Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 10:57
Static task
static1
Behavioral task
behavioral1
Sample
284c16ace3914c62dfcb388aed05d39b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
284c16ace3914c62dfcb388aed05d39b_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
284c16ace3914c62dfcb388aed05d39b_JaffaCakes118.exe
-
Size
361KB
-
MD5
284c16ace3914c62dfcb388aed05d39b
-
SHA1
60226d742ec5e8a344618e0ca520fbd013cdae2d
-
SHA256
76bba245e18002fbb71219f6a7e81f8ef3d7489e2b58fb5359538a818ac9844d
-
SHA512
34783b40f2447d4e808d9c61bd9178293909f94e481c68dd0ac0e1478e3d0c2ff5c88f64f2e77405a910cd88294f23f3b7794c4d8a7eb9bf945e888c2d9cda7f
-
SSDEEP
6144:88I6FUzk1lvxQUdHx+Ywbzm6TR4bJNN4lF8uy2XYtBufJsjf+h/H2sPl:66yzkTxQwxVs+bJNqXYXkJsj2hesd
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426428402" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c062ef8d9acfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B6C4C8C1-3B8D-11EF-B798-7A3ECDA2562B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000dcadf5dcccda5d4f95d3c0c36b0e1197a5289e9ec02d5a9a037b635d6a84be5c000000000e80000000020000200000009c036ef700c90b68a70740975c65614aaca7b2aeda7c956ceb86133ffde2eb5f20000000ca87b310ca1b12b96c22f8b5a68141db4d25bc454c962f468be85de77567ddb340000000b11d8aa79d698f7520113471d8879c8170d42b030b957c45e331aea2d2b7ed6c0805e51209e47315f13c51c41aeb5a1cb9a8db4707b54b1d78adabe876429009 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2236 2936 284c16ace3914c62dfcb388aed05d39b_JaffaCakes118.exe 30 PID 2936 wrote to memory of 2236 2936 284c16ace3914c62dfcb388aed05d39b_JaffaCakes118.exe 30 PID 2936 wrote to memory of 2236 2936 284c16ace3914c62dfcb388aed05d39b_JaffaCakes118.exe 30 PID 2936 wrote to memory of 2236 2936 284c16ace3914c62dfcb388aed05d39b_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1940 2236 iexplore.exe 31 PID 2236 wrote to memory of 1940 2236 iexplore.exe 31 PID 2236 wrote to memory of 1940 2236 iexplore.exe 31 PID 2236 wrote to memory of 1940 2236 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\284c16ace3914c62dfcb388aed05d39b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\284c16ace3914c62dfcb388aed05d39b_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.orkut.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1940
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578db67f018a1d958b0796549be45fb21
SHA1708a217a97002203c37714c3d1c2a708fae2c185
SHA2564eb3b986ad8a7e696eb4e5d1b749a5b3cdae5ef5665a8df9235844fa4b8dcd85
SHA512053f309aa81320e2170a6ccfa4114a041ff2b5866b04a29d27202c988038057e67069c290c41bc2149e5ac77ee011b810d5a1aba80ec7b7609b5a5832ec181c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500ae1797719f68b05ef402680afc88d2
SHA17725bedcdf705d6d1a40adfdaab326e42b1faeb5
SHA2567d29467fbed4bcc2d509669be5c3c7875cd98d6a1d134b81e14a070c859d832a
SHA51264a1bb53c6298a89914236bb60cc86fef7ab99b8f8382116f2e1c2812d837dc5d22ca11a6f1c4abb4f9626500db4fbcc03ee4d052ea4ec1104ddc425950c54b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52db5721454c2d5ed75bde4a330e0e1aa
SHA10b8a60834c1f593698259156e8cb3a5750014f89
SHA256b6cb34f669d7fbcb93025d327d851fe4dfbcd0a8208fcda877ba8f659b8cac02
SHA512da3423db58b0e048145c3837a0607353a2690929fef9e512d38f26e40e54b76edb60f78607f7b10dfd51eb7c73c42d950ad02d557189de23fed21302738f280c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d10387f409aacb27326220f418f5550f
SHA1f6d41aecd526a97561ab254a8bba35ce5c08ae12
SHA256f501c5a40c87635c3fdc812b29d62460ce438b02237978f3da1ed9d4faf40f0b
SHA512193091a8367a7c412bbd5034b7309a3fd9316955a52adaee5bd2d19316a4f4373c4d03968c39536b4591c88c49e8bd1a1f047c08f2d6954595cdf9aa59337d74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5936e6474ddd8704708085605aa3c3daa
SHA1a58e14bd0e83b12e9d4eb5ca643bf87669e542ff
SHA256fc6c8c9932ddbf77027eca81f9406794038f5ce9f037a5560e266fbe57fc18b7
SHA51208fc37ac57f7746d9037afdcf54bdd9b5bd977046ab91fa6c558e3a438d716148b0ee35575ebf1aafb5e327f3a695e31fb0d51b0fff4c200f590204e7f9c7fb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc7beb417a3367f952d4359f0cbc8d67
SHA111b48249c2071ddfba8dd5071f747a65bebd6ec3
SHA256f4e650f31dafa26c3535259be83bd9c838d97ac2368ad22084df8c0ee2b4edb5
SHA512c0ee878286538c3568913fbc27aab0dd8b76951f3153fd4c3d903447ee8ec3f5103d0d90a1ab77ba758fed54852a3c98c2b94e14745a5b4e8ba81bde9bf66790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562e0c8d0d9e6c6fdb5f7b4c707a6a5d7
SHA187cc9f782f3edf188b1196fe934fa74526ba686c
SHA256b2d9a5ad33d511951a61c758f43fcfe30934e7c96d18e3fdf132d946d25a4747
SHA5124f3ff0d2afe94054fac63379a9d83d75f132b9c5dabdb17c71e9d50f77ca8b8d5d7f94ffd3648171bd9f82768f29c656a393a4f16732b1c90a3e1ba075250bf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd5e95c5b12dde1974ff9228eddf70b2
SHA1076ec4f4888242415451e150598277a54b244732
SHA25678a00294e624e9a7c56421233b83cd945b92bf867ef5ebfca70a224b9f6e5c4f
SHA512c42f89ed003d638e4b4968d60cbc45543747026e7836d0f350f6ebe865d576c048b6c02ab9a4de9b6be3e90451127a7a526e6e4b85103127c457fef3e58ba2f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5083d42cb9e033a8d82e5b183c0819000
SHA1bdad0e273daaaf70b5979d737c61a848ec2d3e8d
SHA25607581a535f6b432a409b959ed6236105dc8bb49b7ec2a3920f684e12fab37564
SHA512132820467a92fe94b683d0ca69ea18b247c692c64b8753d281349402478024a710a4080abb2e415cba6322ee9eeb0ad8b78730318331c7fd5cb8395e12d0022a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e92bec803f947adace0451497a92d72
SHA17e3661abf68c6cb2a1adda0dc5e91ae96fff75ee
SHA2565480b9bdf54e11ca610bdaa1f2387a91cb02f873fc15e16ee09c37d775429a3c
SHA512e091bf7bf4672e249060ba97f2f14167cbc1c677e13e1f2b6d523a12cb8f2ed5b40c3ef2338c57557c2ce98a3f2e35ca7056251136323a3aaab5b98a4d5a1929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd4d0a44a929c87489ceeb5f1ab2fa13
SHA1f9d9d530cd4e73a192329399f15e70fbf9eced2b
SHA256a10cdd9a3ee0d26e4e53fa4b189d3e659dd502c0dcab1668a6278cb8598c47bb
SHA51223b985a57fb1d924553b8408635fcc3c5af4a6430c60b8ab80fa6d407285d6642c7bb27c8bb547f8b3e9c7ffa3fa4ce0d4c1d8370eefc3644b2fca1ac98f795f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d844b276caa96cd3000b0b8aa31e503
SHA150244275c3ee5b968ead33de3d78fe1bd0b1484e
SHA2567a0572b3a88c74337389b32ffc47702bef1ef138154d3fab82c89b8d2b7ad168
SHA5127df6caa4f0a6eba4edba6c10f8f9be4ee81ca892762fcb02c7d4acf6c45bd8bc7b2bb185a723a098b498face2f36dc6cb1e5aa890b5b870f3a78de6df0404bf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564402fd47bc89565637c842ebad607a9
SHA1143f01f7d9bbba809fa84c903bed1fce9a76097f
SHA25635e6cc3d4f6a8870d6e7e0a8f705e0dae50be7431dcd5812f1932130d34dff36
SHA512f56b0ae287ae98713758a9c6be84c1f55c520471e2ff2e2a5636369b91d4947ef978ed47a4136c202a92b18aed016a79495b90ac3c09f6e23c23fbe4a7c1a920
-
Filesize
99KB
MD56b29786373546cc3eeb4964fcdda5f72
SHA188c80bdeda33ed19091b16bc61bf74a93eb39a1d
SHA25630aa30d2953d945941ad28103e354ac5db1caefcb8d03c64778d2f89f7e23007
SHA512542c07c18f636b0a70d7de40565ae2b2458b5257d38b795f617ffcce7ce5ced16471b8e7f2561d5f88a12965ef4a8341a78be490de3b60a963f380d99a0bfddf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\J7FHNNOW\favicon[2].ico
Filesize99KB
MD5562fe6b5bc02c09537b054ba674740f3
SHA1082f9d8d488f49c3085384009e9700b207dbd8c4
SHA25629b906ce83796e0f46ff07dffbb9cd63278bace576d063fe3d888ab41c76e0d3
SHA512c1a82e9104b03fc145aa8df7146b316e737d60cbacf6ec5221e0b7ccec4ef8f0bb9267f950363c84d3f67e916d728f36ca79f9d244400f8bcf3ff14a909a20ad
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b