Analysis
-
max time kernel
136s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/04/2024, 19:58
Static task
static1
Behavioral task
behavioral1
Sample
e84a02f4ea77641cb666e08fd5351260_JaffaCakes118.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e84a02f4ea77641cb666e08fd5351260_JaffaCakes118.vbs
Resource
win10v2004-20240226-en
General
-
Target
e84a02f4ea77641cb666e08fd5351260_JaffaCakes118.vbs
-
Size
674B
-
MD5
e84a02f4ea77641cb666e08fd5351260
-
SHA1
302b2c77d6305a992fb47792f00daa649ab4cfa1
-
SHA256
4d5f926aa8496bfcaf1bb2413b049d55990cf243a3d2dc6bfd3e0849a5af827e
-
SHA512
80254198d873979249e60a4e4804dca05567bbdddcc52120ec4401b60f4e5c4d1e147609bb38506270ee86f3f9d02126b8ef679995dbcc11aa51f485cb8b5479
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6CF11911-F5E2-11EE-A692-6A83D32C515E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000396b40c2d1f26214994532e5947fa81f5306b8914eb5e77b0f2d93f7e5a0fa83000000000e80000000020000200000003fe167debf37d3a25ea30beb8157450312bc7ac3d422f1ac382a18a5e38f4ba620000000db07b70b3f3d8992db7138317489d549bcd1128f7cbd4af4a45c1c65f0f96563400000009e38c899636cba08f9ccda29d718397eed617dc36f7a3b4c3d81757395a9903f493ca8235b5c20f3b20f008b4c64f7ee24394974a71c5a0c48cc6cbad7329254 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c047b344ef89da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418768202" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2732 wrote to memory of 3032 2732 WScript.exe 28 PID 2732 wrote to memory of 3032 2732 WScript.exe 28 PID 2732 wrote to memory of 3032 2732 WScript.exe 28 PID 3032 wrote to memory of 2888 3032 iexplore.exe 29 PID 3032 wrote to memory of 2888 3032 iexplore.exe 29 PID 3032 wrote to memory of 2888 3032 iexplore.exe 29 PID 3032 wrote to memory of 2888 3032 iexplore.exe 29 PID 2732 wrote to memory of 2608 2732 WScript.exe 30 PID 2732 wrote to memory of 2608 2732 WScript.exe 30 PID 2732 wrote to memory of 2608 2732 WScript.exe 30
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e84a02f4ea77641cb666e08fd5351260_JaffaCakes118.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.xsp5.info/index1.htm2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2888
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\smss2.vbs"2⤵PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d50d876553dcb37e584cd8a92be30c1
SHA12df942d7638bda565b77812ca6b7973fcd0663de
SHA2560ef463b1afdca74c31bf09a90cdf78a173b0ceb3c1b1adedc801b4b45bbc539f
SHA5123c25dd107f6f3881f83f3961bc9be40bebe69d9023057c047ed74ed961fe1986f9b7ee121aaba8ac06166d8ad83ee9a0af53312d395155f1eabafad7abb64557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56580f59949b3e3ca3334a47f920ceb96
SHA13216dfa82876323568e8e12ce73b3cb7e2c67634
SHA2561ddd36552b913dcfa419adeb93e61ec956cd05e255f015bedca88f61f9e8699f
SHA51294b09d2e1b1fff8a33bb7a0f8b70a4f6675c14bf70edd0349ae3dec4db7948146359d2cf4e9f259793a7ef27865fd423f052d6a88568a9ae5cbb80b168440637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5549d66c1a07542d3aabe9b6f52fe407e
SHA12e619ef80f83ff048945d35c8d429180d9ca7a58
SHA256dec4508ab28af05e5e6cf9ac3f347b53928882341650f12556b19c84b71b727d
SHA5129f19667f34dd52edd7c9a256241dafe5422f70fd71fd3b0a542a5c3d7c7627c42aef9725d4c3819d578c20e22b7434ba03f366fa8f75bb8b624c2be327f85869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fc306d7a4d527386c6e273265bc94c8
SHA1605f2ee428c0044954cf5e1f0a3ffca57459e33a
SHA256687e80fe5465bdf95bb6aae85d365f8407388e8de17bd956d10174701da710bf
SHA512d6a0610810ef13c2d7c2590ac46521eb5f36f1dbbee50792ca974121fcc4b28046a5fc86f1f24458e88b436f2411a240a47ac45f319dee3fecb71473580136ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a713f40c222045c9527508bc02230620
SHA170fe11e38171bd478e8459d0946a7914195375e4
SHA256965ed3e7190cfa8877f3215ba54aa079dab8f2f9af09428b3b94fda019c11860
SHA51245488cf9c66a22ef6aa1b66a0fb058f7dfeb4c2830e072064d340384e7ae8ed4af3438a53aa707e2b11cadeead5c40c7d06da429a55a9493e42d7a025db69843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56066c243e7e33a3a9ffbb5ebfa1a98a7
SHA102b42006086fbf554d1ef860898883d9b928ed09
SHA256c77d791d6d5f4205b6d12fb07777db1304d6a7d9d7094dd5e0e66e179aee52e3
SHA51264eb8f33a5a973ec571cfc50eb4c583da69be3254647e535833bc69d1c4e2f81f4f28e8b6038c5d41a3b60d095e9a26a06c2f1c945e63e8d9c5d750aefde6738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560e1658c01813129f65ba6d3036e5240
SHA175a8a87135b8c096ade5e84891358effec789b90
SHA2568159862297643b348cf0457b03410f1f85948fe80e6baba03d82f793044dd818
SHA5122f4c979a6671fbbe6d0f33c4df407928efe60cebf367370a82564089c094e2f9eb7391007e128186df8c406e83c05516f98c4796d38d338d0cdb656a045162b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f63c8347ea4c2056c97286db3f04667a
SHA1197ac1265070914f63f5fdaebe89fcf4b95a4cb7
SHA256a3f2a33626f23da1ffba7aa5214efa71e903f88e4cd4473f034c1667540ea702
SHA51288a75bd27a19e24aedebd2d95a72a2cdb3c637060d696086ab6fe632ae0e3d307bce3f0a0ceef8267f56400c846942a4094753b6133a32330966b2d68f508f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517beace14d4b06e108fc8bafb8f1a864
SHA1610cc2fbd34ab96fc4723b467afed3d98cffae8a
SHA25660ec07887343b12809d7b9d5519f356c6d26e730ead849f1f0c99a7d8e6c2583
SHA512c8ae034945cde3db1b0fb1c3eb913212dca38ff0ea72032a4ebf061f35d22007a0d8548d4737a2f3ee16d2983036a04c5892991ab4ec3a50a4eb94d7a307d3f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0f1ba879368087aa38cb818474c1ac2
SHA1c615affc9c062f6941c6cffdef6691ae9c8ceac6
SHA256ea3bd6599a23e803955b10b371fe9023c151a77f4b985e58bd248c02453f387d
SHA51295e3ff524975ea5b0dccf1c2906e597e011c29f5d71c7a691ac4540f48e72826e3a81593618539ec078eb249552f5e69f86dd41f8df869a88fec470478a55acc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e33b9c67a49c2ab134d2ef32422046ed
SHA12d4cd777c08900a1c7218b9837a0a30ec65d6be6
SHA256e5476663b07806da042bfc995750543e63421d44038e5d1d8e258c0f75d4603c
SHA5120416f62f1610dcdee9b55ee6dc80e55a4d503157a970c6d5c11c2ea7a00d5da6d3a791ff093fec29a038dfc32510f3db6ede7220a6c635f731e5ed52fcd356f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51df03731d1fa0df60e961eb1f60988aa
SHA10d3e113caabe3fa6751c6dfce9ca8dc3721e88f6
SHA2567139e108361e5ccf05caa7fc072304b0b363cd0c95353285dcdaddbf3f109220
SHA512537e7d52a7bcd684f75ff56344e9f51bf389d6978889e0125c26a8fd3a8772dbf3591f2861bfe96870afaf79e0d34482574ce5327192b312016a54c0d7518dfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaba1bff4825a02bf737e7ee3c8d2c60
SHA10bcba846f277b90757a450c81082f74172097172
SHA2564bd6226d82533aec0a65d46b2790c2dc11fcc228eb97855093cc101fb8407eb6
SHA51297d9d116984b7e50a418c7075b4776c263fb659825c4f4aaa5dac4fc494f3789421450c7175898202fd086ab8ae2dd341daaed6ab9ef51a972d9d77950edb56b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c17ae1cd7b9ac5ae14330fbd44cc9800
SHA1645f695b453b00264eeafbfa40c1e1e44db52d77
SHA2568cb3f043c3c04761d04578e7b07b8bde1b62271024081ab845270d96b494ac81
SHA5126e8fc68608ee2a6bac55a909353dd871608ab3f558cd8034fb05c48b5ad5c0bca62757c0a9fcefa626fe2de875acd1ee6beca6c123a60e509d386a5f2da2c7b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503e5d157b40f33a7cfcb528211221978
SHA128d722cc845ee58b555cb68755d3a22ad6524e16
SHA2562160887c6858af461571835a9efa660576cbd02afa115993651105f658077a3d
SHA512090b606551ffdb89b42281f24228f0f68cd1b38283ae97b1164e0ab0b73a5266ef6ff141c9cd18faf6e766607c71d70a50a8ffbb908473778c4fb51d3d105c9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54320cefea5b3c8e391f5e9da40a8685e
SHA11a18deb85424715d2524f6a8fff17c090280d17d
SHA2562fb8972eb0819ea5dbc5edec7bde890d41c28ce5609eefc23e6569b27f3a308b
SHA51205281d3a12ddf3757e8038933e4849368e619221974fa616d7f827e90e210d795b1374278b2544a9dd0b857fbf2dd84dd89fe671979bb4e13dd537dfc7c56c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5818bd8007d08ffd5d9f94e38f72908c6
SHA1915566ec56e0d69ab11632b83821e210370aade5
SHA256f0ab9879ea3c4a5aaf2f40c5c51188c81a6b2e00bf9eed3e3121354686d9b9d9
SHA5121400459c788994d8719bf206835179009b454c4cb9efb27cdbea4fb282686fe36ebfcc44561d43f0e620c250fa59e916398fa7f78ccce0e0041114ac4cc5cd4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5995e21ee9517ed0068601d4b56cc3dd7
SHA19a9071fbe690be2b01c85600d53ca45fa7d69107
SHA256de575da23a7489571849b91bb06af4a6739125c0630fb4b82ca95489888c240d
SHA512606cbc1f83d55d8147d98fcedb3eb80f8aab69eae22657252b66a0b2f8c5624d76669ab3e8745fb69eb1c67f3c367b1630c04ea32a863d7c16fc5eafc1da8a5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55df7f7ac8a2fe32908b09962759c84ae
SHA1323d1fefdf4957087d65c85a8df612083c184717
SHA256d9f7cecc984334e7e757158559ea12f1bba3b15f9027d02d1fccc26d16f3b3d6
SHA5123d24d5bb29deb0548b5f10b1b2c5f070bb71a5cf74bf80f103bfa16fbdf82c769c2e70d745724c8cc29098132e8fcda0acf57b443767dfdefb5ecd19816dca66
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a