Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 19:13
Static task
static1
Behavioral task
behavioral1
Sample
0f3555ee0fee460c29e9ef05f2587367_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f3555ee0fee460c29e9ef05f2587367_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0f3555ee0fee460c29e9ef05f2587367_JaffaCakes118.exe
-
Size
241KB
-
MD5
0f3555ee0fee460c29e9ef05f2587367
-
SHA1
71aecae0517b9d287b236a768a6db3187734b16b
-
SHA256
f8c0c0ecb40abe688c398f8bd47e679707cdd58deb97114f1d92ecfb9f6b1d7a
-
SHA512
b56875868196f718f24582b9221b5f6217135ed52c743aa8802534c2328a7dd893ecb6932455ffc58dd6689cea6f44ee5528c2bd36d20644851879135bc5158d
-
SSDEEP
3072:IeK9q8FQ1M2x45xqRF5ATfq9jXL0OOG8ExQIchDUfHj7b5x1JoNe8sq3ex/t01w3:INE8FQnYxmdUeHchgrz1ke8sG8Yu
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ab55d71fedb03e42a583a7c6192d6f8000000000020000000000106600000001000020000000c4d56d2f7a88fb9f93b0a2a72b163d8621b205d9f802fba577bf9649964f1a07000000000e8000000002000020000000f7328733b79f5dbff56a10932ea9f47459aca3734c2c09594d1e02a2aef0d32c20000000b0559682538f5003b4b3f1d264f963073ffa118e7b831f5cfdb7563687c1f32a4000000042c63e61194d78673387d430efc55a7c33debedc43a4a18e5df4266098d598ff35bbfd807f6324ba0a62890bdcbdbc9b63b8762302552317dc8eb35b8b87a2a0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{005BC4D1-3327-11EF-9F86-7EEA931DE775} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 808d2ed833c7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425504675" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2996 iexplore.exe 2996 iexplore.exe 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2996 2168 0f3555ee0fee460c29e9ef05f2587367_JaffaCakes118.exe 28 PID 2168 wrote to memory of 2996 2168 0f3555ee0fee460c29e9ef05f2587367_JaffaCakes118.exe 28 PID 2168 wrote to memory of 2996 2168 0f3555ee0fee460c29e9ef05f2587367_JaffaCakes118.exe 28 PID 2168 wrote to memory of 2996 2168 0f3555ee0fee460c29e9ef05f2587367_JaffaCakes118.exe 28 PID 2996 wrote to memory of 2512 2996 iexplore.exe 29 PID 2996 wrote to memory of 2512 2996 iexplore.exe 29 PID 2996 wrote to memory of 2512 2996 iexplore.exe 29 PID 2996 wrote to memory of 2512 2996 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f3555ee0fee460c29e9ef05f2587367_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0f3555ee0fee460c29e9ef05f2587367_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.mpf.gov.br/distribuicao/distribuicao2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2996 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2512
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5751a9267af143658a6c3181a349d76f2
SHA1e4d07fcbeb422f82d7803e82602889090974fd81
SHA25621dbf767ae4ebabdfc8abc409f48189205b3e2c44709af3d1616de540bd784bd
SHA5121a79fe31d23ae8ac68e33b1b5e675148d490792666567a859dfb8f13aeddbf1bba6f9a0a5dee642df75ce87925562b1e05aae0636290e80701302c9b51ab4ea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f019173c6aa7c1946ce2f0c8e0c7a06
SHA144dd93e7baef7d1448aa197498aac30357fe1ef3
SHA2561f90d172e6bd1d69d691437e517a75972070390f0f0e64be36bb0e242b105055
SHA512c54dcb86a4e927562ba9e85c4d682f51aa08766ef3fa9f9d0776f6218fec7d10aef2046c0a72c3ec70a142ddd0ddd36e52146f110f88a371ba515ac846bae3dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517597411283ec9c6a27ff3613943eb7e
SHA1f1441b9bd53c9e38dbae5bde8cd6edc817b84275
SHA256e60a77f095978c3ba4472ce166f05e525a7a5d91702c694d937dd3b67b4ef89b
SHA512120503c6c42647a3c3a67d3ada582045ecad4ede3f6da47b67edba1297c04567cc1eed19918ecd0ad2d3444e7bd78a6f8e3898d44f6ce7059c017be2e7062229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc1ced2ec83e754a27ab5f533db3758a
SHA1041e4ab6cbdddb6b64423cfaffa58225d5337342
SHA2567b0dd98880bad700e2898aff2db1bf42d0c17ace8660a072def7f34c0f0c33f0
SHA512c1488a0b1adc283aa05c3a17471bd3ad17795b86131d2661c73349a9430624f656ce3a36eff7fce2b57b03529b818cef4ed9320898720916bfbe186607ad8f59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553cdbf5a327d8108ad871c5833fdcc0a
SHA11773044fd6e41d881e82ca24b2bf1b9072f6d552
SHA256664c995a43f572a7335c5082e7fc988445b94d506827efa7f3d90014fdbabae5
SHA5122bf9bdbb7c765863644370bb7cc302e40b4ca7605a3c0628284aa5130681914f79ae8ab8a9c1863cd713cc4fac84a978bdc2501cd326b9718c03c35121f11656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d07226e30950197e14770a0dd6d5534f
SHA10938fd6020e6f72513b487ce02fd6a510a216f86
SHA256917a8d98c64e6adf71863d79d9fec9da08a48e1eada2730ad6cd0e6444dd840b
SHA512f84d57142f4b86937f75fdb1289fb5a56ff0a36e72c112a009272e89d49e1075c314d371362c482aa5aa747b08983648decde663f050ba3607dc5dcc45b51148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531b2961c9a2896f28908366fa2ea201c
SHA13c73bfd619dde56b5bde910eecfba19af349d567
SHA256c92ab79b419294251b0f2407021c7eafbeb98aa55ce9eb90b836128be0d0c5a3
SHA5128d7bfbc5f97de17c7b5ab250fb249d7f5da660a019f5cd8cbaef6d8dbcffb2717b26d8723197b4201ddc0859df33d624fff91e529de9084566cd41bc22ca3275
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0bfa9ea8d8aa6277dfe914bb870f8fd
SHA1bd108e3d6f0e48dc5913d02a3e97c399c7ff157d
SHA256ca00216539ad05cf1f70007b024e54d3e85c7f4bca8d9836e5892265e712b27b
SHA5125e1a066250118bbb5b27724b7a09da437ac6aaf40868b93b55f437badc5ae1331f69761fe033b44198b3bfdf8c7d8ababb7fff395a8fb81cc41b8c0c53acdd48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d3ff1f6100077ec2d3a74711483dc23
SHA1e85ce2d7cc2b301ec301858df2a09eaeef74eb0d
SHA256007b5a9d2afbc075bac37a873567bcdd6f9b1a0d5792dfef930c4fa91bf3c30c
SHA512171f43a98a52ad35fcfa72383cb8f79e4f369d01e3fd7125b51c5426320e1a68dc1e9a00501f7c9e7277e59e95e570619fd984551fab661fbc707a673640cb36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac42393f09fd556168345b1858235d73
SHA1322850415419879d55d9ed0c63e12cd2658d0835
SHA25655a44bf18d03a4cdca771d00d26d244861386b4a8e87b28c8565be8d81ea40ab
SHA512db05403d94210ea7c56c1046f453449331a9f7151e81f1563b66255b33f3326d90ec13db0bb49788e845e83259ec85e49b8b5f2ea1a6fc6618ffadd9abc27786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59657c342c4a97bb2ff3444cb74d14689
SHA1c72601dba37f7ffecef3c0ac4d912200f5286f28
SHA2567845604af1014d9d5ba6a443d5a9840aa363ffc73ee5ec8effd4d2c76abde856
SHA512907a3d112645f3177324a2454b8624982505900658e11045c5fecbeaafbcd3f62769fbf235d00183a2d6cc2745df36b0d6ec24efa3ac7be03405a30ab5bb94c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59853bb905fcc74a29fe19f3a31d401d3
SHA158ed21c229d827789c50aadc30ca92b7d74a080e
SHA2566a0bcf7627d4cbc711218b80aa485bd079fde2617c0893c51d06f775d6dc6f82
SHA5126c62d6336d4febfb949babcc5c88b9ece957f71ba4d1d7ab23b7e7e7db5eb8e9545307706348eb720bff390c95356280530e56991463f2a1396008be8e9c6d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db57038a787204d25f9fa679f587ad32
SHA12e399f4aaaf51a109a5183b338dceea928744379
SHA2561cf28c1b4170f5f249c7a5f3236e77c89c34b3c7d4990035b8f20437533f00b5
SHA51248b6f849d25a78f4ace40d2daa247f2fe38096c49fd87cdcf1be7f4d036d40b9c7e1f81cccf84bff57e3e3aee632b07a1f8b1b3fc8a9ac7e349c21510c18a988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e408c5a36a38b57a56fd05ca4e52d64
SHA1fd24e8fe75e4e4347efdd7b7057f79f561d84213
SHA2566d313c888df43618d0f272414adf8b2cd75f56d1966f7f17b4a37371dc32b77b
SHA5120094187e8e54bfb5c1cdac644fc38ee8a820df601c606887d972b491c8cf462d9b0b8afca99ff2d807b738aa2287fe625a74df3a1669e62d40d6a3527c7b0cc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c259d8091237bdcb20b649f28e173462
SHA138770b27a5387dcd8e1db8a411a23dc03ac9d456
SHA256f0626979a356d6522062d8ca2668f9e3fffa6b561160beb32af454ae7c9b7148
SHA51206c386dd0d068d741b43c3fc900e583aaea80bba647247c1bc3aaa2d7c25f0c4713a7d61fcacbfaafef2526f8138cbde5e4a701e4e59bf6cd9e060bc5e2ad04f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e47481efbb8395bb09df872160bb1d1
SHA18a9b9f03182699b2bf06b8e044d9868b6cc273b1
SHA256ef58eea2a814789a5c57cb140baaece3fb57742d075193d559c9976c9a7288e8
SHA5120b7e67d19ecda45db4b1e901c27cf607de8eb1d3686f12d7867fffc743d57aeb487f5f21ceba28b94fdc69a35200a8174a052081612efd91fa8aa40bc58fedbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5143b719fc251a3ddea97ad796b0a4e94
SHA17593c568e21f1a12255282243f4762729ef36f94
SHA256befbf172456b22fdaf459733a92a3d542869ade5423a55da4059fca2f26b26a8
SHA512c60e20fe5b45d70b2605f8be194ee298958f6168461123db6a540bdc9fbd77f29a38385a678748b7cb313e357f6573d3fc613e32fdd3d6504a99f2f118a4c2d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e092076469919a279b6fa500e6632df4
SHA10a1de82afb615d6eb0782ef3eacf1e0025e8502c
SHA25619b3d9f2fa93f1b41324703a68a3fefc39893a9c0e1e4cc099938031db4a6a29
SHA5122a3cb7fe1c41e6e1663b1919ec3231c3841dda5ab11c9e61b7e1c673274a7181b7f66a4a4a00b85d75c90df59691d9b4b0cbbe44f28364350d350eaed6c69488
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b