Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 09:04
Static task
static1
Behavioral task
behavioral1
Sample
387ebe135adc1bb735811c588ddb71b7_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
387ebe135adc1bb735811c588ddb71b7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
387ebe135adc1bb735811c588ddb71b7_JaffaCakes118.exe
-
Size
15KB
-
MD5
387ebe135adc1bb735811c588ddb71b7
-
SHA1
73327e7deddf77490eb91dfbc103c2a32bab1520
-
SHA256
6d4470e1e82c97dc080094caf33906b1f0d5efc32a50f85a57900e25a57bb8e1
-
SHA512
73fb2f5e6d612a30add9ecc0a00ddaba354e84002a6271c79e15375d83593d72a85cd4414fcfb9a86385a369173320be85d0111a4b2a2af91bff0d2a754a1a1a
-
SSDEEP
192:nGs61A/0LiwxqfKD6Vk/gqWhiQ7Sh92sGNl+vJYQjcWpKrgbx:Nx0iwxqsRQmh92tl+xYAzAr4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426850528" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d99090000000002000000000010660000000100002000000084557aaac1c36ed1df7ba009a98360a01d77c8e7a17a814e387075cd57f2321b000000000e8000000002000020000000c8e18d5fde6af700e7b3f897b38bcf8668c96d3ed0e999d643e0e72dc992ee6420000000224b752015b0b276e9275768f447bd2d4feb1b1bed62d2b132fce255188cc627400000009b6f48d233e7ebce9b30072f20674b854ebf88763681661ba536697b11830ea813b1b37094b986f51d175372eefc9e4bf6b07b7b2ff5c96c46c93249a4ea25ab iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8013e06571d3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8FD1C6C1-3F64-11EF-B580-F235D470040A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 876 iexplore.exe 876 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 984 wrote to memory of 876 984 387ebe135adc1bb735811c588ddb71b7_JaffaCakes118.exe 30 PID 984 wrote to memory of 876 984 387ebe135adc1bb735811c588ddb71b7_JaffaCakes118.exe 30 PID 984 wrote to memory of 876 984 387ebe135adc1bb735811c588ddb71b7_JaffaCakes118.exe 30 PID 984 wrote to memory of 876 984 387ebe135adc1bb735811c588ddb71b7_JaffaCakes118.exe 30 PID 876 wrote to memory of 2808 876 iexplore.exe 31 PID 876 wrote to memory of 2808 876 iexplore.exe 31 PID 876 wrote to memory of 2808 876 iexplore.exe 31 PID 876 wrote to memory of 2808 876 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\387ebe135adc1bb735811c588ddb71b7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\387ebe135adc1bb735811c588ddb71b7_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.claroideias.com.br/portal/site/CIdeias/index.jsp2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:876 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e87258f18e93b82ccb8840fd6a140d88
SHA19185ee85c37795bc0fc352250321b293eec999ee
SHA256041a88852d1c0c99a1e7d3a66b16774e6e422b905fb9c67ef239b35ecde490d4
SHA5129667142358851a1fea0e1abca154d118333ff2cd41295a194c065241863aa1b86a793e4dfb926a184200e78901af14efbd9dcbc898859bd88941f51f53be638b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d6aafe5a39f362997b9b2401c8a94b5
SHA197e282d59879dccf1afc2aa66b5072e0ec50b964
SHA256862760ab8fa6feb9c2d312dd7a73c6d34c7f44193c0887e05443c9f3ac7b8624
SHA51268d4ec5ccba0a22d076a09bd85e8745864fca381567b8353998ccae5b0cfb87518f510bacd6e7e250727b7fa6eb179b971e012c994f3949c8cdbff581683394f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5412ab00e224aa037228444e8cb929eff
SHA15a8e21dace0a23ff0ea2b7ef4db61e076204bb7e
SHA2560ccfd9a10377ed011838bb06066a5f19e8e0e67bd31eeade56561a623d7b4dd9
SHA5120aa25d789e1fc5a542e7b00190bdf9766acb633067e316be5845582323b2df5fd8f332c8c59c6a247138cbee621e52f4049edf03d3223c5871020f1628bc642a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0fbce25af451d956f80dae1a3798ca7
SHA11a1799f75d9ac931cfa56c3523318e246114e665
SHA256febd98d3e068dc4be4eb9879badd3ffb85b8338b0b12b6171e60c55c04d1a43e
SHA512db3b6dd0c742edc80d48de7e35ef6f3deeb4f52f47e8cdc85961fdca0e3399707c168d1f4d3d75d1823614cf43c1bdc21fc351fa93d10298ef62a0cdd0d2fbee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfbf61801965bea59d2eb884463bf582
SHA129016b3108edaf896a22322d923491a46036bfc8
SHA256177f2c7f700169f4c0c6fad2dddc195e154abc151553ccda6a4d75a3a61cac67
SHA51259f27410016a3f764b2bd0e322aaf02f6278ec7154d15ed58e4b7e82f0a2f48e7532b92e59cc47f6cb436f1862b9c0b72a22d5f48b7e380877e8e06833210207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59169ff7c83e26cfd9470b82cf60bdbe7
SHA1bb3617c276dcf2ee2e02a226d376a907a3a8d3f4
SHA2567a1fa3b287905609dfb21197c30b0d7f2074be8cfeaeb7b24a94a9ccea0eee0a
SHA512af8792ad06e253f1ba4eeee0710a4c033996f02b542fc26458e9fd58c9e40b62fcda05961c9d62efe67e93ba389a8147c7ba0fcbd6657a4076a9f9691e0a3fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4d107c5f80da7a67567a13c3348af82
SHA16873acbebaede900682e48ba43ac25ce0267725a
SHA2565448a1414fd6e61e8edd4a16d10fbcab48ef4d728df536962c08be76274814e6
SHA5123023f39500efd382e4d092c06c7d54f5b9f3b8d4b572f77cd4024bbe7cbdd5537ed2a316a213dc8c6d2f78084bab877030457512ff21545bd62e4b03990d0a5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abd01ab52c0c8223e2514a8423266a69
SHA109a8eb833b6355f58624f8091d744582a8b533ea
SHA25613086b2089b261344daabd20947a5d694d3c73706a7cacd3d2c3d4cf8b545529
SHA512364b8979c14110e469e3633284b3461145dd8a8205b5f3dbc453a87995ec4ffbc9ed3339e22498d2cd1c9cf0b8ef5b3ceb554d4cc4ad8175a95a94522fcd1433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504ef5510e8965940ac878806f603368d
SHA1f7b20ba370d298b3238bf0eb838bcdc66db50b29
SHA2560c260759d429181059ab3f52cd207a33eab5e30ba845185cbbd44265d1008c82
SHA51252a2782cf6ab7cfe10ccc79782789f28aca99500e39d275f3a40f37a10511be0ba31623cbda37fc1fdf51e9ca5ff900fe74cc9eaad9f8b37ed9fe8bb565eabe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54430fbf6b0361e58bdc767ca93b327cc
SHA1b18d630056e8b03e382df84bc41cb7484ab8bb96
SHA2562387e48967f87aab569ad8558ea6269eecf8985bd1b838a0cdd04ab25cc21f27
SHA51207e362e07de797f7fd953749c51305dc45c15409366c6214979801fd61ed140082e96470327ddcfd5347748b68449ea28da7609339c9fc43cbb1efb9d007652b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5700bdee106b5091b3ee92058ecde775d
SHA195435862b391315681f2844f5b40839ad178dbc2
SHA2567b3e862aa39567f9c89ce0dfccf8ee17583d28cbc16ecfcce77e4c8519ee9cc7
SHA5129e40c532c4dd9728d47dd28ced8ce46bb5d3f6e73266d210c418ef172308ac4c44fcf40612e9503a347a077d8f176e67d3b8aff7ea17688e6059f978f34eba55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594fe91ee4f3814ff02976d7df5670490
SHA17ab0c7da3baca1dced854ba33b3be423e7a8f90b
SHA25690b86655f4aba78956a4b5306f69dcaf8e246f47945133ae56d91b1ae6fce14c
SHA512fc201ffe46252a897fb68e4a66541b2dfb4fbd4cc76f952a116f6443a246d13e375ea1f6cafbd3e5feec3366923274a020e8ad19523efdc894e5d773b7a1382f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598be34a3760c600c2bcbf2c4fb3d390b
SHA1c6c3b5e1e050fe5b422ba285e8244c878a9a68ea
SHA256cfd7016ad3a56c67b5e0567af4f353d3659f4990849d3ca27dff5e3afd744759
SHA512f64004cd7535ffe31ea4d5347c82aee4843bf7a8281fcb6e3d581b2a7add492ddad6e6f6fe00001c8e0519e63e8feb26fec8bcf0329dab0d4faa751ecbac0338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548b25504d142863afe88977659f77a05
SHA14fe3dd816d9f44bf33d0c659cebe226e4f25b4ea
SHA256cc8d501fe9878ece4f82a52e684136decc459b5d43d77fe0d1b11b5db0240f3f
SHA5128e96278ead9265cd41549859be80a3efed39f46bd81d35402687b3bede0811be4b2357e4c6a8e926fcdd3d8bdfc103ec2dece2bef9e0f659d64110d956f03774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d61f6342b5dd2fe71a6e148c3a891a6
SHA137ff776ad14d7b21703cf61a647ce81440271f22
SHA2562ed816ef0510f4930ba89d7a50afca1b73a75a93dc63e9780c466c5fa80d3947
SHA512ea84401f4c5cee514978805fe60f1fee7ba49bbd1dd3ef54f236642ab485a30d5b947c23360fb4c428098482e5b72cad8379511bd2eaa97fb831cb55cf1ceccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569994ea266543c60909577ccb942b8a3
SHA1c36026004087f1173491aedc59071163096be485
SHA256db5b49515c772900014f292e11e3bb87da4c2370466ac598a12a7edd6979a3b1
SHA51280f44371ed8022c90b1ed96d7613efcf9f97778f00a50948616d88187af8fb1d683d29de5919e8a1df661636c24ac3ba2f73e37cb0c6fdc6e21d19d3ca762766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57750f772478b5d764f889a36515121fd
SHA186904b240a633eb4edc40f7500434869cc6eadbc
SHA25646e4c3cc07a89459b82368b4280ba357e8a270bc40744ccff67247684b7ab6c5
SHA5126ae8960bb7fb4424305bd1b81b566349dbe30462f170b959801cfd40b08cf3408161e4e10a653b90598da7bafb725333fad9f55d30c2fdab99fc4c4ff29d6e3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b065f00d085560d2711254c051705666
SHA17c85ab95024336898a0a207c37e077fbd09eb370
SHA25649f5522c45ee588ff1db5643a2733dece78e1b2f81e1edec0d48f03125d5dd3e
SHA51235f48a9be284b33c01a41d7c1e87bbcd40105be9cd93a070ce1682131b6fa854e06938bb6f00a9736fb7c321a772f87f345e051c972c04d7bbf6030bb0d3055c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e697b838ffc5ce2d1da10bb7a827883
SHA191bcb8e1450265ec79f1583e5bbdd4d21f03a4f2
SHA25647ab6b9136c8aa8ce4e42e8826bbda3232b895a1fb6d218f7da72b70a993ac8f
SHA51245b98203abee76586549f3186830e4cd35e7d2c616670d32ed9759a37c9381984641672e5bade6e2c40cba2e75e43c941eeb5a42bdebcd10397209102284385f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b275e60001ac902a96d3edca98a7fab
SHA10ee189dcf96c1e7e7c92bcfab21f29ff39606b61
SHA256f6655320c06e61b355ccfa322c4e462c4966a460be9cd078b664d963864221aa
SHA5126ee4c57c0c7a89c13538a690fd16757e474b37d247c9a4f519c83a3e4ccb828460f7b32a141814445d7c3c36a2a25939edc010d04384762f3c29edcceddddf39
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b