Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 14:06
Static task
static1
Behavioral task
behavioral1
Sample
304144c3551d3a09fd96ecbd3a60d72d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
304144c3551d3a09fd96ecbd3a60d72d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
304144c3551d3a09fd96ecbd3a60d72d_JaffaCakes118.exe
-
Size
936KB
-
MD5
304144c3551d3a09fd96ecbd3a60d72d
-
SHA1
529a709a781ddbc8ddd52de1c9675732f7408725
-
SHA256
1789180af7649215559bcde01d9e21e99434cb2cc9e31ab9d11c0915254215d6
-
SHA512
a2b4068f206505191d3fb744c2647fec8c3f049362911caa323761c60000b2ec3cadcc6bcbed44522de670f881dd0a8c18a1c6c6c0c80be5bcc1840dce2e97b2
-
SSDEEP
24576:iPp+tzagYfdU/R5dJ1FYUVNw0w4cEd9sIG+G5sr9rIno37i:jtzaZUDrYUVNbw4c2sBd5srJAo3
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\CFYEYU.imett 304144c3551d3a09fd96ecbd3a60d72d_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2744 304144c3551d3a09fd96ecbd3a60d72d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 304144c3551d3a09fd96ecbd3a60d72d_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F9EF8851-8710-11EF-A96C-C6DA928D33CD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0b0dccf1d1bdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000f66ae82aab67698459e7185b9d09ff8821fc58fdb42010e036980cf04707de92000000000e8000000002000020000000e63c8247face0009003640e98f1d442ace9b7951ad83b61eb89d573aefd2349e20000000aa289d15fcff81b87262fb8084b5f6dcc4c590c09515d27c8df404759cdf59b940000000f9cc24bbaddb7f89ebd2d44e44e1743d1617fc7304ead3708af01c82ea062c8090fa71e7738ebb64aa2a76274a0ea85181020f4f1cd18cae75972f2b9a054ec9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main 304144c3551d3a09fd96ecbd3a60d72d_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2744 304144c3551d3a09fd96ecbd3a60d72d_JaffaCakes118.exe 2744 304144c3551d3a09fd96ecbd3a60d72d_JaffaCakes118.exe 2744 304144c3551d3a09fd96ecbd3a60d72d_JaffaCakes118.exe 2744 304144c3551d3a09fd96ecbd3a60d72d_JaffaCakes118.exe 3000 iexplore.exe 3000 iexplore.exe 848 IEXPLORE.EXE 848 IEXPLORE.EXE 848 IEXPLORE.EXE 848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2744 wrote to memory of 3000 2744 304144c3551d3a09fd96ecbd3a60d72d_JaffaCakes118.exe 33 PID 2744 wrote to memory of 3000 2744 304144c3551d3a09fd96ecbd3a60d72d_JaffaCakes118.exe 33 PID 2744 wrote to memory of 3000 2744 304144c3551d3a09fd96ecbd3a60d72d_JaffaCakes118.exe 33 PID 2744 wrote to memory of 3000 2744 304144c3551d3a09fd96ecbd3a60d72d_JaffaCakes118.exe 33 PID 3000 wrote to memory of 848 3000 iexplore.exe 34 PID 3000 wrote to memory of 848 3000 iexplore.exe 34 PID 3000 wrote to memory of 848 3000 iexplore.exe 34 PID 3000 wrote to memory of 848 3000 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\304144c3551d3a09fd96ecbd3a60d72d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\304144c3551d3a09fd96ecbd3a60d72d_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" www.cfyeyu.com2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:848
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ecefb19b05fd676c0eab7f527956f4d
SHA1c76005d3184060f992d98b49e2a7fefedf4fa655
SHA25645e73ca9c9f0362c1c5f0f69fc9f58afa2e6b4510384f9d307a4d1740553e787
SHA512812d7ddbc1895c2d43928e703639b3496f2f7f7776245c0c68ff3c597bfdc584d1b2a6a60de9e51de004d9cb3e4abb9f4333c5cd3f16ba77e6759ce5bb3ec9fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51784f219bb3e5d3971be12864c850011
SHA111de4fc14aa0e2ddd41c45313ec8f9bca696b6e1
SHA256af3aa5047d30a3bb23c0d722d42d83f66bdceeb70b4b74494d148f219e99d86a
SHA512f2d69372bf0bfb4c49953f28897052f88f5bfcec3136d701e0ab9898f5a064225c5b66186e1729087c973a68a8ab38b251dbf6f40b96e69fd5d0ab1ffe8e8512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bc6b2c55e9639b4a19cbe7215d3deb5
SHA14d506c9fe96456ed08cf628ec6c01c52f404409f
SHA25652af694a9f68ca704d7fcef2c1dbcf86d4a0b716931a4c95898f0ed65736a031
SHA512e45d365fccf0d6bfba6fe688d21587e029455dd744692fb54394d1fe9c5f1dd35fa6c21448df50f305abea030e19f3bfdad4ff648243f180e67c8b8adc29c82d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f10f58e39373f8dff6c3092d75301441
SHA16e234ddb88aae57cefa77a1b6283045cb3677d1d
SHA256edf0807b64107e5c3d4f7fa6637e0ad16aebc8ad7da545529486e1b38e2b16d1
SHA5128d3f45905fc293a67c6c9f24ccfce72d6b80cd50003a48fe0f71469688bbe2edc74a3c52669def435786c04f7ef41b459401e49c44635f817e560ad8b6e6302f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c1c81ed04ad5752b062c5aee1d1e5dd
SHA1f9213bc4a58fa42f7de4c74062490d7223faddaf
SHA256c51846caa448f4e0f95569c55861e2492549b175236cd1af7cac9f030cc577b6
SHA5129a72427f0df04ebc0f1f8b2a573b0aca0e88521a6d131211ccb863e235b5aec9dcf4ee79be3d4a692245dea07fecc40e96f96d6a8dd30fc751cf99794bb298c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bef58708fbc99ee44f6c1dcc75e55b09
SHA1257427ab0f7f75478c4a3fc321c60f7c67bdaaba
SHA256dcd0a205ea0d16931fc47175d64afa60f8bb702943106d7cf7165d6875538516
SHA51200b242deb9b6d212a4a2f482f1d64cb04be0b561d7c8ec49a9e5635c343d9a28a948782d881b31271b459f81ce1e49c9519dff20550a59c6df244bb059a2b8b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e50ed0a67fb8b29a2507fddd922b921
SHA123a1963211d0320a6eb34e2b184f16fa1a0dcd5a
SHA256fb1ddb3c60b2fbab2b6a71f0e0929a1ab9e5bcdbc814f4a0b8d188a64ad81248
SHA512582a73b563e7136fe80378b4eb2803f7a1251d23a97f2ec5ababad4ac95e0241199b1f76fbbeb2213273c3012dd08013cfc91c0ea0dde4f6b99a0e6c2ac7d35d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54decc42948f58b6bbabe8b35a04fc5bc
SHA13918994fad5910ce69b4ba5d86ee1862b37ae24d
SHA2562371f732892ff95ab78c37ccd41b09de6a2b3a476a3dce5e3e8e7146450a9f23
SHA512a5a73263ab847575bffb02cded7947e7ccefc90a2a109ba5450c5cbadc61b3b7fdbca9388e98ab4a1b62130a711355f92153072734af548e87d184591bb794a6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b