Analysis
-
max time kernel
119s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 01:47
Static task
static1
Behavioral task
behavioral1
Sample
fe25571c30e09cc1b47f1363a75f4e22_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fe25571c30e09cc1b47f1363a75f4e22_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
fe25571c30e09cc1b47f1363a75f4e22_JaffaCakes118.exe
-
Size
42KB
-
MD5
fe25571c30e09cc1b47f1363a75f4e22
-
SHA1
4e113dba95a8b27154404829877b97f8ccb06f64
-
SHA256
503d33c6fb325e47348dfa1fa6f1ef00cec704b5e3ae12d724703baef5c6b0a0
-
SHA512
386a457076d40f435566c58f0e5119eb319b0549493fe5d379ef3fc425e7874d59cecb74bfc7963f2ed3c86a90a41bc90e4f8b5553eced2eed714bd582b9a1f2
-
SSDEEP
768:tEH6jUntCaXwuD9BBJvf3IWa4zdcRf0ujtcjyxbZHArItNkAaQoq1/VJ:tEH6jUntCaXwNwK/cyxVg8t6pPGz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2408 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2964 fe25571c30e09cc1b47f1363a75f4e22_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2E231051-FF81-11EE-8356-E61A8C993A67} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419825951" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2568 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2568 iexplore.exe 2568 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2816 2964 fe25571c30e09cc1b47f1363a75f4e22_JaffaCakes118.exe 28 PID 2964 wrote to memory of 2816 2964 fe25571c30e09cc1b47f1363a75f4e22_JaffaCakes118.exe 28 PID 2964 wrote to memory of 2816 2964 fe25571c30e09cc1b47f1363a75f4e22_JaffaCakes118.exe 28 PID 2964 wrote to memory of 2816 2964 fe25571c30e09cc1b47f1363a75f4e22_JaffaCakes118.exe 28 PID 2816 wrote to memory of 2568 2816 cmd.exe 30 PID 2816 wrote to memory of 2568 2816 cmd.exe 30 PID 2816 wrote to memory of 2568 2816 cmd.exe 30 PID 2816 wrote to memory of 2568 2816 cmd.exe 30 PID 2568 wrote to memory of 2824 2568 iexplore.exe 31 PID 2568 wrote to memory of 2824 2568 iexplore.exe 31 PID 2568 wrote to memory of 2824 2568 iexplore.exe 31 PID 2568 wrote to memory of 2824 2568 iexplore.exe 31 PID 2964 wrote to memory of 2568 2964 fe25571c30e09cc1b47f1363a75f4e22_JaffaCakes118.exe 30 PID 2964 wrote to memory of 2568 2964 fe25571c30e09cc1b47f1363a75f4e22_JaffaCakes118.exe 30 PID 2964 wrote to memory of 2568 2964 fe25571c30e09cc1b47f1363a75f4e22_JaffaCakes118.exe 30 PID 2964 wrote to memory of 2568 2964 fe25571c30e09cc1b47f1363a75f4e22_JaffaCakes118.exe 30 PID 2964 wrote to memory of 2408 2964 fe25571c30e09cc1b47f1363a75f4e22_JaffaCakes118.exe 32 PID 2964 wrote to memory of 2408 2964 fe25571c30e09cc1b47f1363a75f4e22_JaffaCakes118.exe 32 PID 2964 wrote to memory of 2408 2964 fe25571c30e09cc1b47f1363a75f4e22_JaffaCakes118.exe 32 PID 2964 wrote to memory of 2408 2964 fe25571c30e09cc1b47f1363a75f4e22_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe25571c30e09cc1b47f1363a75f4e22_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe25571c30e09cc1b47f1363a75f4e22_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding2⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2568 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fe25571c30e09cc1b47f1363a75f4e22_JaffaCakes118.bat"2⤵
- Deletes itself
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5582cb848a9a3c122ff4436a6f6ce27d6
SHA1f7396615d2b5ef6eca69cb8b70bd33e7c3fdad96
SHA2561b4ca7b7e6213ace755dd980677fad5c773bc388a2fb1e7477f70e8007a62ccd
SHA512783984adcb2c5a9821a48eac305bb6dbad27233abe144692ca73ca57151fbff0cae5dc7a862c3dd5a6db982083000f006b39e24d0440c8c1874ecd9e5ac1eea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f28b24b06517c70c91b9e1cca16fbb42
SHA1dbff9916d62ed7030749d150215ec97e7ea7b425
SHA25642ab0c886d2b4b26b6fcd65b19f2aa891b09486f1b0e802f119717afe7a178ee
SHA512048e45d99f1b6fa03eaf544d19889f88934af731f2e7f90e07c9d7426a961074c8edafe0f2bb72ba876ba336987df113a34ef093d8499be0d7301f8d8e030e0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515469387b26aeb587390b577148788bd
SHA187b24cf156da105f635addb807dce62e76d7658c
SHA25677dc38ffd3c17b6770a5e5c5e445fc94abe3648b5c23c7110290bb1df1c5ec1e
SHA512d4244999181d05970eaaf9f5805b4fbca9ce255673fa20de99d7d00c3caa5fbb99dcee461e46370789c81f6ce3829790741aa10f55effb67793c86f98442f5f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531ad69b43544e94f8afaacdd53d7b2c0
SHA1e89c832432040e5ea87d0f17a985bc1de1047b48
SHA2568c40767170a1fcdf98c885fcfea3c1ef65a35a353f2de96e066610b1edf66d65
SHA512413fa5083f681f36107691956d3d1dd658f1558c441407446f1d5e17d87647cbe8e6417a885d87e97d1f954c0076f81dea36f93cf36894384525a52c7c8af0e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558acc1082ba0a3396c08f3314adfa60a
SHA16f6418d675ee69ccd95022c597f00b15fda9a35b
SHA256e77b53481baf885d2b2454e78b267bf1f9111db06a5f739678455c5a36ae94e2
SHA512f079dd6645e22663c2c5592fad84ba18e497af9b56bae8996577301058a6d6d6c137cb99014fcc7ad81b85d74810ebd225190ded6394f725da32468c6198d905
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
305B
MD5728450582d85a353c90c400b7ddc830c
SHA11ac1bf18d6bf9ba7750e012524b2760dc8808d41
SHA2562aa17ce7b2f897b61e1af292477f3b7c01f809756d3400f7ba4c8d83ff21d97a
SHA5121cbdcc5eab2dceb2644a8330f3a40b1ef19c0f019c64c68755b875a19de0dde504db92666e688c50bae5f79c0895935bbb1bfe74771d74b801a2df4a26ee630b
-
Filesize
30KB
MD53b56398988922f2dde5d70b67ca681f2
SHA17937962aa1ca1dc5551b7b40e36693701d8f0ab4
SHA256c829aaa4bf040586426bdfe3c2bd1c4c532e65fc90f7570c3df05f95f83b5449
SHA51227d9dba6fa440661ef617badcbd5e665e844ada160d8505bad030018f5e480cab4394b1e3ed4a22df501c852303075522f4a71d337952f2cdc63b76930132557