Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 15:42
Static task
static1
Behavioral task
behavioral1
Sample
355bb6f8ca9669f7d97e32f5ff902b46_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
355bb6f8ca9669f7d97e32f5ff902b46_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
355bb6f8ca9669f7d97e32f5ff902b46_JaffaCakes118.exe
-
Size
65KB
-
MD5
355bb6f8ca9669f7d97e32f5ff902b46
-
SHA1
bda930949be84ef7bdc2581d8929cb4a80b39524
-
SHA256
72cd676ab40ae41e7ae153859514fdd4515f2920d59bea98b34e948e532334a8
-
SHA512
d4f0c94ec7e4ac1c30d810bd49cfa1af714ad56e3be74909112641a74e3ef5b9b93312d97e66078cfabc851a338a23bd35b1465516e450d3efb1be076812a24c
-
SSDEEP
768:LntFAZ1bjfdQDxnPeKCjHqNmx4/vlnq22xr8ArEKNU2RgL6c5QKwC:ztKXz8PeTeq2XKPRgL6mQK5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a01250d7dfd2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000ebb115e532fd14936da2b9fd37603338973e1b1724846f95a5c64616ed861eb5000000000e800000000200002000000084311a6f23a27971ff6a7e68363ef4d5a822dfa13a0c023ad7cb6e8d6493c29320000000bc2440b817ae813f5888e0c3c5adc0727ce896c126afaa6956111088299e2d6140000000b90ae1c2f8360b6911c0d6e41bd26cff382191e476177e1f30f7c20c0b32449703850bd5501b8b976b72806274b920505cffb4e7e38d4d66f638a4b58942ff12 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE6997D1-3ED2-11EF-B6F1-C644C3EA32BD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426788007" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2888 iexplore.exe 2888 iexplore.exe 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2888 2088 355bb6f8ca9669f7d97e32f5ff902b46_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2888 2088 355bb6f8ca9669f7d97e32f5ff902b46_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2888 2088 355bb6f8ca9669f7d97e32f5ff902b46_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2888 2088 355bb6f8ca9669f7d97e32f5ff902b46_JaffaCakes118.exe 30 PID 2888 wrote to memory of 1092 2888 iexplore.exe 31 PID 2888 wrote to memory of 1092 2888 iexplore.exe 31 PID 2888 wrote to memory of 1092 2888 iexplore.exe 31 PID 2888 wrote to memory of 1092 2888 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\355bb6f8ca9669f7d97e32f5ff902b46_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\355bb6f8ca9669f7d97e32f5ff902b46_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://vse-oshibki.ru/data/setup_371191.exe2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1092
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5089811fd118da8d916c155975c9b6c89
SHA17ce38752b872cb381f74e6482f2b10c92435c361
SHA256bb057701925c8c1c5bcc3eef6c53428e68e99531c8e085a37251b6a6ab8a6bd8
SHA5128543b06fbc90fb062d64c39d7e1af7ef1bf5211588ddfcc2049865f5bb00dacb77aa6858136e769515b727410864f86c0048cca5078dfce89665bf0f9207f331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5214c631fae5d1b54a7c219f9ab1531f1
SHA1a8379930e953dfa68dc1abd3c0a18554ccbf47b0
SHA256d1d9d9579fdf4857f708273909f22a352c00eb0035b9a1db46ee84d37d9c982f
SHA51292e43fa7adbf34a4becea33a212e8cf95e6ed9b6b4d449ab95b40f7daa3efa88f63c91db4b7b41a1f265d72b4969c58fa49b4ea1babb123a5f6ee067c8ae461b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578fb480130b62154d2c98b08f444a702
SHA1234dce730f945aa03e0ab85f2f66f305639e96e6
SHA256ea19a75227e7ac8deec60c6f0ff9926ed73e4e14a68d70e83466c44cdbe194c3
SHA512b4281a8f551a553900dc5f9a9ebd6321349cc3dcf4f2501a67c839f70a3053123402d85777bd7d801a65008c8fe3aad4bc74553c5ed9e04b5efb68b53c8a7c73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dc66ed69f216c5378fb693f850898fa
SHA17bcf2fc77b6e385d1c881c1770b89c6a03aefa09
SHA2568463acb07b767b47f7cd24c160d6091888cc504f40f0a0df483f04ca2a744355
SHA512f8a152d5e79893bde090c415ff9c2e0a0a28161d5537f53a2cc7c164b5a6cb7007ed725c4e584f21fa6f485ed7e7a6cc0695e349c45ac4a5cd7fd7a7e0bbff30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e36d9871f5f777408a67fdbde0cc30c
SHA168cf94fda266821505d9f438a3f61a38210b8684
SHA256ac7c38de1cf9d0d6bf3df9583e87087aaff7dfcd1c875ebab819cd0f8f0fd6f8
SHA512f372e5a5ad94ca36806194def0e0108cb2ae9ba0e2ae47e006677549392ee1e1e15a147025e6515e92e3b0013f38a443c90b29c699bd53cc7df9af6300cdbee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cee47471c81255e2b8abc6345a702fb6
SHA16b0a7909abd09b39330d3cd0f6104d23041a56a8
SHA2569c2ec95ca682cd78e83df40eda9336ceba83fb6607eda0cee16bf53febfce59f
SHA5126f0b4e7e6e92a399098d459af8a64d7e0bd4f57db1a183dad34ec16e2f7e6b0d8d2af8c3ed161c60d9fd409c006251402d03deef916120d4202ffe86f011913f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5762c00ccede12f12cf2fc1bfb4c9b073
SHA1ee1d5f7a40fa2aa6b80fd134c083265ced892963
SHA256330ca9a23f49f232a9bf98d11569d3b38327a28d5e204a05fe92eed77657aabe
SHA51236f2b4df548d7659a4e8d7cabd825d4505310db68622d3f6b70e91b144ab0563a84feed41d8b6b6fe801da3453b8abf15ee774e1cefac1e149874c531aaf5add
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547353110391f073dcb048ca3507d5a3c
SHA1a8def43595fed63f051b1c43c05f51f8c5154701
SHA256c87f8c4b063cf4a01a68fa49128891f92983cb1485f7409c4545bb46c1cdea71
SHA51248147647f0cd5bd97b9d00e07ff15963e49f4e91537d242209c8f6a157b153944c2a31d8e1c926d0167ff7c5ffdefe1638bb7f512cdb64b3d212c80b932bbc4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556a7aed21e16d941d6f4b6a8d6ac0701
SHA1d3e04068cabc07f3b665f7bb933d0017b4ee064b
SHA256f4da9eda38a20a1d6013fcd55b1b402581d0e7679c8c8216874971150e6bdaf5
SHA5124347d1b1638980ea12813c8ca0504ee922005d3ad97169b323c100c767f721f837f7ce16550a0241fda7d6c0b8083593c669d052256acb45c65000e9198891fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597bf455f47843b25b5a252f0957804e1
SHA15535eb8d8dbd9e6ed89ae1a8cbed3d5313ca9080
SHA256b1bbfc1ecc8f6be5242a27bf2a5af359592269cb886ba4eed3f245259ae716cd
SHA5126a11ef0eae3f7fd77d116947a8ff9cce6fde7663360006ed92dde0721784bb6474ca86a213d7c78b1fa2c290b52a64f74ede8db99a3624285136b0b3537cb7d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d4eac663cd40fcdb5e057e68107d689
SHA16d7103b2fb424916eae590112aacca0a5834eab9
SHA256998b0baf9ebd58838d891ead500644ad89e7b82ba176815c6c52fe2bd3ed1d5f
SHA5127ce1e592c90cdf93fe872f34b5b4241c83213bde6f1980bee24240f7a5502746cc1f8c7df4076102ba8349226ba8d9ec75607d750632a7d560bed4ee25093d52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ebfcb3df52f0caeffb8dff69664da14
SHA18e802ff9dc6ee582e86665eb4901dc3881030398
SHA25653d646b8fbd04edbe59304a3ea42152414de10a26a078ee2a194034894d5185a
SHA512cc555ae73bdc985e56f3ee7ecbbb3ea924ae13e3bb1690c92b124319886cb18b24b0c46de6cc8e58618c6de3113e0171193a0fbf393e19586d484620e7f029b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c626f0f1ec2fa4a5b86f292ea0ca39ce
SHA14bd52f399ba784bb55e65171589787990eef0b5d
SHA2569254559598bfc927536bce295ae6e1225f4e1a3776362ff555ed4fa3f7cc8f44
SHA512e3cab2e018aee548af5c9a7bf22007ef9ca2e92e6af124c6e15794b8b80c4592dc8dc96ae6aa7ca545a22b8e8dd1f1d8d2b24df5fdedc7e53b0e944fde42b906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cb7bc8cfa7dd46338fd38699689a6e3
SHA11ef3a39db26e35fb8841d1ce5bd562dc757a1338
SHA256f45e5d6132fe3b0570525762e41dbd285b5f16801e9940804dbec4181298ab3a
SHA5125809f664b0719dc4bfc602207330b2b0074fac3e8acbd1669ed5d76bd8135ce691373acf855c9fc32e469e7878ac30dfbc68bacc4430c5ce28120cac5e6ae0b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a416e37563e0322e025ec6347debfc57
SHA1d6bd6e5d24a64ab0986c05af68da1a8845371311
SHA2560d403a0abe3bec622ea7076169959f6d9618d94408e336b1073f8127efd41d79
SHA512079e6d6bfd369a113eaeecab18752edfcfc6fa80233fbc264da28f90c5e0d3e38d492da5abd66c6f84585f2d1c3dbd5dd2293d63855b8d3dd08f9d4a9138e6b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544367fd8668b5c9f8352583345352092
SHA1d1d18b0f561a792634607d76c755eebcae5b9dea
SHA256bc3e9f97f7e07b5dd1ebe401f39c12cd90c8fd04f6998a882da952bc92529214
SHA5124dab6e110e593805d2e0ae59b62c7fd48ec917f4b07bc03a75cf75eb8d3c24ff8b277da1bbee78043bd5e7c496642a197e81874655b185131eb23cf13856c642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbf0fb855a55cad01edf351a35109d54
SHA1e879d393868ed06938d24b31be69b852b4c96540
SHA25680c3ec6fc9f6ef33823e42e49dc3e8b36162565e46fcbd0ba38ed197d0c0b648
SHA51200013dc8763bbc8fd1af9def4d7d5d531b2a40c0b2d078a5b30c0fa372d22016b16fc2111f933d36e1ff1727850892a2ce61e51f8ef73e1c12333444083676b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c13a811a82de5c33bd0e803e9ef8bc97
SHA18e96427929747cf27c9a6d59cfac1f4351be836c
SHA256e2b21c0054fec7470eae9cd873feba8c274ec4bb63b1aa727acd1bd1e5f222a9
SHA512f226e3fca86433efb2e1092015ce344a7260e1c0616d42288e559eee0f49f655f12f6897bb36f9675244fa169814c3a80a19834c282e1c9a0dca555ec32b68f0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b