Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 03:02
Behavioral task
behavioral1
Sample
5520d3670d79e9c22c94cd373c188174_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
5520d3670d79e9c22c94cd373c188174_JaffaCakes118.exe
-
Size
216KB
-
MD5
5520d3670d79e9c22c94cd373c188174
-
SHA1
9e23eb1380cf3baebfca4e8527569985047d42e7
-
SHA256
1adccdcf97e97d55129e7175525e59d8c8e38036c9f06bd33744895633d31ff4
-
SHA512
20f396030ed4f252f77b3d14f9967dd6cc8e392ceb474e59adc9d8251f5075e8a6ae7c303cfafbc6af04567fd41ea897718e55ba5a2e59f97b77db3c680f8548
-
SSDEEP
6144:7NCzLYXnXmUhko3w4ge971kk3YEJ9aghoSReu:7NCzLctvw4geda87JYghoSReu
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5520d3670d79e9c22c94cd373c188174_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2880-0-0x0000000000400000-0x00000000005C4000-memory.dmp upx behavioral1/memory/2880-30-0x0000000000400000-0x00000000005C4000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5520d3670d79e9c22c94cd373c188174_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10fe95530a21db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main 5520d3670d79e9c22c94cd373c188174_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E118A61-8CFD-11EF-8B1E-52DE62627832} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b13190000000002000000000010660000000100002000000045b428cec878391581685ebe157986d71a9e43aede5abce6c20788b91e4e3122000000000e8000000002000020000000fb2ff26f5eac5f644d141bf16c9cc31724422812beb0e7e9ad9c500313429b4d20000000363805767026e1cb7564f94e8dd2d58b2f921edf10bd2f2830c1dc14aa37d94b40000000fc6689e231ee665458b7b6843ab3ae79012e2a7a52bb40f1af44197fa55343705f0011e806792a63a5243a13162c197ff465d92f22398d10048066376c4af403 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435382454" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1056 iexplore.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2880 5520d3670d79e9c22c94cd373c188174_JaffaCakes118.exe 2880 5520d3670d79e9c22c94cd373c188174_JaffaCakes118.exe 2880 5520d3670d79e9c22c94cd373c188174_JaffaCakes118.exe 1056 iexplore.exe 1056 iexplore.exe 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2880 wrote to memory of 1056 2880 5520d3670d79e9c22c94cd373c188174_JaffaCakes118.exe 32 PID 2880 wrote to memory of 1056 2880 5520d3670d79e9c22c94cd373c188174_JaffaCakes118.exe 32 PID 2880 wrote to memory of 1056 2880 5520d3670d79e9c22c94cd373c188174_JaffaCakes118.exe 32 PID 2880 wrote to memory of 1056 2880 5520d3670d79e9c22c94cd373c188174_JaffaCakes118.exe 32 PID 1056 wrote to memory of 1952 1056 iexplore.exe 33 PID 1056 wrote to memory of 1952 1056 iexplore.exe 33 PID 1056 wrote to memory of 1952 1056 iexplore.exe 33 PID 1056 wrote to memory of 1952 1056 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\5520d3670d79e9c22c94cd373c188174_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5520d3670d79e9c22c94cd373c188174_JaffaCakes118.exe"1⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.regnow.com/softsell/visitor.cgi?affiliate=36566&action=site&vendor=8783&ref=http://www.fenomen-games.com/_files/roobyrundemo.exe2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1056 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1952
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d436012161319d8952a0631edd52db09
SHA1dd5e11ddc7cc3e330f9136a143f9800f42b7c978
SHA256c45617eabd9bdd24938a16b5394955c58628251f13770b12188e364cbd0ac04d
SHA512fef222ec9308f3b981fe5885ba6c2ebd1979175f8c0bd376f27a8495836dc0bb22797010d7c58e44923d02e0ebb173a83242bf6303daefd1ba38a4cc24dbd3ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501ff7f3384e139eb724c89beca29e8e8
SHA10bfcc4db9c234c9ffeb65a7f1387d7140ace7749
SHA256392db554ca15d538009c9b03c1d0bbab6da760aa6bc00bf610479189b7d553b0
SHA5129ced6832b9ae5ef0ca85d6617f67faf7ac0e39f091c48c8581330398373ae1f6d72bea46344c416a936aa8a7266ba38ac1d664275cd23a280c8f303c95ed7100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aafa6b1c89b601a9f4951a2425ab3d38
SHA13a35914adcb3698aec2ac8709132764fec759809
SHA25698fc8b486560515c6fb0b978399ae1f58acf14b6ab71207d3891e427be0a22fa
SHA5126787d07d5aebe768f0fc949dd45470b76554e9ec9e2fe96c6b720f91674a683d21f5e8e1340504aea466a1cf5d92ba900a618fc37a24b1bc337ff3586ef10875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5069c6925ee35781ebc6218ba7744feb1
SHA1b1464fbd424b2661b970fd2ad984f334d7059d82
SHA2560753b3dc91ad7210b38dbdd52c7f1d3c1ccf9308789f8382b6dfeb47643c1f8a
SHA512cddb6e2e37480b9015994c9be1d4f760222e2498f34a86d442fcf369d36ebb6b0ccf83bee1aa8c1178c8dd8d0bf37811c0cd2cffe05223aea179ac308ae31b76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f38061eacf5d667eb6199d9459e7e68d
SHA1bc8c63d25b6a6c55fc6030ed5c3246b2d5ef5b2c
SHA2569769880a5e46cf0e15ea840409cdb81d19184f28590debe1c32124e377e292bf
SHA5122dca347f6ccc340a8e1932938eb920d6d8f4a24d32c21bc200f23fa9c87dc709a675b1e423be89ab2637b3ecad7041221b9c427fcfb62adc88f17aeb23d49951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f91c698e2323c49789d9801fbd36ebfe
SHA113dd52edae03f8cf2538cfdb3f7e8d42f441995b
SHA256222a66ebed925a61005d8748e286ed07dbfaa855b19b7994a1e7135967603359
SHA5125ea72c5d881af9cf6e8488741608d13ab54f71a5650f07741cd8476da5a6f3d5947b8bb43df16ded54a63717277169c0623d08a94cda4dff23ad8ac3da41c467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0e1a54787d1ba742b0804c980b609ac
SHA1d52585f81c215fc588e953984110de3057e04da4
SHA256bb29720d328b34683e9514c8d2329d995249bf38f158c3e86cb6ee77da07c83e
SHA512977cc556e805ed126b714ef48eb1f81ce7d0fbf3e8217c3c2bc5f09ab54eec35f91517b0237142305957107fa9e0362499dcd82c71a4cbd4323847d80b5d5d0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad4e71eddaa899daf0a687ef7eb5d429
SHA1058bbff6f002222740c5c8476336b92bfb7a9903
SHA2560e6b0647a3826ce4888e9366f06923e5060c9b84e78435d6a4bc4e7c87b11df3
SHA5121c170dd66ca976f7e32c7e7192d911e94bbd354c3f47a8038648c620337708836a04b898385281442c169ea30a7dc4f9e8522bf49d2fbf9c952125474c00a1e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57717c3cc25345fa9e4d4fe2f8e595f36
SHA1c237b3108418a632d196f49403586cd3b73b3404
SHA256c599f3417fce28c3cf383ac67b2f85c24e8cc3810d49cd79e2f6d3829b2e066a
SHA512e8eface2ea91716b234ad59ec1e13a894dcb9cafb1a71e462b4abf042b2a67bf4c2861aa2f8172af677567d192b7b35667a911331be3dfcb72d641c8a094c37b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538c43cf73bad3958ef0a44499c2ca59a
SHA1ce5782674c001924f2949af182b7b94ddbf53cae
SHA256fc5c06855753335e52f58de5dd6fcf5868eb09c9038b10bf7ed5fb7b7fae6057
SHA512c9e02e4678ceb87c5348048a452199df5c69c64ed4634b8fdf10a51a34313b2787560641fcda8d20ae1e90c872a7a9464b8554cebaa4968d9db7e2759b7515c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c4adb0f35fea2c3534368215eb4011c
SHA1ee3c1093d4b98e7692fac4670c775e26817fabdd
SHA2567b1d399011219e3b6917ccfc2e1be7b5fb81ab8e4019e7fb8f01a9194a6d3c82
SHA512088cafd6927488a3adb02fc9d8c47302f60de61eaa4ec292f6b3b2e6313d4d02c0eb5454d1ab11e83f673a143e969312af3a1652ab4158d59345f6dbff581c2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5124cecbfc1bae41460406cc0df080cf6
SHA1f58f22366cff2b07a83aa156bac9b09b90a7c6c4
SHA2564bf31d7eda875dca0bec9dc40780b72a9f9b65298c2b8b7d6f2f99d0ef602a36
SHA5128768a940e1d1d44160de60f72f39da9ac2bbc44e2f55ee1aeee25094cb36160e0690de212e7ac02c3b261c63f59a5890ff6b20143176ef17535d83f4a6119214
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b