Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15/01/2025, 13:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_58958a20d0398c071e6aa64f919494ca.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_58958a20d0398c071e6aa64f919494ca.exe
-
Size
95KB
-
MD5
58958a20d0398c071e6aa64f919494ca
-
SHA1
98aeef7e115d372ef9fa5a4fddcf1c0ffcab5046
-
SHA256
22d94f1889e72bacc6590eaf0d8caf2093bcbafc8960f3133b480f9fa9e405d2
-
SHA512
e281381bc89f52206b6ba639d3a0470afca45190f4b03639a97f9f98004f89e4aed1b8c5fbfeca260c450c7010f821c3c0f0577a1c7905a5c51aa76aa6038ac8
-
SSDEEP
768:F06R0UrgnKqGR7//GPc0LOBhvBrHks3IiyhDYQbGmxlNaM+WGa1wuxnzgOYw9ICW:zR0jn3Pc0LCH9MtbvabUDzJYWu3B
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 3088 WaterMark.exe -
resource yara_rule behavioral2/memory/3720-10-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3720-11-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3088-27-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3088-25-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3088-22-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/3720-7-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3720-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3720-5-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3720-4-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3720-3-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3088-34-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3088-37-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px9F3D.tmp JaffaCakes118_58958a20d0398c071e6aa64f919494ca.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe JaffaCakes118_58958a20d0398c071e6aa64f919494ca.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe JaffaCakes118_58958a20d0398c071e6aa64f919494ca.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2412 1368 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_58958a20d0398c071e6aa64f919494ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443713816" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{3E5ABEF2-D347-11EF-A4B7-CA65FB447F0B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31156052" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "316885023" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "314385445" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31156052" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{3E5F83A7-D347-11EF-A4B7-CA65FB447F0B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "314385445" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31156052" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31156052" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "316885023" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3088 WaterMark.exe 3088 WaterMark.exe 3088 WaterMark.exe 3088 WaterMark.exe 3088 WaterMark.exe 3088 WaterMark.exe 3088 WaterMark.exe 3088 WaterMark.exe 3088 WaterMark.exe 3088 WaterMark.exe 3088 WaterMark.exe 3088 WaterMark.exe 3088 WaterMark.exe 3088 WaterMark.exe 3088 WaterMark.exe 3088 WaterMark.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3088 WaterMark.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 220 iexplore.exe 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 220 iexplore.exe 220 iexplore.exe 3548 IEXPLORE.EXE 3548 IEXPLORE.EXE 1304 IEXPLORE.EXE 1304 IEXPLORE.EXE 3548 IEXPLORE.EXE 3548 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3720 JaffaCakes118_58958a20d0398c071e6aa64f919494ca.exe 3088 WaterMark.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3720 wrote to memory of 3088 3720 JaffaCakes118_58958a20d0398c071e6aa64f919494ca.exe 82 PID 3720 wrote to memory of 3088 3720 JaffaCakes118_58958a20d0398c071e6aa64f919494ca.exe 82 PID 3720 wrote to memory of 3088 3720 JaffaCakes118_58958a20d0398c071e6aa64f919494ca.exe 82 PID 3088 wrote to memory of 1368 3088 WaterMark.exe 83 PID 3088 wrote to memory of 1368 3088 WaterMark.exe 83 PID 3088 wrote to memory of 1368 3088 WaterMark.exe 83 PID 3088 wrote to memory of 1368 3088 WaterMark.exe 83 PID 3088 wrote to memory of 1368 3088 WaterMark.exe 83 PID 3088 wrote to memory of 1368 3088 WaterMark.exe 83 PID 3088 wrote to memory of 1368 3088 WaterMark.exe 83 PID 3088 wrote to memory of 1368 3088 WaterMark.exe 83 PID 3088 wrote to memory of 1368 3088 WaterMark.exe 83 PID 3088 wrote to memory of 3000 3088 WaterMark.exe 87 PID 3088 wrote to memory of 3000 3088 WaterMark.exe 87 PID 3088 wrote to memory of 220 3088 WaterMark.exe 88 PID 3088 wrote to memory of 220 3088 WaterMark.exe 88 PID 220 wrote to memory of 3548 220 iexplore.exe 89 PID 220 wrote to memory of 3548 220 iexplore.exe 89 PID 220 wrote to memory of 3548 220 iexplore.exe 89 PID 3000 wrote to memory of 1304 3000 iexplore.exe 90 PID 3000 wrote to memory of 1304 3000 iexplore.exe 90 PID 3000 wrote to memory of 1304 3000 iexplore.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_58958a20d0398c071e6aa64f919494ca.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_58958a20d0398c071e6aa64f919494ca.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 2044⤵
- Program crash
PID:2412
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1304
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:220 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3548
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1368 -ip 13681⤵PID:2880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD558958a20d0398c071e6aa64f919494ca
SHA198aeef7e115d372ef9fa5a4fddcf1c0ffcab5046
SHA25622d94f1889e72bacc6590eaf0d8caf2093bcbafc8960f3133b480f9fa9e405d2
SHA512e281381bc89f52206b6ba639d3a0470afca45190f4b03639a97f9f98004f89e4aed1b8c5fbfeca260c450c7010f821c3c0f0577a1c7905a5c51aa76aa6038ac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD59e22a9c34466faf7bc9cf642444b3f30
SHA10ac45262532cce40083cc9049fb12d4efb06c01f
SHA25657569469879a3144b391cf9def258ad9ef29d7fd1d3d70a28cfb506443d7a119
SHA512c60649fb0ecdd14c9a6d8f9ea7ac4356b24a5e1a238705bbc8294b72ea2fda21965af200746ae20dd5f45e386fc30e2189de6007e08ff3d7ec72b8dfc39435fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5652d03367a742c496f637b3e390fd9b0
SHA1ab8e57eda49a718fd2bac1e91bac273447514a37
SHA256ffc738fda4947c5555f0999f9ce84a7dfbbbe2dcf2ff30b0e022256757cb0a65
SHA512aa6be91404134f0f9e64d045f522c2c8189d4917a9750a7c2be463913280c6ed28e89773895d69bce942511aa9b6ec477a31a962cd99e7c3663cf3c4aacc5167
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{3E5ABEF2-D347-11EF-A4B7-CA65FB447F0B}.dat
Filesize3KB
MD56715ea3eb0254c3c34c5ea70edd6aecc
SHA1ef0095291bdb15e93ef589e5849215e1113f7f7f
SHA256fe631b29ddf7db766172f9c965331a02ddc0797c30a84e4cd6854ac79a6161c0
SHA512480093e0a4b30e1790bffeee5c81abfb071fa571a4c448fff61172bfcab2863c6aad34f9fcafaa244da5eb6339465662e9bb638990cf0f985eaf7bb5f5b61af2
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{3E5F83A7-D347-11EF-A4B7-CA65FB447F0B}.dat
Filesize5KB
MD5b9200e431dcb2fb7ae4246758a9baec3
SHA124b867e81f64ddd96aa31b80bbf524a8b4e0c583
SHA2566fef1031a907fa0fc122b87c9ad86483197a51f6e0800ecc187db003c199358a
SHA51242b7f492e60b2d70097e4d59d900b826228dfa879a61ff6ab8c41cadebcc81799299a5e4d3a5c819264ebb891659db0e57a3ad2d488896882d3ba609ebc8cbef
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee