00c9a6e35d70636e189c6b884a2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3199707528" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3260 14054c005497c4dd0335ecc5a8c3f1e2_JaffaCakes118.exe 3260 14054c005497c4dd0335ecc5a8c3f1e2_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1860 iexplore.exe 1860 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1860 iexplore.exe 1860 iexplore.exe 4060 IEXPLORE.EXE 4060 IEXPLORE.EXE 1860 iexplore.exe 1860 iexplore.exe 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3260 wrote to memory of 3540 3260 14054c005497c4dd0335ecc5a8c3f1e2_JaffaCakes118.exe 84 PID 3260 wrote to memory of 3540 3260 14054c005497c4dd0335ecc5a8c3f1e2_JaffaCakes118.exe 84 PID 3260 wrote to memory of 3540 3260 14054c005497c4dd0335ecc5a8c3f1e2_JaffaCakes118.exe 84 PID 3260 wrote to memory of 4632 3260 14054c005497c4dd0335ecc5a8c3f1e2_JaffaCakes118.exe 85 PID 3260 wrote to memory of 4632 3260 14054c005497c4dd0335ecc5a8c3f1e2_JaffaCakes118.exe 85 PID 3260 wrote to memory of 4632 3260 14054c005497c4dd0335ecc5a8c3f1e2_JaffaCakes118.exe 85 PID 1860 wrote to memory of 4060 1860 iexplore.exe 89 PID 1860 wrote to memory of 4060 1860 iexplore.exe 89 PID 1860 wrote to memory of 4060 1860 iexplore.exe 89 PID 1860 wrote to memory of 2248 1860 iexplore.exe 90 PID 1860 wrote to memory of 2248 1860 iexplore.exe 90 PID 1860 wrote to memory of 2248 1860 iexplore.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\14054c005497c4dd0335ecc5a8c3f1e2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\14054c005497c4dd0335ecc5a8c3f1e2_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\svchost.exeC:\Windows\svchost.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
PID:3540
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat2⤵
- System Location Discovery: System Language Discovery
PID:4632
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:4572
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1860 CREDAT:17410 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4060
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1860 CREDAT:17414 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5db7c83e09ebc4317f2bf2df7f66b8513
SHA129d58ef43f72ce7cf79ce6109d038a6c9b4873f0
SHA2561ae4c8aa37bf433bc5b3b45e017c95bf843c7dbbe348c78c7ab6f3cad0fda4b8
SHA5126eb46ae0c3e091ba13b1c0e3fb6de568882940df7968d0e1297568ea5356a4691f2a869c7c9ac9e9642bcc2e4e1388d00b15c663276143e8cb5015ab89c27867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD57d4e77d77e712da5d8ca95ce27c2ea6d
SHA12fdd796257b972340a365cc6fef58ae2703038f0
SHA2560a05d0716df287c119227579748f5fcb423fefb45ac2a3a97c33a5f5d3e6fe06
SHA512dc227661ec0086953aed3a26617e78f456e5170239670fd6a87297e0ddf4f95aac839353354c62d44f6fbd819623faef1711f79a2b37b88031aa16ae22f278b9
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
260B
MD5aff00af40ddd7efb88fad968fc118013
SHA1027aedacf56d9c4ee54db9aee594403dd10d2436
SHA2560a6aabec1e7549aac05cdff7e6df7ac868dcfc279587d23bc216c0e86103d862
SHA51279e26ef5deb6faa4234e4f1c5de99c6b9d5dfb27a2e613c61bf5c8349b734d19c3fe53fec86e59fee076355b4be84abb6ec40c1c7b96b196294dee36ce5c8eb4
-
Filesize
20B
MD544aac816f3e097103ebe14a6f4a90852
SHA1ac33c4d946333ce1ef36673c61c1931410c057c1
SHA25683a26a1569bff2aa9969e717db71a6b60a13c3512cd365294b7f0e04e26e9de5
SHA51287187570f956ca03090dbc7431e7f4378de4e03f4f4984a7d453d0f9273e2a9472a1d0335d9b374a7a6a74f19072bd7398fe4a6aed46a940ecbf416ed1f1940c
-
Filesize
20B
MD565799aa53366ad6f54257eccb53cc051
SHA17118905027b23352b0b8c9133355ecbce2902ee3
SHA256c9379b158b4e29752b010ddf800ed21ee7251cc041f207b40dfeffe3030ef3f9
SHA5121170842be1759e8fcf1fc75696b63b7a12a68fa4c3ff53ba9e667281dd5c1bced01ce68353ee0401ab04cfa10350f47d63b451ad046386c0942d5562b84d5a04
-
Filesize
56B
MD53ae0085c48ab921004505c7db351312f
SHA129cba48e6476c7029e027c81d7ad49ff1f08cbb6
SHA256291a7969ad3106e6213df7e2ccda140a7a781c55c7105ada998a1aa6390da82b
SHA512a2faac330b8ab69c95afac9f57dbb7092ca1bf734c7cce7ab50c76dd2e7b31254a605e91ac59706db9f0716d520ea896cb192aed9497bfe428550d5b201d8aa2
-
Filesize
99B
MD5b3f7f39dd65771dc062faf7e02567321
SHA182d5b3985217a0f1792740eb14c4ce314b16a913
SHA2563f4b9626d09d854257de1d33361f97401da5a935f2ea336a8400a574b2d88edb
SHA512530431dd37d1733ae00bbd953eb250b68b8600a943f817e49bb60effa5c28db948b126aabedb74fbae758a16f36194e7e371e1d696a8d9ba4bf77bb871e0da4b
-
Filesize
33KB
MD514054c005497c4dd0335ecc5a8c3f1e2
SHA1a22ab5315217be24b00123c0d054cbcf98da20b5
SHA256b9eaf38b83f065ad428fd3e31f8a41a13a6eeac6ecfb1c789ea6b3ccfb3e1a63
SHA512e8a425e3b2b6f500855dcc1ae33237c1118f9f751c4fc549d7798c68b4711caa5584690f13d3bf5552230319d62981fd7281a7830ddca4ff6181ec37671a306a