Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 07:33
Behavioral task
behavioral1
Sample
JaffaCakes118_8a72777b7f9253e39f56e2268407705d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8a72777b7f9253e39f56e2268407705d.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_8a72777b7f9253e39f56e2268407705d.exe
-
Size
43KB
-
MD5
8a72777b7f9253e39f56e2268407705d
-
SHA1
9e9b852fb16c42dc84e7dc8703bb8f4f71c801dd
-
SHA256
a8a91ff9909250052d82119c7bf4480baf1231c5ec1b33e51cfbaeb3ad5d2449
-
SHA512
fddb4fb80cacb0e9997a071d236949fe80b12429381c62d0567102bd887799acc9cdfbe0702de62a67df980b5578b175e7ded567a9974f603ef3fc6ce43228c5
-
SSDEEP
768:spGSdgqGRivxe9En6ZxVniAAvTx3Er6ySOXdJaDhL812XmXHM:CNKqkiEUsxVnEvTNi3SyXaLXmXHM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4756 svchosts.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 JaffaCakes118_8a72777b7f9253e39f56e2268407705d.exe -
resource yara_rule behavioral2/memory/3976-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x000f000000022f40-6.dat upx behavioral2/memory/3976-87-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4756-91-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\windows\svchosts.exe JaffaCakes118_8a72777b7f9253e39f56e2268407705d.exe File opened for modification C:\windows\svchosts.exe JaffaCakes118_8a72777b7f9253e39f56e2268407705d.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8a72777b7f9253e39f56e2268407705d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{EE69090F-0BA6-11F0-9A21-7219D7A672FE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "449912179" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000533c8d3df2dcf94683dee2eda212d06a00000000020000000000106600000001000020000000f6923eaa45613edf7264994b05977083c8a8f2e7420bf887f16f4ab9fbd9e800000000000e800000000200002000000064d3204c7d39fb16f1e45e736d27029912781df762489068d061731a69ef24ac2000000025963380020d5a9ed58dee8d8aaac527dd07bab0351f8203f51567dc1bfaf9c740000000c4c8359941242d99e5e2a77e4ad195acb74f3b43c3b30726c14a110d15a0fbf3e0d2d8e2f31e5091779ca6e8be3afe7581e2e71be0063f68d9505759a42c1f0c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90edd3c3b39fdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90cfd8c3b39fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000533c8d3df2dcf94683dee2eda212d06a000000000200000000001066000000010000200000008c2de7ed63e4dd8edb5f1dd615276308103636e36c4beed7b4801f97aaa06006000000000e80000000020000200000009f915c8518f48c813a92d0d396061aef8ce39ea546777f431563eaee46754b5c20000000fabbd5c878508761d2f2fcc845f440d142138b0d7eb3c3ef1aa098a83fc0104140000000a3a9dd90ad1c81647ca85ccce088fe923c5bb07ef4a772962ed2e1f4014dadcf9808055f8add078bec3a282cde0b7c1cbe88ec916eeadfbfebd81330d48d79ab iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3976 JaffaCakes118_8a72777b7f9253e39f56e2268407705d.exe 3976 JaffaCakes118_8a72777b7f9253e39f56e2268407705d.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5312 iexplore.exe 4756 svchosts.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3976 JaffaCakes118_8a72777b7f9253e39f56e2268407705d.exe 4756 svchosts.exe 5312 iexplore.exe 5312 iexplore.exe 4792 IEXPLORE.EXE 4792 IEXPLORE.EXE 4792 IEXPLORE.EXE 4792 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3976 wrote to memory of 4756 3976 JaffaCakes118_8a72777b7f9253e39f56e2268407705d.exe 89 PID 3976 wrote to memory of 4756 3976 JaffaCakes118_8a72777b7f9253e39f56e2268407705d.exe 89 PID 3976 wrote to memory of 4756 3976 JaffaCakes118_8a72777b7f9253e39f56e2268407705d.exe 89 PID 3976 wrote to memory of 5312 3976 JaffaCakes118_8a72777b7f9253e39f56e2268407705d.exe 90 PID 3976 wrote to memory of 5312 3976 JaffaCakes118_8a72777b7f9253e39f56e2268407705d.exe 90 PID 5312 wrote to memory of 4792 5312 iexplore.exe 91 PID 5312 wrote to memory of 4792 5312 iexplore.exe 91 PID 5312 wrote to memory of 4792 5312 iexplore.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a72777b7f9253e39f56e2268407705d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a72777b7f9253e39f56e2268407705d.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\windows\svchosts.exeC:\windows\svchosts.exe auto2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4756
-
-
C:\progra~1\Intern~1\iexplore.exeC:\\progra~1\\Intern~1\\iexplore.exe http://jianqiangzhe1.com/AddSetup.asp?id=137&localID=232138804165&isqq=32⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5312 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4792
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187
Filesize471B
MD54a326b4601ab30dfcfec12796d4473af
SHA1fcc8ab255f002787a2f4756a6e7aaebc4ca0b5ff
SHA25658c3470bcc9b953996e86f7741d7a6b1afe327c1c65788c2ef262c1beb6df10c
SHA5122462008010263772ed24dbf2e6b9c002e29334c7529ddbc5f8272dbb41d5eb54dcc9556ade4dab79f32a10cdff67520882a5505f80dd23a752ea69407afd654e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187
Filesize412B
MD5c0cc82780256563d53cfa2312e641c05
SHA1fc8703c28810cca8da275afe9d7103a0b2415644
SHA2562aabf207ab9347215357dbb719df61e66911a71b98ae8538eb28dbed6f973dc4
SHA512c8788c2f18ac9fcd696a8540c83784c718888faff3331b728393d3813e00cd7e7f4f1b7c60218b8dd5652ae7c0baf3f39f56f18e4314c250ef2cfdd8001ee550
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
43KB
MD58a72777b7f9253e39f56e2268407705d
SHA19e9b852fb16c42dc84e7dc8703bb8f4f71c801dd
SHA256a8a91ff9909250052d82119c7bf4480baf1231c5ec1b33e51cfbaeb3ad5d2449
SHA512fddb4fb80cacb0e9997a071d236949fe80b12429381c62d0567102bd887799acc9cdfbe0702de62a67df980b5578b175e7ded567a9974f603ef3fc6ce43228c5