Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 23:29
Static task
static1
Behavioral task
behavioral1
Sample
326d134ec6b03468d36ff959274a7def_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
326d134ec6b03468d36ff959274a7def_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
326d134ec6b03468d36ff959274a7def_JaffaCakes118.exe
-
Size
14KB
-
MD5
326d134ec6b03468d36ff959274a7def
-
SHA1
6cad46e83698a9ab73623c9f4a2d7f4b96552cdd
-
SHA256
c436011fedc34d6aaab42c772fd8cb69404f578ad0d214973923616797556cc3
-
SHA512
df81d24990b48dfc0fbc24e7f919297ac0d20826f88dd2e9867efe2dd1ba10a53b6352728aed9b8ed0d4f014057a426890c3f6cfebf3b19a0aa47594518969af
-
SSDEEP
384:3f+hYmYcatcT61zgUiTB6+jMz0+UY0ecNQxU3:v+vDal1z+HjMw+GPf
Malware Config
Signatures
-
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\process.exe 326d134ec6b03468d36ff959274a7def_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\imglog.exe 326d134ec6b03468d36ff959274a7def_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\msne.exe 326d134ec6b03468d36ff959274a7def_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00487ef35ad2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{059F4571-3E4E-11EF-BBDF-EA452A02DA21} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426730897" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000d3047e4dfb597584791a35b1f2b9b2abd44bfa3847fb300515377860144c5ca0000000000e80000000020000200000001858a37ff33ba5999e427a1c60fabec58feac3cdb32468e0b9018763fb82bac02000000065b62f048a750cf0137344ad1f064857413a2b61bb1c1c99c274c12fe158d7e240000000ffc0774f63fe4e2ddeb1040ebde11b1dba383319fdd4c63268b0edbbb5438e55036c8dc132d38a40bc489d525b0681339ae454d5bd9511f862ee0194eeaf51af iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2764 iexplore.exe 2764 iexplore.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2764 2292 326d134ec6b03468d36ff959274a7def_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2764 2292 326d134ec6b03468d36ff959274a7def_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2764 2292 326d134ec6b03468d36ff959274a7def_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2764 2292 326d134ec6b03468d36ff959274a7def_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2976 2764 iexplore.exe 31 PID 2764 wrote to memory of 2976 2764 iexplore.exe 31 PID 2764 wrote to memory of 2976 2764 iexplore.exe 31 PID 2764 wrote to memory of 2976 2764 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\326d134ec6b03468d36ff959274a7def_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\326d134ec6b03468d36ff959274a7def_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.windowslive.com.br/index_msn.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2976
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f71770f2fe9d641de6ac0072af4ec036
SHA1c79788943539e8d60ae464140d0783fa294ebe75
SHA256b5f1108f282920e0985acc1528bdceff4934eefc61ac922d6f1fc828dc38a1cb
SHA5126217a066ec8005d589513c86f2b28930499ef35cf431dd860cb0d2458b589a7077d08934bdef21d05bb3a50a2017ad709a0dd5b67f0abd928484a30ddfc0d6e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6f9ca9817ab074aa2b8a8655a17f9ae
SHA1ccb3bd2a10bf1341d6767d3ad52ed36b32856780
SHA256c7a1b7ce7d2275f6486c059eabfc5930a3e3b62b6766983fe9063fdf4ad5736f
SHA512b26b6574cd7018c9c42222132631454280e051f5165bb06e18fa181a2a8f5e455f4fbc189ef9ef8c133ce84c0106f338facd5a6d1fb3497a63c689ee469338a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cbcfe0c8d5c3608c27ac56cf3d40ac5
SHA1e1218e1958ccb03782257c0745d9b5f4216d688e
SHA25616f3871e880cbc7ed49e9bee65f17f8cfed2dcb570401279bfcc7065969ee5f0
SHA512f841330fbaa8da61643aaab5ed0e678706728f30dc9dfc4854105067fcf0640dbb32335711462f24e09e531cd0b77046f94254e28c96e4e15c19563925382568
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9c388062f78d0c091fd57b45b9d6c06
SHA13f0a74e8cea77ae86e0a19d5fefc960b8fe8704f
SHA2564cf07dc5db4d40af92aa27f747faede054489c64e568d1d65c8ca23003673008
SHA512797d268fa3d1a4aa089a383d272435a7a0f3c99ff13bbbcd89611a9e2b172bf760eaa2cbd81d9dfe62cfdf833f4106efef35b4506b0144ee51b123c9f217d147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce10a9896fe2de60f7fb020550ac8d2d
SHA1d23d01a1d9e811142e0ad66a4e10d48e37d4b91b
SHA256040a976b464104930a9839329220e23874b8cb73855da5605e95d443a5cb334f
SHA512a6ca61896bf40266d3a7dddc191aea0e97f588e0e434346d37c399f1389244d239a3c8c2b10fb57db3a9c6c4cec6d51b6066f3940371240a7da30e2c7f0a25ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d7bfa00f60ea4a935cc7d6fdf153f60
SHA1843c05417d44a8529b870ff2306a74395d0938d9
SHA256e8fba4885f0164bb5884a5732f881c13880f5e4061017c7f81e67bdc47865e5a
SHA5125362e84dc19f4747fc664ebcb4eb4454f03f0ee8d8171c2eb7c5e9b93f2f024734d35140a99a951d1df08746f752d96f3d17626cfcbc757d55332480af7930cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561cf79c687b3c8f8d0fb21ddd40d99ac
SHA1b418e58ca34625d775a896283c2ca63e62a7de99
SHA25672f5eb82a99dd55768a2d3cd3620b2d2fa3749437f5b6fe1fe3ae91fe95de025
SHA512f883c29dfd928f74868e50e38ae642373a0a821392033410cc1b6c6c6fb7d1040cf6658ed5d417f5b66f4b644cf594205c33737eca8fe8350174e9c14ddadb21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502e22131ce4e5bf958342aff2156a76a
SHA11eeba4c6b83957a98e0f0128ddb7e19eead5a2b8
SHA2561172f0d50ed567a34383c13e058b5736f6f4a11e7c0140ffc12f65c0701ef417
SHA512a343c5addfb346390b6b21f1b4ad70045137972859f9570a7c17b8c63aec0ecf43e6f4ef497b3ef939c70c24f2c3273b7b65774d9b366015759074b1f68d00e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd3017b85270aac6838080718742f750
SHA1bec2be7e400148a81b0ec0385afa673ca6ec6250
SHA2567ac94e9747a035bdf3a0284f4ebc80d000845d42e1c5b0615d06060e3c6cbc6b
SHA51254c230471e1a77eb4e5bf870970b07067cab3e029973d9ab71c6aab62af77559c18fbe9bb09a5c77ee58a444ca067921df41ff322bd85eca14fffd8dff2f2f2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b22c50e2574fd82a693436423c953ce
SHA152a05f690d8d0c82f1ccc69b1abdac4974210a6d
SHA256eb64f5f8989bf255f5f69431c70d36ce7f32d814fd9d00e1a73f4c22c33440e4
SHA51290f463fa762b131951c4fc105362c3ddc3cc1e15a8bef32c34000db1e4f96b4d2c2e327d199b60f8d5c039a9487bf7b9be5bb6e5abc7dc164d204855de729967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eec62040b2b1628d4e7ce1511c40ab5
SHA11755f2d80c6387ab6d5cf8b3d9e5c698fa286712
SHA256e1fe2c9f49f837e2059267217e7ee547c45ff2412e2eb1e99b84d33ce25a54ee
SHA51269d0fd5da957e7f423a8626f0371ce3c28fd233ed4a5ccb4e7f119d2160cf534e83d0bfbec9d668bee0479882b3b1dea88a37b6f09204da5550f599577bc8791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548b2415d50c3aa2a06e62720ab29cf6d
SHA154ece638afccb573f8fc4e338a19624cdac40c54
SHA25675fcfb8bdc0dabc001cae1f96ccaa50f1d6ec4ca856ecb2cf7e438a7605597c7
SHA512fbdd7e53f37adffb13ea354264900cc8342c4e29e8ea0cae9fc638d61e83fe11d6001847af6522d29df1fce00a5221c07dab885b2d665ffaa214ae937ace423f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595346a6b3aab1de693e3ffc75a2d8209
SHA1a4da2491e74115dbe3ed560092d8f5019dafe061
SHA25600802cebf15087748560f38d20ae681cf0306a396b4b74d77f10c3c06f7e418b
SHA512930d349960394f89445a1f1329121efee4025478f9902727109dd441b9e4c9431e499dbc5bd1efa689f89592892ae7a8f1786fe604cf33d040091653dd1adcc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5224d7fea88af28db669077deb6cb2cbc
SHA161fb9b99f0574d554e84275644c22605ff58b44b
SHA25647eb01f122d20db56eef90579fd7891ab74bc4e5df7c234bd41b6d8dba7255fb
SHA51299e94b9dfc4e8e01d6f1f20f2b4826462b6c64dbad2b9b7831d18302aaf66f74161fc70f519aad808bd3b250227e0ba6c838dbc7883151d7dcfcbdab5427ae26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b91c6a037c85bf7e4c70ef61b369c09f
SHA1279c1c46dfe8576ae22bbf7aa96edbdbfe0a4f96
SHA256b7b4c4c0e73df9b962957fd5ca7a2dbc13f2b3fcd3e1793dd1cf9b0e5918f14f
SHA51260263b123092be3e0133ca97ada48c12bc419aaad5ee279bb9c849bb5dc5de3a0a401da6c94477b904060fbe53628f5a50b50d4668d9304da10d51eb07ea4e7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5272632c9f4b80dc7194acd91216c13
SHA11795b092fc33928cc202c4515abb5c333ecf1615
SHA256a6bdb46811396cb122362b917c691886495e60beab2c86571d51f6cba6c608e7
SHA51247a4023ff4751315f60f3b43a01bb5423954a2a9c7f0289cada581707701c429e8c68536c7b4e61805e50f528719f9f927faec858045adae08fb55aec3ecdc38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505e69a4033faec2e9496d42a97c6f3f0
SHA102ac45ed39911d067c1c430f3e7fa0743c5f99b2
SHA25695fe44832422676f935625285584f4aadc8f9aa88a774a069f2db317920568c4
SHA51227e3b3645708b73da9b48d3e09ca1b392c664d6b9631fb4b814c46a5f6fc957366218e5c696ad6e18b05ff2cc5904d7f638b309f228db3966a58de94ccde38b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5af0d548acf19f7e0777d4eaa85c8dd
SHA1e14b2deda7b1bf72bd679df73112adf8c0644b4c
SHA2566fe70e6589357e77558f3b71f0bea9ddf22dce89d8da4aa25a2934cf1ec055ce
SHA512ed80c2bc859f4a9a6a40ef6270f1ff346617c0b034b18f62fd422473145e09c14aa5d9ee91116a4a65a351c6dae6661ed17aa3e5af012861eb9c457dc3ee0dcd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
90KB
MD5c75aac7e0b3f3f97a74d1a70e754106a
SHA1f697ba35ab10bc04cabb123caa28dda3510f6eff
SHA2566a7d18048bc090857348e2739d2536fdab857674e466c8d6373800868fdf26e7
SHA51214831c52f10a31b1342a966273686911afbef9baeae0a30ce19dd72a72fec0f13d664d091d29b07b9e5a37ebcf2afdaa5f8603aa643b110c3f6792fbb039e804