Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 18:48
Static task
static1
Behavioral task
behavioral1
Sample
23642a71211d346a015a525713313957_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
23642a71211d346a015a525713313957_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
23642a71211d346a015a525713313957_JaffaCakes118.exe
-
Size
196KB
-
MD5
23642a71211d346a015a525713313957
-
SHA1
b45ce8723dc745fffb378f3d3594b3aa5206af8f
-
SHA256
912a26080fa27534ee06efdcda1bc91afa946966c815d547ccd19a145518d8a4
-
SHA512
597e91ba0e2dc1d614a5f202ca5efdb599e90fd7697ce01a86071dff854adb5b92723bc4dea942f50395003f90b00a1db4087a07b9bfc27a61378640c46b45b5
-
SSDEEP
3072:OYrfWmeiYZ/4cus3xfbDqDQq8SS63Z7Oi1HCb4SAcOOvcoYLM9WPyWCzT:3fWYYO6d1SSCOivpoeXjCz
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426194375" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D5A17C21-396C-11EF-8F9A-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0579ac379cdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001b1cd909dd66d642a98b3b394631b4b0000000000200000000001066000000010000200000003185d8f4821dcd250a6655877253d1127ee2c3a7a0476167f988b981d38c32cc000000000e80000000020000200000002673922d3b3eba3450cb61f43bc7d9fab9f4194ba87170c199521d1d85e24cf420000000b8fa2f3bd33b8e12d351a567671a446bf8f33302913b2ef84337a8fe4940b02740000000ece0ba9955e425d9f80d1b6ff153710ca77b08ba182a764e0e2c5221650ad54e7443ccd6e0b36a3e203104e52fed9f399af1df78cf74c19776b66cada1afd753 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1936 iexplore.exe 1936 iexplore.exe 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1924 wrote to memory of 1936 1924 23642a71211d346a015a525713313957_JaffaCakes118.exe 28 PID 1924 wrote to memory of 1936 1924 23642a71211d346a015a525713313957_JaffaCakes118.exe 28 PID 1924 wrote to memory of 1936 1924 23642a71211d346a015a525713313957_JaffaCakes118.exe 28 PID 1924 wrote to memory of 1936 1924 23642a71211d346a015a525713313957_JaffaCakes118.exe 28 PID 1936 wrote to memory of 2656 1936 iexplore.exe 30 PID 1936 wrote to memory of 2656 1936 iexplore.exe 30 PID 1936 wrote to memory of 2656 1936 iexplore.exe 30 PID 1936 wrote to memory of 2656 1936 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\23642a71211d346a015a525713313957_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\23642a71211d346a015a525713313957_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.spcnegocios.org.br/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6395789f97b1a07c71cfce91cd6403a
SHA116bfbca48115aed803c96f9dfd3350818783c3d2
SHA256f061a05b679dbd8e0e8828f611c20e9185651120522d1500b3c91566acb3f983
SHA512f4d4f05bc7e4607f521e296d745d8ad9e523a0e74d18cb8c5901f3881df33abd641ee00a56551131a85fd00bed32f671bb3e216a300eab463d34e890cefde0cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0524e5b4d723b25cb03c759b1ecb30d
SHA1d3f5bcdbe29ef1d59ccf30abb2701a16a70c1892
SHA256a6c955a14b7e5a7851cba2ad37535240d440311c1818684b5f97d48d1bd52b20
SHA512c42c21b3e889af245d1567d137680beb41adb5e4d923496b4644bea16209b0084f1de9537785601faf2bd6e8730736dd5804c158dc1e0d489f84b6bce4122a46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa7dfeca35c5c8ab32bee56b2d647cf9
SHA1fdfdf4b3c68eafe36515077a97971ede3273e42a
SHA256b86c324d48f8067ee0a994adcd2575f9ee1517407eddc3b73e58539b279d931d
SHA512b31f31c1f761ad9d88be77927e07c5a688d6c9be0808ecbf8ae325a2e11698466e4d1bd72b106ae4c28366b37843b9287c39e7482ed2548ed202c01e07fc130c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5257221df0de42d1455c38eb672abc851
SHA1df0cf65282baf84069f1083fd87d928e5caf7af0
SHA256f2fff07ca51eccf0ed953df004dfeea20e55580cf81c9fe180e49beb12f7e86b
SHA512b27543c0dfaf60dda1e89f16f33820b61aee12bbe26e11d953f4a2a5b1556f4c60e5774ca2f8bb6000d027fd5c453482c0f84eb55950bae922975afe896b56a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5146bba6af5652f945cca4b6464156fcd
SHA1515c9966a00f60d26f55698658df41b581ffb5de
SHA256b725aba73befc858b3b23081ff67fc7c494b10709263ac4d7fbb2b257a8d69a2
SHA512d0ad78d18e1d99f23b3d926ecdf1491eee0703f9c17196f3210fe5428f15b5d3a52ec644a1e9e4993c69e4dcce5bc8ff5f62621e481b6f8c173e57221756f260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb143c89d5c6d845ff61f249a2ac6a99
SHA199a334044c1426659d26490cb1871b5b5c8b1d0e
SHA25687018058a2485c3bb7960ab9c824ded573957ed70a958e1dec30f81a6368171d
SHA512eb8ea6d720241a5302d7cc4954dc0e9382593c7c2bb6e680baa2190e78a590c3e4c6eece5d2476eb38b8f86f4a8de5623fdacc01a409b6dd296a64b12c19b98e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5948e7689d6f8dd08ad740c0a9c525523
SHA1f4131f951c59281cb7f82dc65085e8dd86e12fb4
SHA2565afefbf936f3e7e45cb8776b9295933680ec0e4ea5b5da38cb59134c7904cdb2
SHA5126da034a5c6db2050c8b9cbf3f54c28ef91984e5983fd2cebbd7eebe5ac90e4d1f1eaf475e8edafea8be9efa3f0642ad9761c1d80988e4dfd802f3e0b6fa0d6a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560fcf98581bcdafffa9a1222c78f1a27
SHA13681a6ee85a99da15b4aa73fe4c0eb1da99f0cf6
SHA2562bdca97b787daa34043113017d4e0b2761ba97ee72e31ef84c438901eb13831c
SHA5126594d6395b1ae04b25c7d4803935762c04a9c71ba7744874c529537da0bd46b406fb190f41bc824e9918734587d590bf159c2da661ece93be8d215f2ff37693c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a97dd500759a801fe6bbd2e8d2ff147
SHA109a719280dbb2cea3194970ff533bc223b6b1637
SHA256c883a4d24363866f309c722f27b1effb3ae92efae1103d719cacc67bc36f27a9
SHA51200f0043457e2f01457b1050e3eb140173fd8b18211e87727a399496e11b98b6e0b3cf44ff174cf009b49a35c4b11c74f3466dd588780a81f9eb08c9dc5bd82ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5585059a414228542809b7c3c2ad8c65a
SHA1a2c606bdbc7c828d83f17abddaffbe2ef5312a1e
SHA2568b215861bca35c5e3b7d8addd9b159f07cfcbce03591434e93f6f1f6db7455c7
SHA5125463e16989674c808d028c4e2183c95bf373043b1a01f165160fc517e650be41b4d7120ceb1e52a6d3a38765ba307209727bbe7b011b0319394d404666e415d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f714a8cdaf2188f7b4fd2d1408a6591
SHA1a1160c3287f846dc42f2d62cb22d9783cf4aff61
SHA2560c2bbb3998185ace4ccc0e47f6a76fca7cd72cb28cfc8cc52e9ab30c901ef237
SHA512d03b316db1b3f7a11c464969d20ebd4911bec704c64bd9d23dd82378193556153fac4be98dcbe3f9e372b98649752ce0eb8e421534f3b99050ca8d3562d23fa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adb4a8a070e0495d2c70ee2e01082c92
SHA1f19bbf1fb5e8b929825e67c37af610e3f6555475
SHA25640d60cd16f9ab5d17c190defaa7a083ca1e6549fe4aa11ed196657826630f4bc
SHA512d187f7cbce2a8bf1cb3829319d489284933c97f1007332907def9fb62a7880d3074358fddf7804113cfd9c2321e4cfc399950a8dd1458314a4a0b3ede396fb63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d54f37879a48dd3edf9c4e5fc4c24448
SHA1410b2a2353f6b08e653a31226b00c6d30eeb5963
SHA25686b5203846682fcb44fa904ccf75de214ff25292ae7d56b5a8366ec3ab8796c9
SHA5124068b373d300810f613de000e757df3368f930c636aca62339902262c9e91d889a27bbda9e9ded2ffd2f42e1d6047dcc189dda1938b011ff28c8c4ac2d57a791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfed1c4f04e59e844ca0795719fcd0a3
SHA17a903440511a517e8011e932acc6b562f8673d53
SHA256fecff8c0b01b61925793b643ec8471df4ee7816470dabab9fef2d1567d14c01a
SHA512be9d9ac949c56a99616ae1c2b1d599da45ad63cc84a3dccc06e26676b2e56f2eb201ddc5b63bdec843cf5bbd691be9f70d671dad83981d5e356ebc7305f50a17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd9be7af1164643ff5333ecff7f74b3b
SHA1f04fa0aee0949bbf7cfbb81b4742e4cdf52c26b6
SHA2569ebe471958d255cabc5bcf02e897a2fcc2c6447b601d77e29ac68d180ca9cb5f
SHA5125cd5bbc573d0a4abe6ec26be6a892498602b246c9744d234f2770bf40f469a2ca7924a12b19a063dbfc477b0fe7a60a4870b822e9c0f7148bfff484a9420c0d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaef11b0f80bfbe88d13561f82ca0742
SHA1afa84426827b04f4cb8fd3f2e08b2ac2dd95cc4a
SHA256f0508810bdcaec16152e02913b65060f68ea376fb8593444cd74f670e4afc03c
SHA5123a93e682e19a29b1ca2a76c47aa442eee1ccce4d28966a5fd4652eab57c500848d4be1c133024d3b6f2333a972a1d552fbb365a0bd3be5120cda2d7fbed302b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a30be0ee810d6b93411c8e3e426372a
SHA16aff7b074dc0e9e0bd8b98ca763c93b05495f8d2
SHA25600dfeff656433a57bc3e6a76270a6ecc2a4aa38562b7dc10907c262a36028dc7
SHA5126d0ae47e8502792deeeec44b51611a2c0dedc20e65a294a911fb4ad03b59ae24274efba3cfeb574b4bb03559341d514d1663c39fff5bc9024fb6f78e9fbc9c2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3d02e78ba2a9dd64ee632093000fc49
SHA170ccff300f49785d56dd80d00f4a8db99ea89aa2
SHA256356194de39ea8fc684374a4db9a654ae30531d80073dfabdac28bce0d141d51f
SHA51233678f226fa346292a8ec0ddd254122477ad6f83eef4f81ab8853a67989bac2a47bd37afb2655b59648bccb4f2ce9984a35aa3b6ff3aa367bd830f9db3056c37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc0fc49909faae4b80dd1f6d7f00c335
SHA119e43491ac14e17e948bd09bc5e01e7696d4d336
SHA2569bd7c3f220d1e3cca7bbc962021742aaf69f57c036b7189b3a277d4354da1e24
SHA51284bc10d8f1bdfcf240745f47bfc42a8e19af9411d82e3deec4b6345a46e1e37a2b0a08af5aee2cc2a7e313677762b004cbbb708df247a8c1ecd33358fc2188cc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b