Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 10:47
Static task
static1
Behavioral task
behavioral1
Sample
2fc114234f6946bb788b7c218b57190c_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2fc114234f6946bb788b7c218b57190c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2fc114234f6946bb788b7c218b57190c_JaffaCakes118.exe
-
Size
464KB
-
MD5
2fc114234f6946bb788b7c218b57190c
-
SHA1
85af3d3387074587c6f24285898811a57839ccd8
-
SHA256
ab0e16ea0715ddb2578927e98d8e985485e1939fb3374a1d81950881d1c1095d
-
SHA512
2d829f2d1b245459ec6eb145a3928b12e8c6442b9256ba0ab87f4228074a3af7b451c46e3561de9d15eac1f14d46ec26438d12baa7f9c7aab6974eb31d27ff6d
-
SSDEEP
6144:+x6iVRLGDZLdHbTLvSAuYC27NkoTD/Eyf/To1ysI5uw7+WJz6lyqp3U+iyPmyQCl:8F6v73qbL2vnTowJ6Vh+yPQhrfcFT
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2fc114234f6946bb788b7c218b57190c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 001017a1a91adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434681214" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000482abc9dd8608acd127795ce1b751bfc7182ff568972f9f51f8039c1f19fce76000000000e8000000002000020000000a01721e42f73c51a4156b7dba0db2fa933b55496f32e881833b287d07b244dac20000000674e702c0b2c263444e8a734ec4d108b37ce080b68dd29d6eb1c0e6166038a46400000003fb2fe3cf9299fbd75b9729a397f5a3d602b83f9ec2b4bf21dfe6aafc5c6f1689bc6ddb85ac704f64e0284f302ffd540d3a1e36f68820c0b18c36716211c4002 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC5C4551-869C-11EF-A9B2-6AA32409C124} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1484 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1484 iexplore.exe 1484 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1484 2300 2fc114234f6946bb788b7c218b57190c_JaffaCakes118.exe 30 PID 2300 wrote to memory of 1484 2300 2fc114234f6946bb788b7c218b57190c_JaffaCakes118.exe 30 PID 2300 wrote to memory of 1484 2300 2fc114234f6946bb788b7c218b57190c_JaffaCakes118.exe 30 PID 2300 wrote to memory of 1484 2300 2fc114234f6946bb788b7c218b57190c_JaffaCakes118.exe 30 PID 1484 wrote to memory of 2368 1484 iexplore.exe 31 PID 1484 wrote to memory of 2368 1484 iexplore.exe 31 PID 1484 wrote to memory of 2368 1484 iexplore.exe 31 PID 1484 wrote to memory of 2368 1484 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fc114234f6946bb788b7c218b57190c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2fc114234f6946bb788b7c218b57190c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.cbsupermarket.com/money & employment/management/money-budget-debt-wealth.htm2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1484 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537c2accad5bc2364f18b6919ea12cdce
SHA1fd572fba62f454a100af355edeb63df0e88e7832
SHA25680ad107fbc4f51e26ebdd88dd3f7e685ca0b19f5857db656418eec877c29a544
SHA5124818e59b1cab571ef87aec0aea0374222696fb5a435fd00a667e044a1c7d137a352fbd7d220351be2e25d21fe60b55333265223e22826e43b623fead94c1d982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e29e5763a5b3e29262ad78b5549f2773
SHA1b848965c3ab343f7f40c85cc3624c19ee07b8792
SHA2569ddabcf24cc64f7e89627955bef8d49d6dae6c61332046f65387672e6cf16676
SHA51278a08291c33acdf46e2e8c63ea7de4faa6bd2fcb26a5305fdbf9dad589097fe22a3c146bcd19fc54c879729bda8ec5a2ccb40c715d72f18871d6f5e8f1594eb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eeb636843845c2d6b4fda61f43bf4a0
SHA1a77d86666bdef79c8a7c8647eb69508bb12eb207
SHA256b0494acd2ee43868373dd8885910f36a49a48466b0f0fb0c5be4b70cb069a378
SHA512f46c8584adb3eec432b2f71752158ca6b4801e061e25b0fc8dafad619fb20c790dff089e3338a4e5480d59ce947b5fc2d163a0b7d6d8fdc074320a575634866b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593c5e6a90ba8886457b4d830aa2a57f2
SHA108bde798c6759cec475514a0035f9e4a720fbaad
SHA256e0f7def98c7ec7bc55729670881b4130607f18c7796e6c19fa620b62a6b35886
SHA512099088c980a0123cef1a8f47d6674597ab1488ea70576e3428666ca6bf3c5acc4c646f6c9147556a03fe4a3ac063963943b5744c119f248e9887e5e851bb6f89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533d18b5c25c751e667e5f9021543eae7
SHA1fc8e9d5c0d09ee91d518e8568d01440e1651573a
SHA256947672f4c3c18308ab522d9341accc06d49d2619fd1c8335fd7ae25a2d73a28e
SHA5121a58d6c6d4c973ca779b15024490729ee8f58958b0c26e6159bac49f3d60bcb8967b92c9289f6a7db73dc2769d89c8c40db3efbe343b1abdf94db1d222f80d67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578a574ac87bb296fc91ad8650bba89f0
SHA108588b70d8e67100c5966042ad3fc25a6edfcce3
SHA256ce5e8c7b7f30e190a388a60d1d7d7762349afe0a7fe8a3361d884adc1d34d1c3
SHA512a9bc8dfe38717099e352f9659b52502e19a2cf2f1e494874bb806a5c163f1430adbd9f1009d8ef5fd4a0579af6837d676cc8b474af028183d07691db660c0bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58663975443e6de51f46a0aa7bc2e9113
SHA1d2dabfa5d7f41b3cbca2961831a2f29f3ab2981d
SHA256f4f86ca7a68ee865de01b40d58605af9d8faa4216509d21449a24e3c09489e35
SHA512c39ce5fa3271ae919cea14d36caf3f21f5444e0b112dfd34e9e922dbfc01bf3a1bc887b54a21c407ceb4be7b0219491b8d95b75d9c3f7cccac213db46d90b826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad2e65848b16edc5d7f6cde009a774a5
SHA157545a87543775c9d843cca225c51e8732acdc35
SHA256d07d9d1d5b64c9b571a39c912a3c4c62faaf33416b2d5cfb3960c9a3670d4e22
SHA512346ee3953e3eefb2d3015581864fc610f730d639db6a42778e30d28aad791d7788afab07b28f81b53ceb8ff41409524eb028ee5b8b0ffc69205e6742eaaad159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510dd37c056fde26459024a7151bd7180
SHA1d64c83346f8187531359b391339de9de6daee785
SHA2561197fe0cb6213567bb94b015ef3a4c77a6375c998ed766da63288d5e25588494
SHA5124b7a1db7211f1a7d35f38fd87f562458d1cdd49fd6d684209effff2b824af7783ca3410cb11a31362d8bd55151df7c31bab690ba953b8a7fb38414c438f66652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e85fd3d5176a13758fddf0f01301f665
SHA110ee2cb2d21b94ee8789dbd5613cf2a7c3202c35
SHA256f9d0d3a285b5ff0cc23435fc41100702592c3d53840cc874ee121330b851d133
SHA512f914213d92e9b32499fced403433b6a6bd2c81b595e8fc25bd4e11b16d4a64f855a349a419e92b82b96342b1d5c5529c513541c659d6b7c261a86f384922b5f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b286698f82f7168b8e124419b865ae40
SHA1646ab4423ce95242949d11fe98977e3ef166a843
SHA256706c41cb9fc016c357899e9841f350a5a98315d9446f4f16f4f547dcbcbe3cf6
SHA512bb80685c3f38e89e329eb737152b6370cc0f88e1e0a05c92b025d09195cadb71cf160141adcebe6da3b067fbbbec9280c6239e5b80e36ed56a1acff486475c2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bdebb7098429b35515bc0cf47e83bfa
SHA17e56848d705a908507f39deee113e805c9250646
SHA2564e1eaaf7d32c380297762da1211713bd4b0ac4d28d357fddf6e6cc27e441634f
SHA5121918bf24eaa29580e8cfedc4198ab2a2973dd5488201e2372dddb227de17b724f46b8a3470966e0e78261c93e636db6daf6873b43e7f7e1b83530327aa64b24b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520efea8b72f4e7fd3518e6b4473bb9b9
SHA1b725b4d4f1def3e6dee81e71120b0e858d5d18a2
SHA256780475bc4583c025662d89f69146c9197d5989f29e28c5000024918440e0ce0d
SHA5123d7259a39883ccb74281ea15a3f0e393daba6c6f199010e198aaa2595441aee313e89ef2eca893da3860d0e4109691f661bf26ef42cdf5caa09832e07f061928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550959913626dabead3ef94a8c18bcfed
SHA1240db371f76b1aae27df095c9ccac8364a4ab146
SHA256018ab15759cf8a3ddc50f0f883151ed72a6da32d6ac4d084e71a8d7884745cbe
SHA512f6c48c550f1e516401d2c738bcda96668593eebe32942de0bd38153f778b2306e954c12cb69809630a9f75f50414e59c7736b5928801c74e9c9117f28a2a1c15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7072bfff047b20b99faa54da382fef9
SHA1eda2d466e69fcf1808afe77ede4ba47011b5da1d
SHA256a88cf8454bc21dd17665cc6628485d67eb50249cd978d49f86eabe078b00f5f0
SHA5121b8bd6c5e19e87384fcdae5f769cf24db54274ced3e80356560eac0e130ade1350827b15348f28293f78ce8d58aa40ab703e5e95e51785f2f0a1d4f4e39ce0d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdc3c198f7e0ac6eaddb207061d83d52
SHA1d2337a5cab09b6daff9fd79d0830fc694528d903
SHA256a54c7162dd55d50812ab9b11e2c7f5aa82cc7e122c76e9460d6bbd5ecb267a39
SHA512ee1dc7db027a0f8f33f073a0d76941c7879316ba6a2f7ea1b005519e4dd41e0e243293d68c71469b7c95276bfa985182f40f38600c9546bb2ccb77dfeb3f293a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5789c6a25751606806bfc53063775943c
SHA11bde990163896ad5db05400f378d0b00d6d0f6aa
SHA256162c0b9b1b2a9b93dfe0fbf02263204e1a3d776052db6c437a1ab354caf5deba
SHA51265eb2b55fc8612e2bdfacbdbfe1d091b45a9546b6d6ceb427b21976f3c147f35cf3ab8bc2a52f61de472c26a81de4b9155869cd3102bc6755cee3c3ec59113af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b328d99144f49f71601011a7043d053d
SHA169ac41403e542e5ee455497e3f7a6f10f4f75924
SHA2560e6f135e91181dde2e14060be5b3f01a466928239cfbc84a01f2c26f859baaea
SHA512959ca0b7ce22dec1c38936b45f09d9ad239668c8a090478e7609e8af0a56723149f423a29153eec2cbc8b5877c25934d8e9cd29503333401895439e893276c64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568a63101cc609567943fbb2193f2ad9c
SHA157f5faa3b68d82d21e5369eb3b86e98b10401ef1
SHA256cf20a6e02582a3e51c1ac80346c8d49d8a86bc97de9a473c17ad025a947dca32
SHA51240f8f2cea958ba69b40211f0eccf34b4742317ba872901c1b314b61f61d595013abfe33db6c25c1c958a964447f0bba8a37baaf5fd36c61afd6820173c143a90
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b