Analysis
-
max time kernel
133s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 07:36
Static task
static1
Behavioral task
behavioral1
Sample
2b7f17409b59eda9e62b20cdfdd43b53_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2b7f17409b59eda9e62b20cdfdd43b53_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2b7f17409b59eda9e62b20cdfdd43b53_JaffaCakes118.exe
-
Size
32KB
-
MD5
2b7f17409b59eda9e62b20cdfdd43b53
-
SHA1
2c7f2f0a69af739b0e12c7744dfcf7ac522c9de8
-
SHA256
f2dc8c4b82a8d6b49afcbc0796d11f8ea1d8d50ea491e5a9c31c8fa246492d19
-
SHA512
4e23df88074d0fac6554cf1ce418922cf8db084b8d0b88d2072bf583e754e354fd45e141525925e6dd39188a328ae735dc521bff73b13d4da28a351f661d8512
-
SSDEEP
384:ZgAHxUSSquje3KnGQG0dST4ya8cE9oSfr7oyyxJR8d0xK0ozN8ERydYTS8ImXBaG:TKSSqu630GQegcHrl+xKjN8Ddyf8ixMu
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\Beep.sys 2b7f17409b59eda9e62b20cdfdd43b53_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 1664 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3040 set thread context of 2200 3040 2b7f17409b59eda9e62b20cdfdd43b53_JaffaCakes118.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BF966501-3D2A-11EF-9A38-5E92D6109A20} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426605796" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3040 2b7f17409b59eda9e62b20cdfdd43b53_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 476 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2200 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 700 IEXPLORE.EXE 700 IEXPLORE.EXE 700 IEXPLORE.EXE 700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2200 3040 2b7f17409b59eda9e62b20cdfdd43b53_JaffaCakes118.exe 29 PID 3040 wrote to memory of 2200 3040 2b7f17409b59eda9e62b20cdfdd43b53_JaffaCakes118.exe 29 PID 3040 wrote to memory of 2200 3040 2b7f17409b59eda9e62b20cdfdd43b53_JaffaCakes118.exe 29 PID 3040 wrote to memory of 2200 3040 2b7f17409b59eda9e62b20cdfdd43b53_JaffaCakes118.exe 29 PID 3040 wrote to memory of 2200 3040 2b7f17409b59eda9e62b20cdfdd43b53_JaffaCakes118.exe 29 PID 3040 wrote to memory of 1664 3040 2b7f17409b59eda9e62b20cdfdd43b53_JaffaCakes118.exe 30 PID 3040 wrote to memory of 1664 3040 2b7f17409b59eda9e62b20cdfdd43b53_JaffaCakes118.exe 30 PID 3040 wrote to memory of 1664 3040 2b7f17409b59eda9e62b20cdfdd43b53_JaffaCakes118.exe 30 PID 3040 wrote to memory of 1664 3040 2b7f17409b59eda9e62b20cdfdd43b53_JaffaCakes118.exe 30 PID 2200 wrote to memory of 700 2200 IEXPLORE.EXE 32 PID 2200 wrote to memory of 700 2200 IEXPLORE.EXE 32 PID 2200 wrote to memory of 700 2200 IEXPLORE.EXE 32 PID 2200 wrote to memory of 700 2200 IEXPLORE.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b7f17409b59eda9e62b20cdfdd43b53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2b7f17409b59eda9e62b20cdfdd43b53_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:700
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c erase /F /A "C:\Users\Admin\AppData\Local\Temp\2b7f17409b59eda9e62b20cdfdd43b53_JaffaCakes118.exe" > nul2⤵
- Deletes itself
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cab597da81c3a0fa741a7a73a8fa854
SHA1a4df350f03f9ef6d42f885f1c2d9eda33241fc25
SHA256200bca5b09f1bc75aef775410520bc7a916b0f81a08714ac9e8fb463229a8292
SHA5128303b6b3e2a6405f71044ba743fbaabc10016ff6f98cfc1ebc9e6b86844fda0883cc58972f5036d8a79b704daedc5e7e0d564c2025f2d6621fedf17ac4d6f93c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beecd38b26900697c2368b8a5667692a
SHA17e49c8e86e56d2ffb8ea7dda9fadae93d9c179c8
SHA256410c475d105e309b62ec99d19f532bb8ef7a08c7579e74a2f0859c6398d22203
SHA512209af13fbcbc45700054d48fc5166456ee9600944977c3eca231cc3bc13137480c903852f278a2b4ac5e4c65bc02a92bfafee19dc0b2668f298fcbcb93efa4c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5145f4ab99f7b4bf3ee554786db594b9e
SHA19c1afbc05c733e3c08ac2bb6b1377d238e7b5b49
SHA25600e7832d4d784a49f5a08c32c5c2ce2c4be0154d8eefc4d0f1c0d99f130445d0
SHA5127aab13ee411a23f3bc921743720f579645bbe0ebf009ec648ad04456ebaa43ea56ade3aea215fd0267f748cce5d32103906ff69e2410f3038b21dd3eb4656a94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fd0edd703beaea183d6524356db1a4f
SHA1eb230fcc81bf7b65aae097e3e30d3815881c3391
SHA25699ccd86be0ca3a5ca227ee21bcf9a2c52858f4dd3e392a764eecec7f85429063
SHA5124015563aa126831896af683f3b5c6025d4e82302a1016bb6c8d3be282e0fd11fe87cbb299d930c57cd6bfe2204fcdb1eb9b637b60e8567837199924476d537b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb962b3e21f3175082a9f6a73fc220ab
SHA1c3bf4cf48990063cbbfd803acfc221228472a123
SHA256935255e13730a5eca2ab479e3d0d02bdbd7831b8dcff36edc866f744696e7ff1
SHA512c9125c6bd1fa020c051fcbe42734f1bba60454f75c4519da9284e12d0910087808558abb48b2fb7ce6025ca7b167ec5c37abee006effaadfa84a2225f33457bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddcba806ce64ffc070e5129406218b16
SHA1fde76766f6d55edc960f140eff465bae6d184a73
SHA256ac041ab3921b9269b25dd978073befb0af4c44dae66656d76bf026200983b955
SHA512c3bd556fc3cf7aed2dad782cbb1cb2dd572729efa1200ed0d934399115c013a400de6f4c7171bf91548d533211588ffd70fae90e7e9b416310163a47d41c4836
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598ad55ccae5c1fac339bba4a058e2cbb
SHA1b286ce60782492d18c1c89ec2263ed3a132245d2
SHA25667a57de0789ea30ca1777c64739f3b323e60d86352f3b810980f059ab65ddcd7
SHA5124c0a0d2edd6d986b2756bba27b00e97eefd95931af8a8a187729772ffdb44b6063d82bb140410e94298abe1fc23498b81883905a4d45fc56a0b04f8b8bcf4a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a260d89b097020cbc41fbf31124acfda
SHA1a33fd3f7d58ebd232272897dd8b288d344887c29
SHA2563f704fba829123aee1ac6813386a49ae2a4e62e8a227406efebd92e88a06f845
SHA5124ab29703a05d1923ee5ef496c0caca5c3e8632e1402acbeacc1c1b53d7381d1cb1f7bbffc5a44ee52f10c3e84b4f833521ec37c3de5bee9b60b6f11fa13ca0a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574db1e07543405d6c0029d732e7bfd3e
SHA16cdbac9ed64bdd8b5ce13172b22734a4be125d7e
SHA256f5c132ce0a9f0b1df5e4b1b9341b68a058fbbd6a8d93091061224357f1a2349e
SHA512679383578883a306cd9a99187e7f13c880bca57f7454724d5996610ebadde8e7668cac9ac34dc6e192353d3b8b830d97d1a071414ae456d8c29947a2b1a170fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a83f9c46aed7c47504cce03e3f5a9543
SHA120e0c7b2fcb0e6f518dcce29de90b4a00ee6157c
SHA256d5c71ef3f61e82d7534adcfc47eaca086b95d91fd3ddeada68b75c0eff32ab08
SHA5121ca8ebb58b459911d5955aed398e0f8def1b62d7a61e65cbf06901db0205a15e84a5044e4505bcf6f5822db1b1dd793d8a8ac9a965cd358ef1fea00c7623f814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592c781182b941c7ebfa97092127c5bd3
SHA1d19f470507e3e6f6cd198df3969cdc458fd4b387
SHA256e84b68786f15a696be096423b962265eae82cedb99ae79a23849de5ab0a7b395
SHA51225e5faf12f8655c657703966992869303b272ca069d7353d7ae1f76f30a08a3e7db3a6ffbd764166cac37927571ed2d6da4a9df0a457d19572b512b5562cf34b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f43ec706b7fcb80481852e4d57af873f
SHA153565b3140eebe28e2c89863aa822ef4fed099c8
SHA25656e4f9f594999b05820d1a41a283d330f8a25cf2639a86a31fd422a960a28197
SHA5126edbe34fef100714682bed53aad54c5817c4b1be45ec70b2b90733386da3d30a073868eb8c2106f00f248835f676e145067bf1a277971563ecb9ab94f60e7505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eccdac75a43bfc39f402c74824da3679
SHA1ed202dffdfa0a8d9b7819084008e71b2ecc94d96
SHA25620a03a26b34a1dc5c9a21fea3c668731ca05b847ace8e86ff8765e90249bf76c
SHA5129207b0faad1a703241b478cf443d26a06a7c834d873e04079da11f7f31062dc0bae418ef22dddafcdc3c4cfb9a34066e1a33b2bd69d2b3ed5d4aa5bc97924c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5194345231c231de5e803add7287999
SHA1a2cc7669bcb2a5481e114df9d9f73483f2c7b948
SHA256af80340ef82dd9dc6024adbf6d947e3f3e270371c4818038abc3abc88edf9dcd
SHA512ab79db16921e09b817bdb00a31adc7d2a9064e2ab56a62c25491c82f9b5fa322c636ed1c27df0c95b67ffd849a4fcf634b395916aad933ccf7a364d8694a23f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5520283d712b9f94db5f28734d73b4c7c
SHA1398a43a2f059fdcebe19e64eeb47e7ee69241a7f
SHA2560a5b50088bdaf7aecd9fdd9a80e98c25721f70e477a71d801c08ede23cc177c7
SHA512d494cca6f8e90ff0f42e748c0fc33b7215df32e8a47c1e1ca42ef13b54f54f9aace65e1d56c7f6400ce48eaf0dad2c4cf522db152b11c7d3cb0a9f15570585dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5829111000655c9601c4c3a8fdd9ec2b0
SHA1ddbfdada623b13a5360d0e9f6750da8bf2fe6706
SHA256f9b67264e743fb2c8cb42cd4d0b85a42be4834b67d66ae19fe47d091e1ab5d84
SHA512f88cf2bb17a55316c9a4c0d666186525cb4192dac2fedf0aebfb26611c8517fd6df554f22914aee48627a1715211de6a2bd0a390e2caa211fc187626720a8e7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5848f78c39e4963674fce72b6182260a4
SHA1e1bfcd6283aa50344c5b0331d83cae2d1a3035a4
SHA25608deded37a0caf2a25e6038af18310d314533d18937f5c56def0b992928f7624
SHA51230d184585999485dde2ed21805720bf6f18e08eb4b46b983a791cc23ae9e087dc4ef4197c109c6dcea013f1e6453aa11173a9036cff04472d0af16fd571b1af6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3577fa632ddaf238dbc05d2d9220f29
SHA198c03a3c29165ed20068c576d25e24f8fbfab96c
SHA2564506df1af6561a91a9d1b058e1e10eddb6e3ec2ae762cc2456486000e49a151d
SHA512746b6760ab8e6b3eb1eacc0138e16c08001f5367cce53aced4537695e861421ad9640259f114601598c469b1a24d708124e10bea14a6aab04a761ce8c7c1e63a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd1893995ebc4537a45a593722a1c35a
SHA18993be93156279e98d6b4ddf77bfccb8f99f6fb2
SHA256d9289347b8626a5d965192b24a363305aeb708c2cdebceed366e22e90a334c64
SHA512b3c9c58c7e3c685fe08ed022888e96efe7b7fa4ef50079fd54f4488b732b79fd9fa0a8f7ababb905aa7f82a01113af423124122770af85f340a4db1072ac79df
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b