Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 23:27
Static task
static1
Behavioral task
behavioral1
Sample
27063d31ca0b157046a84a82512d468a_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
27063d31ca0b157046a84a82512d468a_JaffaCakes118.exe
-
Size
87KB
-
MD5
27063d31ca0b157046a84a82512d468a
-
SHA1
cdcb21b5d7fabe554cb428ce3d1cdf95c1c4ce1d
-
SHA256
92d03291a707c683879a3872f40d80e49c0c4d94b4b1087f2ed9244d02467b90
-
SHA512
ac1d798f2f46e6c748860d9b96c5496aaa62004b1a60108a78310ceded1eb9b7cac1f45cbb7a107be5d7a245b14df6a7e35a7c6e42d72ff3922d77d05ba60e2b
-
SSDEEP
768:Uv84kAhFE1LxByuEhzvBh5MKnNjxxA4w+jYiiqvXt2w+vSZawsPS82jN0dzAHID:UDkAwGhzZh2UXYmvdRmSZad2jN0RA
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/340-3-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/340-6-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/340-12-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/340-8-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/340-5-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/340-2-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/340-1-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/340-0-0x0000000000400000-0x000000000041A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27063d31ca0b157046a84a82512d468a_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434616049" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{125E2161-8605-11EF-97EC-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 340 27063d31ca0b157046a84a82512d468a_JaffaCakes118.exe 340 27063d31ca0b157046a84a82512d468a_JaffaCakes118.exe 340 27063d31ca0b157046a84a82512d468a_JaffaCakes118.exe 340 27063d31ca0b157046a84a82512d468a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 340 27063d31ca0b157046a84a82512d468a_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2568 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2568 iexplore.exe 2568 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 340 27063d31ca0b157046a84a82512d468a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 340 wrote to memory of 2568 340 27063d31ca0b157046a84a82512d468a_JaffaCakes118.exe 30 PID 340 wrote to memory of 2568 340 27063d31ca0b157046a84a82512d468a_JaffaCakes118.exe 30 PID 340 wrote to memory of 2568 340 27063d31ca0b157046a84a82512d468a_JaffaCakes118.exe 30 PID 340 wrote to memory of 2568 340 27063d31ca0b157046a84a82512d468a_JaffaCakes118.exe 30 PID 2568 wrote to memory of 2500 2568 iexplore.exe 31 PID 2568 wrote to memory of 2500 2568 iexplore.exe 31 PID 2568 wrote to memory of 2500 2568 iexplore.exe 31 PID 2568 wrote to memory of 2500 2568 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\27063d31ca0b157046a84a82512d468a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\27063d31ca0b157046a84a82512d468a_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2568 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5931b53d9c554de10c3f73771901e5629
SHA1cb3d16c8a61b248a597279de9c0fee16207b95a9
SHA25663cadf5da73c4c30be2427f8c95570f2565da99d47c7448fb8c6df0fac477d81
SHA512eb83d9539e0fd5d3954cf817655b25dc2ac1e2c8a3932e103b14af6399d5d56164a1166a7524731ed702a2bedf23ef45321e2c38dfbfba4bf4a15c416dc19edf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b68893fb7711df24d3fb72280d8aca8
SHA1873a488a6d2f4b8c2f843d2342560203f0f6eb73
SHA25625ceaf40513f10c202b04b6cbd928ccc2cc53ce4132e9c7840f067115f613747
SHA512cd01950bf20b5d33c906902b358d3cecfd2963dc33b4e820d6d7f44f3f25bd1a81eb4a7f8e12568f9718971d922103f073392dbc8d6e5be44b50e54a5a0a5b50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50898346d65e9c4a138d00f5e322614b2
SHA118cb8817781f5cf9515107c3eaa772863841c165
SHA2562f0277624370e3c025087a0099e08ace9b78a9f42f5302b7398549d2e4d1677e
SHA512f41373a89711a54f2c171a7e018f8e49c125698dfc9db0e50ddb0b1e8533cd0b1742855b3e4171295dfe1845cb54e75f6b143894fe560b78a603aef92248aec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaf0d61b920b14f80e91096befa21dab
SHA1cd427de452af6c4b8a72cccd0030ada5279a589d
SHA25622986dc498b928cd5d6597da4ed043d46bd23c690b47b8a63a2dc22c288a910e
SHA512d7e48eab44e930d14098033acd1319f7e0a32df3d710a9dfcf04aaaafdbbc45e4cb684dd0fc9e71cfa268e14b66ae3ca7275e2c035c365645467e3a81eaaaa92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539fe58156216929a856069f982ea9aa5
SHA1498739c413f0e49340c379c4e2c885bae1460f33
SHA25601151fec12628029b9e4a31a9f55941dee57a6674fdc38bf480098189eb371b0
SHA512ca10d3649fe4c2118613b41fa128de9481edf9993a882700216ca9d992f74bf2afb7b0a3af0b9dda50e3be5898386bd57b841d34084fec1fec613e5a0c3e911c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528fb8ca14cef56c64c183c1a01c0cfae
SHA1aefe60b1ec1c3b7c55596ac0d629e8a4626b9d8b
SHA25621abccb3acf7110b929723f50ca93a000da900b325d52026b7f2c3bb203259f6
SHA512a05c7f50794fa11ac2a517d44a20fe99bc1c8bc5996501ded72ba4ee9dddf7b207dbd13c80e603f78cb7275d4ba6a4ecddf54a23a4e2978ffa9c9c70a7ff62a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528c55732a24b509c9cadc0af4fa392d4
SHA16be311e1e42136750e1fd85260494cf4ed53a9fb
SHA256e57bec70b980cefc0f89e175f24b891b61b7585d24d5025d5efc1823b18b0f2b
SHA5123b0f88e31e09890a195040d420d527137a2c2f9bcbe35293b1e14ba722051e17a4a0b090a9fbda7e13970ed46ce828a942f48dbf8146b66e9464a201ad6c5b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5340baf9658e8f66c616a9fcb5c3afa55
SHA16c2f8ba3124b693b90c974513b2eace0e6592cf0
SHA256653426e91ef23531f121cc7f1f18af887e4a16ba5a110ed7a35d78fc61967a3d
SHA51204fa96d3bb572d1ed41e19dfd0d7a68ef9d9ae4afa5c21e2ca96d962eea3bb2827027af4f34b597e787e00cf4e3f4c7b593c44faca9adbbd0e07bf34c9ed3eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f08b87c994cfcf16e09c94177d626166
SHA1160ba78f03c3b14ae8c7643a1c3aa0af5251efca
SHA256bbb9ae41cc694859ffb9d1c09d7cba33b7cc4359a7ecd645051f68257b8368da
SHA5122e441d265d39c7038aa69e517d6228dfd81e902b393a827350aa38d56e9483e4b9d2606584af204654361d880360f8b1bf6e8892fcaf61589db90ec16a22b390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52af188bcd4ebbcb425e1b23256a04583
SHA1ea4f829e14ec2224fbeda8778bc9f67708076f4b
SHA256d6e44e773a883b1500f1e91f7e178d1057607e37d94c5a3b273317d1a75f8a35
SHA512bf8a44a4afb9a7011420cf4fd9275aec1bb4333a6f91702a5d111805066b1080db8f38a0803d09e0ad39a5d0eb46a22d46ccd2cf5c2ca2299b40f024cae906c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5045a8f0d36682e97719353c03d717bcf
SHA1ce65f63b397c87470c0c9a84e0754e151e6ed613
SHA256dea65f8e0af78f89c1e63f93bbc1e2fac45ea31c4469d97a479e88745c47b66f
SHA51262cb7bd9ce1261a999f5db9bc43510c0fe16f784d5c094e51061d6d94ef0393beb93f60199a21aa4b32b253515e6b36465456e734c5fdf8c4dc5b83bab0691a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0d44c568f8846d2538cdca910fd2da5
SHA1ef9ba67a308cb34890dc3c3a1918519257a22212
SHA2568a019101ca6c6755f5f6139587c965374a60b90bee35951750128381e8ad3c94
SHA512b5ad2b5e02bb1aafdd91963a1228e9638c45eed78959089e92382565183c2a54b725b12045973a3f6b140bfe878f7c713e1f87b9e38ff89fb4ff97a980fbe32f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57df28cf7478bb848f19597d4cffdb556
SHA170d9a156b943ca8a96122d731bc9fbe34c782eb2
SHA2566e65c6293f3a7393916cbe6a8a712b5f51ce477ac3ec5ecdb6a035fd4e904509
SHA51281ce054bba6e9b1fa679d6057b8ecca894852aa4f954077aaefbba0fd9cc9c7557e4b3434edf80a0ff8fc3c8bc38df75cb9f915b631b0b5ef9b94e8f6a9c1f72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5261a1b245aae0a37be760c226fd778d4
SHA14ef194f62c9f14ff925e4902cb28db93290bc20e
SHA256cc8ca10f4ba08ddf89e36d52b7b39d2e0877cbd21d3a18fb784aa358752d189b
SHA5125029e167f9f1fd33a3a429df7f98c9b3aa1e08a51dd68b99e99cf54470e942d73948a7a9f403496dc7909183d1c065d989a5cd0a740e27d8039c38f46ca6b83f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55341f380e64451d3dea5b42e8b6e8efe
SHA12f9b2a3c38b91e52fe131a82009c0ffe48ff1e21
SHA256737cc2715e2293246e8f12d681aafcae06b936379b6d005d2945ff0f0f605e27
SHA51212c1b7051d267c460a49e1b7a882dae3a8a96b62f5549db6d9c612a82c30f344cb8642143711ea5e2dd232e5a916580575033acfbd27d1d590f14fb4748677f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5919987d2555c1e90afe80303c7ad5e4a
SHA16ad8fec6c2be5942a541db10bf49210c8b2cef87
SHA256c286b7098cddc61abcc5e5ec92b199d9bd78981534b8693558cdc933a0e8c224
SHA512385df77e8359f3c74dd77929c9c81da350de24d92dec6c3eca6d8f8650667acef8267f2bbb63f5b2d41a87d646a87b48e4b2055b8a6e1d500851b54d9573447c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d3216ab708923c0d56f892dfde21257
SHA1831659b9d744829cc2cfa7176ffbbc5a65a098fa
SHA2568794c664ddf8c91b699caf28aa4211209bc5049d0508938e68ffce17659d942b
SHA512e28045c4278f5577c70ed1ef34ad2f0cdaca1f3298de83e54641cc4960dda21a91c117afb67ecbff19daabd28cc4b0faace95157fb2d8692848fa0b212e98a36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0cfa96af0dbd374f6c65ae825ec3f9a
SHA113043b6f79b740b136188b2d08770aeefcd3d388
SHA25665c0b184653ae4bf68c15bc32fccf4790263198fb61f6681c2392144d972d455
SHA5128c8eb0422ae11a7dd46f82a47cec3296a671303a520ccc7efd5324c83a3480bcbec13645f9fffcbfac800917e637b3c3c45c1565f20da76afe30bcc587e44d07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cf55a86a6de999f878607de2b2bd26b
SHA1774c10b1bace5f7e5fdff15096d8feee4f6e1690
SHA2567ee83fd50bfc5e0cf80c83dcd1e75da1aebd9f5d7bbcebc6857c3bdb92bb10d5
SHA512b08de05df0bf3e7a42c1c75300bf09d478890041235e3f455009711fc0c79a1d48961fdb1fb16901ca3656b9ac4bfdee9cae48311d46d42dc75ab49248273931
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b