Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 04:18
Static task
static1
Behavioral task
behavioral1
Sample
0c7e69f257af9d47ec8c86cdc51ef405_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0c7e69f257af9d47ec8c86cdc51ef405_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0c7e69f257af9d47ec8c86cdc51ef405_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
0c7e69f257af9d47ec8c86cdc51ef405
-
SHA1
347b9ceb210400e329de86542ae416311bb0939b
-
SHA256
d4a5385e12616ddd43efe294e75c3261df0ad0bcb9dbdac881cf10359f0a64b1
-
SHA512
7f8901fc00a339110f5d162f0562be8fdcbc796fe84778929c4bc68f4846dbe64fce0be95f16fbf025323e5429019309ddeb40816453694d4f22c6c7e6664971
-
SSDEEP
24576:+tfvYdzpug9L3EHhIaH0YtQyMfiXlEVLB:YnYeS7EPIwl2
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\ecX9ere.sys 0c7e69f257af9d47ec8c86cdc51ef405_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0bb8dfeb6c6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425451016" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008fe50371f4c2654a9f0c62f3e11a967a00000000020000000000106600000001000020000000f8f0b62beb417ce63d35298c2fce0314022a18502cc653632465c291daae6110000000000e8000000002000020000000c8d0696e5b5f6dae1abffd1f3ea989ee88f8d9b09b7f918728f40e94bc94b85f2000000080337d85b6ef8b3ff92d16e0a50af165aeaa6d08dd6ca2a913394250fc317fc340000000c59d9e983a6488f8e65f01bd8de9e261003cdb6c5fa7f762fe578e1ce5214e95c1d64a55796babdc17fb877da254e14fcab5c8611ddade6feb393c05b8ec6071 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main 0c7e69f257af9d47ec8c86cdc51ef405_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{11156291-32AA-11EF-919D-C273E1627A77} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 480 Process not Found 480 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1044 0c7e69f257af9d47ec8c86cdc51ef405_JaffaCakes118.exe 1044 0c7e69f257af9d47ec8c86cdc51ef405_JaffaCakes118.exe 1044 0c7e69f257af9d47ec8c86cdc51ef405_JaffaCakes118.exe 1044 0c7e69f257af9d47ec8c86cdc51ef405_JaffaCakes118.exe 2512 iexplore.exe 2512 iexplore.exe 1696 IEXPLORE.EXE 1696 IEXPLORE.EXE 1696 IEXPLORE.EXE 1696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2512 1044 0c7e69f257af9d47ec8c86cdc51ef405_JaffaCakes118.exe 30 PID 1044 wrote to memory of 2512 1044 0c7e69f257af9d47ec8c86cdc51ef405_JaffaCakes118.exe 30 PID 1044 wrote to memory of 2512 1044 0c7e69f257af9d47ec8c86cdc51ef405_JaffaCakes118.exe 30 PID 1044 wrote to memory of 2512 1044 0c7e69f257af9d47ec8c86cdc51ef405_JaffaCakes118.exe 30 PID 2512 wrote to memory of 1696 2512 iexplore.exe 31 PID 2512 wrote to memory of 1696 2512 iexplore.exe 31 PID 2512 wrote to memory of 1696 2512 iexplore.exe 31 PID 2512 wrote to memory of 1696 2512 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c7e69f257af9d47ec8c86cdc51ef405_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0c7e69f257af9d47ec8c86cdc51ef405_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.p2yx.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5eec0f3766bc65238bf641177e1899e48
SHA1bcf3d2862591a84ff2c9cf1d4741cf885a931ad8
SHA256df79d7cf52342b1540bb2836a4a6e53590d57eff94f2f22f8e341c53f884ddb3
SHA512c250a03a30e7d6af0b49fa6712d33e603f7d7f0b501af9f7d274c757999f17cd3dc45961feffa766203b2740502bb74407ef522ac77f07d2d2daeaec5696306f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53621e8c7c26e4a9903461c3e2d2b3adf
SHA1ee6631d9105fee47c699d80b84b8fbd5b078a1c8
SHA256bb8d0c3a4d08829c7effc54d5a8db8ed1a10a0358e41808e6433cb2d127c427a
SHA512e53c149334c529665b186f5515029088813515960b86e9bd1d2677b0591f8b32a7e39ff1b467abbb835c9856febe0b0803cd447fa8c1735e09fbc0328195e806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54de2312ff9ed51b5998a684162de8a9e
SHA1fa68055bec5004117ef3bcdcff8197470a38321e
SHA256bdfb5063d9f9c668e6b38f7a41a1b858f6e3bddbd2623e3850eeb4c9d3d73c6d
SHA5120a07f81d7ecffc7d4808c0fb99b2c6e1bf2171765a6f339b9af482282d1a8ee18dab4c5d640b43d9e4e402c4bc32cf908e793b7b0215884d6e5300dad628533a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0581d7401ffd7fe244f145bed485652
SHA13afb98e84e0a43149e3ecff5cf678662e23b4bd3
SHA2563da435a30e787d8f38f3ece9502506f55a7847a8b00faca9cd92f312662f1b34
SHA5128d3e3c4c18c9d7390c23f1dfba30886beafdc7e3b6e256febca9886295d1357a3d070153dcb2267535ba75a9be21c307c0a24def2b686c8b0a55c16424817339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5155341e00e714303f94b655acb732397
SHA1bd69ee0eef5a8cb8e285eab967f63b753e91eda6
SHA2568599e887be8d1ded2b40d0c1a777fe5a322f69b975fcfbb7a33fc947567b18e9
SHA512ea24f10e89035b473d4d608c6e20c56756ce6b4badccbb0ecd2de11f373f9acede8d6de59ce3fcc6f5b42541f70057fcf46196fae249c2aa4a2e8c22c18fb66c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58807b7e39dff66a14b93d6d3675487a6
SHA171e41d10f8ce9d2c5a6ba6f5bb3998d6c8a243f8
SHA256fcc926eb323e403035d966082897038caa9be0a5f809c6c0ce50d6c99b091af0
SHA512fabab91905612fdd93dd6d8068d5c52ce1ed487a5ff8365dabe9f1295bbd8490d938ef5b6e076f31ae5ab330e650e6d54b9e78b32c413b4c551d7c78ab5d422f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d95386a11f8e9f608d9746645b19fc03
SHA14a1eaf2dece91c7102142adf41ecc17b928ff14a
SHA256d51ffff461b49e92fe5e0349cc96e882d8ab5b3d95cb720faf93a42908c0cfae
SHA512c75571877f40484f20ed854d0dcabaef61c0b6d72349b5a7796862d843ba899409ca8681609e59f19c6425d2e5c8a3c078121f20f3685adbb75c8c09ff4cca4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aebe00511df8a8977aabc994a6b4b7e
SHA1ac334da1164353a6592c6276001b4a9935ecaa9b
SHA256e32237a85fdba77edbe119a43c3da91f791383b58ea50feff19186484deaf550
SHA512f43b1ed7fa4e73855853dd1fde980b6e77c616bb03b8bf77c9572b9c96b6312a39a4b53b616279c4bbfe9085a8c0bf60cc70338ddc037dfbf6747f39fd58eaf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deddd310c281ea70d25c1191e816b5ab
SHA1c786132770f9268cd822d4a98036d78c9fee06ed
SHA256b368d4f84732932bed651cfa4eebdfe491cb5490afc0b56357264c71f0decf96
SHA512d9e9062f9a3bf3cff04aa2eeec839043008438352a35a8efbd65967c29b8412462e761ca88b9ce7f8528feabef13e5e9b4e251d16dd5262d85ce8860384262a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c385dc526ce129e93517c4e72584184c
SHA1e1d59881f05a963f14be0e6ce01f40814ca7423f
SHA2561d60199bffc7eccfc2e12092e151445d65f2716c71a97c8d58e8047750b56299
SHA512ce3e0ef484a7061bb1c39a07186d0d146a3a9ccced05d260b029d75af6927ef162311c1a189a4c22a520b92f1851b0d27d1e133f9b75e89ade666ce8e305b2a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b073c09bf7ff0338e0f33a8237d40623
SHA174977fd3c566aa78e1bd380bd9796ae8b4d34c3e
SHA25698baa3d7944c6825d76a9733276cfd3178729eabc64c30febffe51089c5b3de9
SHA512dcb59bd8a14e054c26e6d5e5e84274075c2533f998ebb4c138efeb786125d80f90444c2ed1a0d1052413716feeb760a85bd1e06049aef8200622b7c17d888ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5f024393eea254565c61e9b64f2833917
SHA13e9d51c9ad4fb7ae2624e49fd660aa831352df7c
SHA2562f0d6f8bed11d575d85a006e58ee92ff76e3f854993989748054074dea5e7815
SHA5128d4a24b695a11089fd04e68ec3eaabded965e692e8856b1f94b58b9fc0fea290c8cb1c8a12c1163b57b42a2f09981d96ed332f077ebb7880a19b9396c79e9dd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1J4KG2LT\errorPageStrings[1]
Filesize2KB
MD5e3e4a98353f119b80b323302f26b78fa
SHA120ee35a370cdd3a8a7d04b506410300fd0a6a864
SHA2569466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66
SHA512d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b