Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-07-2024 22:52
Behavioral task
behavioral1
Sample
2a0f8dd41758d9d2b4d378c38b5a33a8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2a0f8dd41758d9d2b4d378c38b5a33a8_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2a0f8dd41758d9d2b4d378c38b5a33a8_JaffaCakes118.exe
-
Size
34KB
-
MD5
2a0f8dd41758d9d2b4d378c38b5a33a8
-
SHA1
5b5cb07db624b3354f6398b04197f46d43e93b15
-
SHA256
79c8ca59b86766adc2d9a10dd4129562d3b7bea2ccf9e9e31501ba67b0f35264
-
SHA512
1a9614507ec7ecd868992d087eca720ad1667bcb310f7091760da82710d7aa95535237c163ad40332d7d1658d76838b2e816b11838e051201d6e8695e9683e94
-
SSDEEP
768:jrLIJRD4FXFyuFLpe9b00tiP9I9zfAGvBxQ6Nta:EH6wuF1e9b00tRzfTpxFNc
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2228-0-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/2228-10-0x0000000000400000-0x000000000041C000-memory.dmp upx -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000e3a9af62520c54bb23e4b943b54d9dc00000000020000000000106600000001000020000000f0ed1a16331b4155395e5fabadeed85ceda53912e8ccf7fa86866e6730d0202d000000000e8000000002000020000000add8ff619262c8c1a6e441dd8fc8515096f79cbe1c6f23ccdc00e197d123362c200000002cc3b38fa495573026f71cff2f77b526d18498ce37f79b26176e0bcaa706be7a400000007b358caea560d802b6a857738a117c624fd4cb063c3a745a3ede221fa3809a03bdebe1d6b598fa9d001f86ef37e9d4a76733fbc0a89227552c5675e0406653a4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426556121" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50a889eec3d0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1717FB01-3CB7-11EF-9891-EEF45767FDFF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2228 2a0f8dd41758d9d2b4d378c38b5a33a8_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2576 2052 iexplore.exe 29 PID 2052 wrote to memory of 2576 2052 iexplore.exe 29 PID 2052 wrote to memory of 2576 2052 iexplore.exe 29 PID 2052 wrote to memory of 2576 2052 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a0f8dd41758d9d2b4d378c38b5a33a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2a0f8dd41758d9d2b4d378c38b5a33a8_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5982afd282bdcc42cd2fc49db486ea456
SHA138db476e6747b2cd6671cb33d2b6b3ca6a38d795
SHA256a1225732ac145a849c6c9455a0cb06bcf100d54289eff18a27390c074124be60
SHA512ee267dbdc5a159ef1f9df16214a376a5572ce7a13594aabcc85707c727062cc1d24ecb8dfc5e4212e61327850a697eb89db86db80766d63ba4ccba01a3b5a1b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3e6c405c6ca534f9907b9e467e8be04
SHA11a8fcd2a52c0438b25e253c65946573207f5fe45
SHA2560be380b58c4213e0cef4a734be0ebf5c1c87d571a499f2346503dca17a0eb60e
SHA51230cb3e26d53b254360fd9ac51fd66eeea997a3dab0639f9eb8dd53eaa41dc405b54d2bf4c386462d342e3ca8f4b0dcebe0cbd7912e091a97b1f3cfa366c10dde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b427cfdc66a64352a9dcccb97b063f2
SHA148e3015b14095aa065e4bef44e666f846b122f48
SHA25643b4656a383658853fd4c12cbbf9cfadb0f4637e647b0a5ab4dfa82587d3541c
SHA512c8c4d58453603e17781b8f912dbe1738c34871c362ac0bc80209804720fea56bcfdb6cb0f4757c3aa80f3ee7970e42a9ccaffe244c8f72620147d492b7d31a8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5003c75d58359738dfcc2c846186a94
SHA1465a94490570399c34b0c8b4aec93542499ddbfb
SHA2568a19a4a787eeddaee2b1fe1bb8e418e534237105b290b1626b84ae2d6b3ae8bc
SHA5128d4235653ebbd2884ffb391a58b1856280a18800ea5c1e74af1023d9c1b9180266b5ab49cdf2829830a26545ba2807bf32f7f491da4a3594a32a94c5ec97a8f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588701e1948d4919804840dd3488dcea3
SHA1130c3b8b8cc9076aec18db60dc8b668dc14fe1a4
SHA256463bfbcbdb6fdfde0af767d7345b29f3b8eadcdea4c128c0adf2ef6725335c62
SHA51244d2c471338dc0a83c24e54c54e1552e938a4946f6245f809d06e89ba8e119ab5b6840e7e684526835b275f99233b2aa4e7f50001b74958bb440a73e8999d9ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511b468e8434c1067d30682f2b05be3aa
SHA192015cf42c0fe201ac832d732b95bb4c8172cc59
SHA2564d451f687a523ad2493bdac838721b9f410bfcc0a807561898509c97b574417f
SHA512ad33e7ba78d25089d0928d088981003327836bcfc66a3fcc015d461223d3cd0657098d17c16a8507b409eb9535a1e06dbf4017cc73fa2d77587940c210d69325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5657dcf83cfdd2c3f5c0ea8542032e18e
SHA166af90ee67cca32cc03a294e71c859884e50c18f
SHA256ea04a3014cb1dc152c44e414443cbdbed9ff98b6b71f6ed5114501d0f2df1dca
SHA512c774a589b9bb362d42339b05df5086ce3440d092a4794eb36e2f9b7ed88ed43e62f0032430335533e9621439c9a421bfcbd402e1757340b8591635a76aaa2bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cc9f5f7c6e295e59defebe136763d1a
SHA1b9eac33518bc53883830c069d968ac339d6a869e
SHA256bfd57886da184dde5a07f52e066b6ab9d4c027ae258d1a0ab71fac29dc035759
SHA512e9fbd932216a1aaa8b4e74f261eb62e9bbf3acd5c83e77514ad4507bdf3131d95ef6c2a9aaa773c73bee0d3abe263eaf2d20d2aa5d5157a970cb83ad983b725c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5585ead554d7321622b2a7afbf1ca8fee
SHA1839da10fa2f215f97c16f4c9212b5874c9fd37c0
SHA256e1dd0b4b6dbfbc509a3832525caae20bbd2261cd735b042fc451a41ebdfe1a4c
SHA5127ada4627fc089efc1ed7fd3067a0294e1f5ccc99b3393ab53d12c05ad05ca6660590f41dba58f2476ee830779f88eeac6b9cb79cb3ee3bb164c5c64a0826977c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f235eaa89994241316cb0f70221cddcd
SHA1bf912198c75f2c16fe027bd3cfee26989a7fcfc6
SHA256b3ff3c59d7384d02db7f683398d69c49e0fef30781e9a0330e25bfd198b41792
SHA5128d813f2d816e4dc8ad709e3dbfd84424d338403b1d4551a4065d46031d1efa22acd976d45644ab75c868b0fdfc9209989df375857708d11b3c9f7fbba34873c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b4975971ba6e9d919c95cafc4fbbafb
SHA198c8d7fbd19679f54d8f30d4bb259464806eaad7
SHA25657486356d84f8da054c8edb8c166fcb97bd65e0194769f8832aac69ffb05d33b
SHA512cbcc005daab3d7fe4479fbd6a8dc9f41d4b4adc4fe10375c1c6f1078708e76413125ba3a7354edfa2057c1ad7880d6c9bf0583044d0725ae65f828c0b42ae033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ef451f60c03993dd7d441abd12a8e04
SHA128a56a3e847c83ecd2f18cfd02c90447d6e7bd9f
SHA256d7ee01594c11ca0bee14761fb1ce87d1c52c45475940c93fe24875267c21bc11
SHA512547bd00ec11e9fdebc7c36e98f89901b6171c97ed1c801c23a3065089af7f386a3a7d7bc1d215d1d6c32c907fcf02fb3e01fbd95c543e491e42b137bcdad9a6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5346bc73abb2eebcc70e3f3560092fe7b
SHA167650432f6a3a68fe54d7286c37366fd06ced55a
SHA25658ad5ef738d57d61672f4dc97de3fe901841bec8d710c46350d07050607904da
SHA512be4aeb82e7b9e97c1962770ecd838b213dd585d465884676a7ccf6aa834e6c4c15432efc40b1449a129d1768d7d46e099055dbc3c418ac7d05ba34fba7f098df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50456c712f1d99c8be10b530c81b3b776
SHA1e0abe1a7faf3e8cf8ab074def8d673c3c289d1fc
SHA25669d760bcebd5c7ab4ebf475b6ea7f1d137b85d8a3ff8b9decc06171cc752690e
SHA5128a123ffeed30d48aa7dcb8ff122240ea10758315c74a326601f8de79a0a0c55197c8e83c153364b298ccfa8e61fd500a3b16feb71fcbbc6b5da9da1fd141a561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510d7a72cd7b01a177c83fb01795b246e
SHA1d953535c552666243f5135f1fed0cdf45500057c
SHA256807c9fa3bf355a5ace17bad1cfea89c7736b321a82bd09f9af61b34db54fea22
SHA512db5f14bdc4bb005717c168a8b865c5677b928d5313f12e59c8308b6b428460d8abaee487d6285a5e2a90cad43c909535066dd6084a61e87aaa6097719138e21a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d85165350d07350b94faff2937488bc4
SHA11c4d27ccf8330f66fbc9336757027a3ac524b49c
SHA256e834fcf43ab734135ca9968eb3020d92b9fcd5beefa792667e175ec04ecc49d4
SHA5124bede39a409f34e4dd15caef234df54c21df0dba289d23c73cb0ea0df04408463f342aec2d6afdc8454cf0a25353365f5cdf1eb9d56adecf85df66e5dd97c197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579911aa26aded6bc4801cb66cb7b5a47
SHA13ddc2f71f1c103f33c36f1a559c4dbd22f4daca4
SHA256ce43a22148c016b0d68c5e475aa91e83626f659fe3ccf5e08716970c79fb6b32
SHA512b3db5ae1b85fe4cd4ef1437a38beee0483c47988332948d284f98f3b43d6c2f596b6af412e03df3251322b0f33d84460ba4b1e15fb881d3df06be0fe066531ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b76b9ef0b7b129e0d3d04b8c20ff69f3
SHA1a01c0f0ce3c76601c59162a8db446309f7300fc7
SHA256dafbf45437b9bd2f9ab4aaf0bb2067798712a1894b80b2c2416f05af5a566abd
SHA512da98234b3133a674422fab4ede90483db6c95559c56882fc3b48b9e9feb2490de37ce6a916fdb8e1150d13d7f815e06c124a0e701839229ef08db2fa5fd86c81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50182039f78ea3d385f1aae45192e8a12
SHA185ac7457b481cbfe9d3b8b57f7b9fc1f74676578
SHA25646bc6f112a012378f4ff653334cb8d5e8f67942dfff7e4d9c9e143bf9344918d
SHA512833688da2597296715338e7726cd3956255907feaf1c138054368da6c7e92fff11e70b3fcdaaaa4941c9fcaa996a6bd87cf6da19c42b419dfd8c49f7d4a4da94
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b