Analysis
-
max time kernel
118s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-10-2024 21:08
Static task
static1
Behavioral task
behavioral1
Sample
6be9b7a11e15248d1dae8306c3f4c8f3_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6be9b7a11e15248d1dae8306c3f4c8f3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
6be9b7a11e15248d1dae8306c3f4c8f3_JaffaCakes118.exe
-
Size
11KB
-
MD5
6be9b7a11e15248d1dae8306c3f4c8f3
-
SHA1
a9dd76e01ec5cacd0fb281de3daab4f8b5d597f7
-
SHA256
cf42f97feae2129977efe81edc18a5b36e0dace94d043df687b68aba2b73c3b2
-
SHA512
24524417fc651caa6be05498b88c5ccf21f3153eaf809bbe888cfe366c5e0bc75617dc5663c3b24ee87247cdcd093fd2c278391f784c70c8adc504325d617ab5
-
SSDEEP
192:F5Zfq/Q05JMCENlnwtDdHh/EzpPLX4/prjQGFLNEfTRWoFqRJhvugebhziAVjB5m:Tpq/Q05JMrNlwtDdHKz14dQGF2f38RJv
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\outpstd.exe 6be9b7a11e15248d1dae8306c3f4c8f3_JaffaCakes118.exe File created C:\Windows\SysWOW64\outpstd.exe 6be9b7a11e15248d1dae8306c3f4c8f3_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2528 set thread context of 2516 2528 6be9b7a11e15248d1dae8306c3f4c8f3_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6be9b7a11e15248d1dae8306c3f4c8f3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D390A421-90B9-11EF-8659-F6D98E36DBEF} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435793204" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2516 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2516 2528 6be9b7a11e15248d1dae8306c3f4c8f3_JaffaCakes118.exe 31 PID 2528 wrote to memory of 2516 2528 6be9b7a11e15248d1dae8306c3f4c8f3_JaffaCakes118.exe 31 PID 2528 wrote to memory of 2516 2528 6be9b7a11e15248d1dae8306c3f4c8f3_JaffaCakes118.exe 31 PID 2528 wrote to memory of 2516 2528 6be9b7a11e15248d1dae8306c3f4c8f3_JaffaCakes118.exe 31 PID 2528 wrote to memory of 2516 2528 6be9b7a11e15248d1dae8306c3f4c8f3_JaffaCakes118.exe 31 PID 2528 wrote to memory of 2516 2528 6be9b7a11e15248d1dae8306c3f4c8f3_JaffaCakes118.exe 31 PID 2528 wrote to memory of 2516 2528 6be9b7a11e15248d1dae8306c3f4c8f3_JaffaCakes118.exe 31 PID 2516 wrote to memory of 2120 2516 IEXPLORE.EXE 32 PID 2516 wrote to memory of 2120 2516 IEXPLORE.EXE 32 PID 2516 wrote to memory of 2120 2516 IEXPLORE.EXE 32 PID 2516 wrote to memory of 2120 2516 IEXPLORE.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\6be9b7a11e15248d1dae8306c3f4c8f3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6be9b7a11e15248d1dae8306c3f4c8f3_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2120
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc6ff403a3e378261db6bcea3cb16a10
SHA1ecce120ba2405b3efa2d31b79ce352b00dfbe432
SHA2566a601cc32392657ee1eda95ebc096270342cf1f6919dbbea8d23916a78844091
SHA51292b8c77f96381c04f3752e88215f9206bd7bfa86a2560c7d436b43e43735fb55c7829ce1f704a03fd04a114eb70aaac43f4fb73f40daa19615fa7d5f44878868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537de506e9c17a7ba1bb4a2f341a35140
SHA186f9edeca05543119fae4099c8c9b83e9eeae4ac
SHA256ce5f2b54923cf1ea9a237460e95bdf794c4ab61499827d21f34675396a9b7411
SHA512eec6c3b7860995beaf0797436db1a80804082651dd30361942047c38c1d975e26038de9ec361833bfee6a4bf818a8ae6f88246802f8a839fc38b2988dd1c5a80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5189abcbe906ad80a0e7a3784bb42283d
SHA1e2a0dbb09eb1455fb7ad57ac74c739d991af497b
SHA25654cb6c067a8bf0fa2214b20eb0c129a2bd2e8cfc76aad7bc691c03d845d190c5
SHA51220e23f9844475b0dc491ff600761ebcaaefcbc40433e2535c0dcc9ffcbc26e286c5c3a068d54862dcdaa6a683e065f924fa4714ec51fbcc10b5c3704e555168b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe7b52e7dd6399972239b7add2c6ff4a
SHA1ae39e41e1f29f9db06b8b92ed32caa36489450c7
SHA25662e88a8f9d54af1e9d2494e12d41b11b5cfc67b148db1267023d4e07ee3d7d49
SHA51239a702a5848efa4506cd33dd96c51c44478286fad8601602aa80620a7b4576bcd96297b790564b3a353d9cd99f4b786ec2fae6b28efebc706b46461651b3dfab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51712dc77bf7287720c1523f990fd0427
SHA1bee7a22c6d0bf7d93a3481f16269fe0b22832e4a
SHA2560423cd4a8fab339c4d9cd6f3ce99289e32faea7fc88d6abe972926a38ab23658
SHA512843f8936d60fd060ef8e194085d095a263594d0957de90f54b01d68970b72a3656792a917171328226e9de60e2e23936c1f966f88d62062f295d0604845b73a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc6b21a6ada7da225189e8d749fb94e4
SHA1e7b75db6ab0761bcb77b4169cbf0de76a98f4301
SHA256aa6887174584fd60fd3c566dc32ffc215944ef2a883146cd785c4f8b1d0caa55
SHA512497a57757c73394de4b05d1ce6e18f173b7ce77382a390c66078f6ba8f76507fd916cd71851f7026228d1d19da6227e22d29817aac9b29b128dc849192497642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57792725b898f119f47962a38e6177af0
SHA154cc143d889e8c1ce6e3434b047c425bf4b30493
SHA2560b5a7f56866781f2d009550b64f295fc037f525143b59066b235d0e504a9f650
SHA512db3e636c1aad5746465b371492e0b94d0a0adaf51ea0174f6cccc1988bb69e86d4f19c07405818eae8c6ce249fea70ad5890ef1c38af48caccc8aa1df6192267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5812945a2d37185eeed9e0ac25e2a8037
SHA1eeaea41f002f6c750dc2496db948f293c841d45f
SHA2564102b77dae285647e3c0bd36f3873a2fd291d508bf473d95c835a9c56607e3de
SHA5122eb94236f72cbb13b9ba0148068705424f438d41a93470ee8e7c121c74796dcb773d94581043ebcf0a394ab0c6257078d360134b997132ecca73b200e23556cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565c0384d7606fd920270325f41738111
SHA113cd8e6c9ff38f5646b962e379340369d8eea1f5
SHA25626c873413b5a45596688db5211be33bae17b355c739692f24ae1f544f3d0f65c
SHA512bce6eb6a2f4ae3cf60e73b7428647bf46a4fce0d33ec84997b8326270187a98483ba09f39ec0ab5f9ac9d95b6f1396de7bdcec8d1eb5a49215d7115e865c6285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5050652f81080698d6d24ce225545d793
SHA1f57dc21e8465e8c701d1737b3d71cbfd9716b2ca
SHA2565ebf23a8ac9db10d8d3240c3404e0f50252c33bc570736480608e5f5e695615e
SHA51212a7cf773a75ffcbb6f50fea034de811beeec53089d1297fec700ac98af6dc0d46ed2eade56b433677af471a548b4881af70455403f73858b6a29c219184acec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8e10f757c49ac43783120db3c074cfd
SHA1ab843b3cf812c45b8a5c20e806287cc53c034ade
SHA256e95d29e764a0fbba07d45bfd96a6b9b856f542bf303943b207a4520e86dbc6ff
SHA5129025dddce519b727e068294765b3adfbe4099f1affdb4dcc8b748261a8ab6620c806cc47752badb7b9f02285cf22bea9284c367175e39b6424bb32adbeb74dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bcdb3d8cb4362d2a7d964555e641dab
SHA1bf007417e74b84214a5ab70502c538512269bd08
SHA256c461d5fff97a1d27f9c42796684554d6aa1a4d97b772d7310f6d055155645450
SHA5120702b9ce002b32bd1e057cb8f8d7e2a9736e55060c883bed87e80a47b69a6b7dffd189d39b8b01422a78cb0aa24bec6ad1418793cef390b2f3e2a6958ba42481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54548f8d8b197485eb952f0a28b4b655f
SHA1f74dff3cd578a882a940ce5837d848bab5e13758
SHA2568e779ece2f6caf8bf5d448e6d3037fa654eaddeced20010a052b065400d23725
SHA5124de7b45ee84131d7defb6da64a242b3f9f380527793c57e8ac85533fa1d9dd3b5603d68b3f991b62a801c2baab313641de47fe6265bbe054c80169736f4bc6b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e17e92d184fe8bc48fadaf07ae2cd6cb
SHA1f51448046b7985ccf1d42802aabf92c391cd6dc6
SHA256e86f289e4921c463d6098da9179b6a364b3db3df098c0a4aea946f556313eccc
SHA5120fd0d6c3a1400dd06cec8572a16561613925f7505a87876f430ac670c2f2f580c6717d8590d44cdfff036a564c296880cb071612655b222dcb8e079bb51f4307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a051b3301bd89b01f2928b3267a72be
SHA171ff74e915193acbc327c6b79c1204f64b1a3454
SHA256575edbec628072ad6b8a3377acb76edaa9a7edfb281d30b4e0170b107ffa9002
SHA51274179c71123ed8c0fd4c76e03efd276ea98ed24c9e0aea31315a8f5518c906eb9e01c7ff13f539e9f24804bc94c960da5ba3af3f1812463cc112481fc865d02d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502b97d6909bb1f3ca7db48fab1526798
SHA199e37f05c4e02db9fa34aebad5c07c76820d9771
SHA256891d8ba7442e9f752e927a6d8fdcb2af97d3d8ef63ab4bd5279bc5a9949e6f84
SHA512a27760c82f2c211a32279db02facd965de4e756711b150a8cf349ede708ab2d7fbfa99d4e04b2217a59ae700a899bb9b479d6b4bf975fbd865dfd569535239ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593db73f8b637bc41bfab8c343b98c208
SHA1d915b7689cddcb6fd7a7c13072411f6ec1d656e5
SHA2564db0dac0a97c6bfe9398b2644e73a7bc8998228255c2a0d6b27586436bb19bef
SHA512af5e9a3cfd3633b3751d6cb8842a3c6ab08774fff8df6f5b281f74013064faf9a440931b38275738c7e3b83a77aa3148b1a028affaa8ba803dbafda82c6422cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5901c4103b1fedefd0ab4b6b50735c1fb
SHA11cf70acb8c441098ab1a8264069091e898c8ae2e
SHA256eb24b99c7b8604bc010f81d79a1720bbc34bccc6161dd1ede4a683bf02acd24f
SHA512c0d836596ee4f4ea7535aa61991e331137cf96190b40ad7d7218206cbd935cdd1959b0af6464692b831ee046daed1702efb9ae81d1633dc39343aebf0f7898c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eae5d749a740984a993e2e896cdf4d7
SHA12b51ee69a5ea5de6729f0c128995671849545d0f
SHA25610eaea109c27cee03eac3afeaa2ea13afaaddf320ead833d49e6a767b74e10d6
SHA5127b499a86adb2b324c99a3e502fd3025a969e58f4b93447cf304d7841ff2f71fd210a41c655fdf2233da88ddc089f4ca84acd51829fa651abfeef8cf97a898813
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b