Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 02:40
Static task
static1
Behavioral task
behavioral1
Sample
3fdde153364d8b1bb94c9422d7312035_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3fdde153364d8b1bb94c9422d7312035_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3fdde153364d8b1bb94c9422d7312035_JaffaCakes118.exe
-
Size
26KB
-
MD5
3fdde153364d8b1bb94c9422d7312035
-
SHA1
a8bcde70163187619a657f2cd128d3b29cb9e035
-
SHA256
2e1152b0f843d31aba95c391e7c115daffe470e2dcd7f16876b9b9b1d2fa0a2c
-
SHA512
5e0d8580fb7322eb0e7981d837de173f27043112b825dcdc3c5dc7ab941ec6d6dc202ff16848f77e4729ab37a55132c74dc079af6d89efaf939c8ac7392384e2
-
SSDEEP
384:xGJo7UBnf6HFvBVC11cs49Vrt0M3svX0kRslGrv5TE60Zr0UFlc:GBnqTVS1nwr96XJZrBTEvVVl
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{42216F81-40C1-11EF-B19F-6A8D92A4B8D0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60c7bf2fced4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427000292" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000000b6a6ef692a3e70de73ff0bfed070d4ae1de7aa812d9d0a3e9298cbe75c3458a000000000e80000000020000200000003828fd39aedc488302b176505f848875f52f0ad8996985f27fa6d4727bf1d720200000007f39926fe0870cfbe3369f05a042d1a49dbefbc14daef5271800fa0e5c7034e540000000d6db21a0aa0eb5a88598df3ca10431aa43018d7d03b9ab9c55ce3df0d51793e5a7b03cded81448ab045372eb8aa9dfe1fdb2b76e672c902c91cdb40ed3575ba5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2744 iexplore.exe 2744 iexplore.exe 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2744 2312 3fdde153364d8b1bb94c9422d7312035_JaffaCakes118.exe 30 PID 2312 wrote to memory of 2744 2312 3fdde153364d8b1bb94c9422d7312035_JaffaCakes118.exe 30 PID 2312 wrote to memory of 2744 2312 3fdde153364d8b1bb94c9422d7312035_JaffaCakes118.exe 30 PID 2312 wrote to memory of 2744 2312 3fdde153364d8b1bb94c9422d7312035_JaffaCakes118.exe 30 PID 2744 wrote to memory of 1964 2744 iexplore.exe 31 PID 2744 wrote to memory of 1964 2744 iexplore.exe 31 PID 2744 wrote to memory of 1964 2744 iexplore.exe 31 PID 2744 wrote to memory of 1964 2744 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fdde153364d8b1bb94c9422d7312035_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3fdde153364d8b1bb94c9422d7312035_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.freewebtown.com/peidona/Videos-feito-na-cam.wmv.exe2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1964
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5125caa458776834ef97f907ecede1b99
SHA1fc83cb9283d2eddb3d96f2c4d5d54adc99530dee
SHA2568abcf7cf1c1d09c0669f24431d9833b79396f0593403bd6ee37c037e5c6c69ae
SHA512ac8fb498c0ca5ace90452334c1518fa23fcf5683e4f533b134cce079088c7afc6c1a2e09d7f6f1602cb77171c0cebd3b80bb786e432e0db40ce6815745dc2c46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d75bfde4bbd8524574877aa5b0b40aec
SHA1d32507ded1b6cb87bd0f2a7a8ab44400b9f04cce
SHA25624a99725cbf74dedd10020e6f9078950528f2917020c7ee629d50663a14be091
SHA512f07cc631ab5426314c59ccfe7e7c3022421861b2d79018e315cf08269f2d2122968befb34aca91972de34ab04d160017969fdec39d478fdd9a3e11c3b43b5ea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5333b214b4e92a65000bfa3641d7e0516
SHA1b8e97690f9d09133134a05f6b9439953332f763d
SHA256b9375f750a7b3af62246d43f977d47b87e5f7c942c48ae6e55b5adb76074c1bb
SHA512c395ee5ccc8c9d287b9d3d73e6da00eb4c978dcce846a34d3f1f6ce697a372050382d2f6a3d7cb9fa5675084f2ade687f2d65c22eff897b581f5cae9f2b42a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ddf1c85d3121a65585185df2532e24a
SHA1118cf451fdef6874164f416b9e383ae38e94840a
SHA2563b0394c5525a035b408a6584cb058daabadbaa179ddf3a66fe8c93ef98eb7472
SHA51227cba53fb40d9ad748979039ca0fda947773eb8e2a6d280df6df17958a16e30be37f2df578f65aea039978d890dea0a4d56111fa3aebe47dc9a054352e55481d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6f67b44bb80c5f2d3af0558efb4b5f5
SHA1a1601da81ae1c3707cb2c7e21c9eaf921c918ae2
SHA256012c809fc0cc3276f3dd0dc3aace66025850f8be7172f1e52c5c5fee52dbc365
SHA512c695a032d2d33fa110a9fda8e5139a7f2eb806bfec7643b1f547f14ff5985e3d75d2a8d1f3f7f75bb52f3f9129ef2de2fd491cde25b8bacfba2cac2e8aa884c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccde8ca7af4158f5f9e344f6563f52ad
SHA1ce084f654f62113cffaf2e12e5cf260a7d1e5cf5
SHA2564b15beb9cbcece62a25f8f40d00eac04ba2fb81b3f4625daf9a4c26cc754002a
SHA5123116fa89d8708d7943b7ba28628273713f3851c2dad6858bf6f9390dfb09525356e197b21135f2df53b3891ce71906317bff6d1195e76a805d758697f2e42148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50114aae89100423d163983ff464d99d1
SHA15e8a3a1e1e706a6c319223c05c3ba49fc66b3585
SHA2563323a7f0c536d6f56abc179ea23ee5791dbd0b0af6d2e6df198c3069d7613334
SHA5122b71790812b659192215f0b6b7f43d572a644598835f8d3d1a940953fa2a16a41a672ddb714493de63b578da627bf8301172a6b3e32b836d9992ca340a5b1126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56847cd9df60d5f88337587e61e20e73f
SHA1a05226e8d8ecb9c3d33cf8484d56beae6dfb3eca
SHA256516e41bea27cfc5fc1b64f5fb8a1faaba31a6c03ba53ffc38c17a6af2813d8d6
SHA512e13b7712c2382b57cf0c2b25d31403243f1eff35de3aa30327bbfd64cebc525897f5f0ed1616cfed1ecd5977e6a9e46d5eb9dfc323f2cf6d649275d4d821fff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5814d88f1b95286ea7a850a5c7e511b51
SHA19eadee22d4fd09c96865ebf38a09098ba67d3442
SHA256cb8a8cc3e4abfeccb3f8c6f20d8cb2569da8d3da61705846691ad8b895ba578f
SHA5121d4d63b61b3b187fb561a6fc11e3d5ce8fb95a040d3d881fecef011560e03c744c3a29222981b0126290923610624e6de59b058120354beeef0fc5ca6b421bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55627fb9bb080bf5e2a43d8866c313942
SHA1bf0c1f94d35584d882fd7bd397d36e69f7ccafea
SHA2562e002d12d076424fe9bf2d03e414ff3ca8c73aebdcfdaaaed5fd065cdae65e6b
SHA5128a64fafcacd0b587672db603464a11c56d82d6becd1735d687c37e7151249f8190ee4a28b1486c0261155595d8fad75abd6d7fc172e90339bd03e2f50d746c78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efe80b7aea7b1abd02064761d0bcbeeb
SHA16e8ff620d89d1f60bd6f0c906db98e2283a6ac6a
SHA2566c9a83871d4fa31d41465cc2528977a8256dbf3beffca67a953675337678ce45
SHA512d413d1aa1493e1aea2ce8258a4216cb5247ceb8302696e5ae0e7cc605c02f697654c0e281fe4b008bae425427573f9c3c9eda16126a73a0d5453f022898d7ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cb9112c3ecbce87f9e1f3201edaada1
SHA11e77abaad1f3848130a8df3ea0aff2aa5b275414
SHA256d8d2344786488c6280fd9d1da71e84cb63196cdb93caee1525a52db137913123
SHA512897a011d63fc2a13fe13ef326971e5ae7674d086562c788a38800456035016b8e59694553d6d057d486f6be6843aa4e132c3df2764fbf51ba37f12eb028248e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1d22d20120dd3fe21cd18937194705e
SHA1a76ab3e187b455649b6b004e1b9ff4803c4b545e
SHA25623967797fbc639559c5cfd673deddab64eb12954c3baffbbc2f434b195fa7042
SHA512ae9afc3ef5a84b1843ed20eb309b6eeaf6a1d388f41f26a9dc3b1b13b03f6d2cd8e97ab4f444b5ea30b017dbbd46cbf1d52eaea2e123d80f01b90503c76fb2df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d5d78f93124ccc66db3d5082d1fca68
SHA1c24cb6bf1dc8eca92ab54dbff8bb547a0b675969
SHA256ce6d77da5871e4dc27e3840f0593274489fb7bd5cdfcbee11ca7ccba2dad6d6f
SHA512092632a1e92a2cd39bb2ae431a7b48cadeddcaa58d7f605521b0e23dced785ee28f0db6538fc927e4359c96aac194ddbeb5b352b317ea724e620fea3cf9de5a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580e9bd20c4e6513454db8d5f681b4ca4
SHA1236c4bc18b07075ed84a2e7e18a1b079aed24c6f
SHA2565b07f88fef741cce0e28bbabe4a00a83c9fdd571f14da0b8d2d0c83457aaaea0
SHA512aa6ea13cea2202fcaae690cce0ae9e97eb7d7c57ee36b986a80390e5c9e94b58182195b933a98bb6cfbcc70f166499024b5cce0d6205d2f8af47487dbadcae75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54034caf72f8e79f35e07fad3a071e537
SHA10754f410b26a459b13c95a77049345a139dc0af7
SHA256208c6c709f26c2988f5d41a9341225465fb8144a94de17144f6e597ab8911882
SHA512bdb47b74f626c85d89215cfcd31147b9f8a051b81025d3a9a49d3f298a2d0fda2489e30662f321f2d84674829885daa7773959d7e8cf3ba0b425550ad5ee33a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf4a50e3c6841d8d816492ffb391a4f1
SHA1af12236c8736e9f3376e8d761810b5a60bff7bf7
SHA2568579e47873752331cd9f3fca8ad324c0ed7852bea32af4efccc4736c620368fb
SHA512e857800c6ec474ed69dbe6258261e2fbc7e81cd9a62da36f18e6c200aefb240bf35a17bd6350cbacb290b1c4b177aea6e18cefc92ac1dd7169b4ab019a9521c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef4f6ac0e64485364c3abc721cc670b4
SHA1e2534881fe0a1a40e0b4cae836e796a6152b85ad
SHA2565d5a3854df37c19c4795c3f870d7e67e0a3b47a7320d2361fb04f6fcafb2bded
SHA512b74fb98c2a2d1bf6a2a312d483bf1fd8117fe7eefe1bac45a5e065207906dec65b893aa14f5aec74d62fbe1755d95bb41563ef8dcae67ead727cb9c39489bc9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556c11b466f7df8bd6f84efba3e6ee916
SHA1474f9615b536dda259d89761bb9a4327a8f85afb
SHA256e56fe17a1934448ba4de9b92110efc36f573250ce6565d5d92baabf1282fffaf
SHA512210c2d3f254af76e3b7e4def9ce2c986244de8560d080133d7f5e001aa3209d139056c3459e131b777698712014b6035a431b91a80c3618cd8fda708a8867407
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b