Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 02:28
Static task
static1
Behavioral task
behavioral1
Sample
293362f526037dfe0e45c1ac99f555b7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
293362f526037dfe0e45c1ac99f555b7_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
293362f526037dfe0e45c1ac99f555b7_JaffaCakes118.exe
-
Size
185KB
-
MD5
293362f526037dfe0e45c1ac99f555b7
-
SHA1
cc6aa7eea0f72dc809658b9051eacdb8e090236a
-
SHA256
7e7acf66f5ed82dfaa5d31b6fc4adbb00a24d5e55300dc055725e9f61ee82b41
-
SHA512
6c1f7a22b790fc581838c506f1abbf12f8bb54303a885a85f4a84dad145cfb8f38e2b3da9e2f2789c3fab158c7a762c7db644890f06fa13ba17d0addc0ff57bd
-
SSDEEP
3072:uIUjmzOw92xh5Z91Bagq33+F2tu4GexNoNLZ95DawyP:wmzE51Bar+Fsu4GexqNb5Da
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3060 293362f526037dfe0e45c1ac99f555b7_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSSMSGS = "rundll32.exe wingxz32.rom,yhqAsSIlIaH" 293362f526037dfe0e45c1ac99f555b7_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\wingxz32.rom 293362f526037dfe0e45c1ac99f555b7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wingxz32.rom 293362f526037dfe0e45c1ac99f555b7_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2848 3060 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 293362f526037dfe0e45c1ac99f555b7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A281EBA1-8628-11EF-853E-4605CC5911A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434631326" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3060 wrote to memory of 1292 3060 293362f526037dfe0e45c1ac99f555b7_JaffaCakes118.exe 30 PID 3060 wrote to memory of 1292 3060 293362f526037dfe0e45c1ac99f555b7_JaffaCakes118.exe 30 PID 3060 wrote to memory of 1292 3060 293362f526037dfe0e45c1ac99f555b7_JaffaCakes118.exe 30 PID 3060 wrote to memory of 1292 3060 293362f526037dfe0e45c1ac99f555b7_JaffaCakes118.exe 30 PID 1292 wrote to memory of 2792 1292 cmd.exe 32 PID 1292 wrote to memory of 2792 1292 cmd.exe 32 PID 1292 wrote to memory of 2792 1292 cmd.exe 32 PID 1292 wrote to memory of 2792 1292 cmd.exe 32 PID 2792 wrote to memory of 2844 2792 iexplore.exe 33 PID 2792 wrote to memory of 2844 2792 iexplore.exe 33 PID 2792 wrote to memory of 2844 2792 iexplore.exe 33 PID 2792 wrote to memory of 2844 2792 iexplore.exe 33 PID 3060 wrote to memory of 2792 3060 293362f526037dfe0e45c1ac99f555b7_JaffaCakes118.exe 32 PID 3060 wrote to memory of 2792 3060 293362f526037dfe0e45c1ac99f555b7_JaffaCakes118.exe 32 PID 3060 wrote to memory of 2880 3060 293362f526037dfe0e45c1ac99f555b7_JaffaCakes118.exe 34 PID 3060 wrote to memory of 2880 3060 293362f526037dfe0e45c1ac99f555b7_JaffaCakes118.exe 34 PID 3060 wrote to memory of 2880 3060 293362f526037dfe0e45c1ac99f555b7_JaffaCakes118.exe 34 PID 3060 wrote to memory of 2880 3060 293362f526037dfe0e45c1ac99f555b7_JaffaCakes118.exe 34 PID 3060 wrote to memory of 2848 3060 293362f526037dfe0e45c1ac99f555b7_JaffaCakes118.exe 36 PID 3060 wrote to memory of 2848 3060 293362f526037dfe0e45c1ac99f555b7_JaffaCakes118.exe 36 PID 3060 wrote to memory of 2848 3060 293362f526037dfe0e45c1ac99f555b7_JaffaCakes118.exe 36 PID 3060 wrote to memory of 2848 3060 293362f526037dfe0e45c1ac99f555b7_JaffaCakes118.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\293362f526037dfe0e45c1ac99f555b7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\293362f526037dfe0e45c1ac99f555b7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2844
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ZxjA88F.bat"2⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 1602⤵
- Program crash
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5440f0b71fc90c97e236363845e397cdd
SHA1eefb39129d46408418b3e5cb18014cfd117e563d
SHA256257d486cd582f37db2d5ed66260ec2e8c0d296ebcabb0ea4a5b3b142f6f80063
SHA5120990e4d4f917cc33a8394ff0afdff8938f881fd94c328c9ff8d3a55d7232cba84153eac739f8e1c2881f02f939214008df5a656b6fed8f7216f1e38f3c723a61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8e84d8dfdca3cdcbfb2906fb7284e1a
SHA168977118e15099dc912fd92a5007cc4f1e0e96ce
SHA256d6437690a8abf15d41429a878178c2983b6f4363acd6ecd2e4c76b34782d9171
SHA512081659822d5728e1ffe5913bb4af4caad1d256fe6ba5d1edcb4cf3aca47d76c63052ea404d9f6d7485c5cd711b6708dc548099d4b2ba39682ea8ce189556cb25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ab076a04a14e7f24af7375938f6ca8b
SHA1d257684b968b3f0cf355db0bc15b05e3f01dc0e7
SHA2564c9aaff786777fc73e1da0d21ee4c3f7bf80af6822eef6cb36e315f1f919c1a0
SHA5123278dd606cc40104b86c43830a79dd3bb828cf5d622a2acb791958343700ac5d797b9c49353a041a685c1b17ee0cafdd5bc7456b8651b9e66e17bab60aba9ca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526a277b11cd9ae104446e54accbafab7
SHA181bcbc83ec71616b2cda1442bea1ce6358445cb3
SHA2565460c551eef81197910f8fb5f646b8c86b0ede0d9ba4489bb8a715ca50a6f97a
SHA51245573fc035e70dbf057fa2a5067ca56f86f1ac2d4adeb64c1b9c5543877515568d2e1fb0f4f5f1cbcb3be5aa6c432d47f0f16385c39788fc1ce2c3ce8543811c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557e311184638e9afa5193bd554544698
SHA1ae28e39d4b6132208f288e4a2c5181c3e083f57f
SHA25673800295817c8e27085f66ddb385d431c409ef2ee26538767bc9bd7df3ed00aa
SHA5124287110eb38777d79310e207f50f32ce9fe1f4f3957e4f2b435d89323f4bb120863d52aaf5a399c48eb422387e0e6310ad5e3c6f21531811745cae1cc7e1faaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa0258ff6beb4a4587f02e7ac308571d
SHA1f60ffd56d291a455164db8422d7950cb44a1ebce
SHA256f2280d96c3cca955ef241534da0d7bb77555f061dbfd69823aeb95372de14215
SHA512b9ebc41abbbbc5c52a5009b53a874873f58a59daadbef8a1f2a150c4b12098e5a3b526ce1da80480ceda72972183f5f14a989df6127984168a093de52517e0fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1e6f775bd16ce90b2d665627475aee2
SHA1b146e7924304911e62ff279f8e5d47906e36658d
SHA256ddf82eb9d88a5be6713adb0218362caba598b8bfac1f24e55d48411eac610be2
SHA51208f3cc0425c06bc3e9627e0323402c2bdde06903cbb9a5bca417a0e75d16586c0dbf7865f31671c0d3197aa868e8753e20e5bc02c258baf59f2e42129c7d5fce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb5fa08fa2c1b42542d86e7ce8f6fb60
SHA1d4d690a583f94a944217b95ed233b92bb52ad252
SHA2567dbdb5325d06e373f5edcae9bf1d904331847433c95d10823cc8cf2b2fa66059
SHA51214969cd76d3d8d4abc2ae99f84d9a9e8cfcfb18832bc518037ab6d36324a01083759988401385e37bf5d34bdc4171627516b501d7fd14ac9b6724cdc749ddd48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53630684b875fc88dd091eb63e9657bda
SHA117c3ca11bae116c5f80b6e1461dc0c8844fa68db
SHA256e7310aebfa8331f279e61f00675ad5f6478791cb828d7eeffd770bf617d28c64
SHA512bc3dc7a62b5ca9ad9bfbb92e809a8741853a2f031101984d431e95261d10d990ca2b79ba8a8b0d48eee82defa68c1d666b5ef1ea8be90de5ba817e4123c8864d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
188B
MD50efa263edec33cf8d0e99eda7ac03c82
SHA1722be37fc36531c19be5ea8dcb3c1d6d11657f24
SHA2568766dea52969c3426b38a05a3a97049997a47071110c53b81d824e878981bbf5
SHA512ab86940da5c5d2e288998cdd2fdf89efcc7cf35b558a9e183d778e12484589ad91ae233dd588eb28005e15b603919ea3625613f37e7f0383ae6fe7ed02f31a25
-
Filesize
71KB
MD510c19e6419a73b41a195a0eaf9eb836a
SHA18df8d0324fdfaa4226316aa4dad85c68f187c39e
SHA256915d9a8aa645e5ec8fa101235dd230b01eaee2a435ed8af817dfc79c8e36d60d
SHA512253f20f43d35f767615726faaf65f42409b7ce3d0d00a3ac5dcf4f69a50c7eb31c9628280700bafb7c4b4961990e728896ca3316b43a9dc0efd26461be0a3080