Analysis
-
max time kernel
149s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 11:03
Static task
static1
Behavioral task
behavioral1
Sample
4167792a78d19ecddcb016ea4b8744f8_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4167792a78d19ecddcb016ea4b8744f8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4167792a78d19ecddcb016ea4b8744f8_JaffaCakes118.exe
-
Size
9KB
-
MD5
4167792a78d19ecddcb016ea4b8744f8
-
SHA1
713fe09126ce5f062795fe956768f1aaf38dc945
-
SHA256
360365c624a1c0227379b8fd8c8f6c5dc8ce809601aa52e10225c410b9eca3f5
-
SHA512
f453c9e4a9e05eab4b65fab17dff322154fdd9b96d3117db04732fc5f7dd51540768efb00a3d6383e99623f04254855eda5d4e933812c2ed90dcf5fa92965745
-
SSDEEP
192:YQ0Eit59keX1urJjJX490Sy4NxiI3GjFtMBfon+2gPyOx:YQ0Eit5X1urJjJzOxiRx+2iyg
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0e2fc6e14d5da01 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427030501" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9778A751-4107-11EF-9E52-6ED7993C8D5B} = "0" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000008d13947970f3a24054c362cb6a92368fd1ac60d7e6facb942471a04699dc1bcf000000000e80000000020000200000005b71bcffc3cf3e0e1c13fbc6160fa727ec80e94f5727961045ced9e095e2d68f20000000f7622f8d7c2c79fafa932f15148e2f718dfa5d363a83bd1c3f122e0b0c5d984e40000000573a2a7ded35e38bda937ebe8fda2fe82051bc6047840de626dd8ce89aa1e3cfe4f5d72e71d8cc774712a6b18d581311d995cfcf62a966dca3f71212857d3b27 IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1708 IEXPLORE.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1908 4167792a78d19ecddcb016ea4b8744f8_JaffaCakes118.exe 1708 IEXPLORE.exe 1708 IEXPLORE.exe 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1908 wrote to memory of 1708 1908 4167792a78d19ecddcb016ea4b8744f8_JaffaCakes118.exe 29 PID 1908 wrote to memory of 1708 1908 4167792a78d19ecddcb016ea4b8744f8_JaffaCakes118.exe 29 PID 1908 wrote to memory of 1708 1908 4167792a78d19ecddcb016ea4b8744f8_JaffaCakes118.exe 29 PID 1908 wrote to memory of 1708 1908 4167792a78d19ecddcb016ea4b8744f8_JaffaCakes118.exe 29 PID 1708 wrote to memory of 2220 1708 IEXPLORE.exe 30 PID 1708 wrote to memory of 2220 1708 IEXPLORE.exe 30 PID 1708 wrote to memory of 2220 1708 IEXPLORE.exe 30 PID 1708 wrote to memory of 2220 1708 IEXPLORE.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4167792a78d19ecddcb016ea4b8744f8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4167792a78d19ecddcb016ea4b8744f8_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Program Files\Internet Explorer\IEXPLORE.exe"C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2220
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c048257e7d59fcd503caa1485b4fdcad
SHA13055de4750eb0a039b8ca1e85fdd815c96441fe8
SHA2562e7b6b5206bb319a6261edc163e550e7e3d089a49db7d571a9bfe652343b5898
SHA51293acf201b37294b15b4b5637df45ffce4794aa1832ec95d047d990c2d9baa1500bdf1f570e470116175b5320c4258328e56a719becce2740381e823794337df8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9ad9c6e0672a1027d2e47984f3af9c7
SHA13238c51c935e0a35c8293daf228733294a02a154
SHA25696abba27c868bdaec56436c9f51e68579cccc976755604e452d59afa3450c189
SHA5124dcbe60326c31471657d3bea0aefabeaa1db69d684af364716ac2a970a76de3580fe276c1a89e03825b6c1514bff75d7231b456982f953dc9abd3c1c4419f0a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52085dace806ce7d48de7933172c29852
SHA10d8cf856d835884d784ab515be2bfcd3b21f06dd
SHA25695432f1fd1ec2916bc7e349bedd5952f1cf4807f251039db3c15afdf0c08ba07
SHA51277b7f878310b3db17cc8a75207948181d7e62ecef7184ccc9155b3e89fad0ff8e46d1d24e933ee88af7f217eaeeb2e07c3e29e9b0f4a649a28a3080ce0b5e155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566b021394c718a89de6ad672c92f9f24
SHA1315794ce78f7ae75dd7bce3df56655b32799ca4a
SHA25653c2f70ace1e6e14eb0448431dd0ec8d7a34e3ecaf2d52b7765dd6ba46863532
SHA512a457d765cd9a12888d0f5f4dff5b90f9d84047b8a2759dcb66a22077fb3545e8efde4de1e328be2b3d67e958f349ab072859c74e521974edad3ac550d6fe8bbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bd50bb9e84783acdf4ac39ea80c4e50
SHA1326832caa1d52465683fe364849971b4408d168c
SHA2565f1524f4c29418c61741efe5e6c950b852c706b4037a0b5966b4467dbfb0d9db
SHA512a2c9ab0ab122d6b3c4624a8220e6d063d1471620be628df962bab68189f2dfffe0b9a55dc2d3eeab7d6705e8a64f1b49c29c5f9ce08327c3491ec4958c26f116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58678e00e37bc0fba44405421c9e177fc
SHA1d23c8e93fd0035c7f70c351730750658ab94f4e4
SHA256c03161d71e7827807491005d0a3a4f5cb46b9dc21958f630914fdd16334a8a38
SHA512a42e4b74b3289fc07f072d13f7e8a42dc26d0fa636cc9a72f8fd9d9625712d90a885f1a9e7bc9dac7e5f2ec9ad10823821a33c2dbaa0ef48d8442193e5aed542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b1607bcb2573b9df234fc5fafd633f8
SHA1d9eb5c1d44e53c2e8e0ea814b38ff135ee5d23e1
SHA2562f58e29da4461f233e69215115ebd0265f32cb9087da79d41e2b6b094d0a76be
SHA512f4896bfe8c87df544c51808a18fb0ff9cc00f44a7a04947220d32e8e34a4fb0337c596aadb5bad7e14206cf9fd4da362d1030f4a5f808c0b9e38a0cbc9cfe28a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d6471f978613cc196f8f67125ef493d
SHA137cea6bee65e3844fe83621cc6828d868c7f28c8
SHA256aee2c80d3380108ca67d13de27ea546ddf94063f97bc1c40c18870c7791c23f9
SHA51233cdd6473254ba1a151cd467ee00ae086f3a8a53043ccb2104896f568da8d4dcca19fcaa20321e7ba068d49a2d2549e35d6886c77dc3263b65b2d921663047a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5859804f17862baedd0b6a0fe8c911a65
SHA1316d8a0dd531e1d3e383a82f222b4b070fb93434
SHA2568fedb5e96378a2de1517c7773cb084ba00557fc6934a11b6f33596b82f3bb6da
SHA5125bbc6b7ccffe0bbde4e3336f0d17fa1ea3b6b6653ad755fd056d11838e6ac61213e66b79f1a4f1e542b8d0ae4c7b1de20895bdbdd26b5500122ceeee4460670f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e880cc03e392b5f5dce06e6b6e632c54
SHA1308a312e249d317d8a6571041c1976d6cce939c1
SHA2562a83e6b16a9d02b9f912140c681a6164ddcd925b249374003a768f3a4d722aa9
SHA5123aebcd06d3590e5435dc751035f2762d7e23b09ffc150aba97e8abd8226759688ccc8a754e83eb59c4896936ad80243523edbb27c839e96eb5b46cf71996fe9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53454da2269954e731ef56da35c27afdc
SHA15183f1d98d4608129ae469519eb5580b4ef86e99
SHA256fec142d3d53afc7442979d47ad9d9ce26cc312203ea480eab0adc76a6a345761
SHA5120f4520a7bc1c2cf564a887298e6c4f75bf63a8cfd6b8de548878c65afdb89db15820e0276d08d077e816a6223c5ed5c1713e00e4668692984b929bfb83f7c341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ce9ea1e46bc53308341fcb7720a9b96
SHA196bd28ceabbacd13f07a6c684a3b4b74806d1e8b
SHA256b8c67f5f74422c2ee586d01651fb04e820266b0c467e9c8d4b271f7dd206ecda
SHA5122de7fa1fb60ec9f7d466679ab7a0681a1589b5d291a4557223c3dbc4c478afd6ed9304f9713e4d55e3abb207fccd0735cb5ad7242a11d15b18818817469c96f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb243b65bf1ac281441a381df080306a
SHA1bb2fc3fa93e6fe6925da4e9bfc07a2f53a48b744
SHA2566f1974c72bba76c20c74a6ba7323516c38fd352197d96524544eb84b22af3a17
SHA5127bfacca11d6e03d7c32a5e8b25dc9c9982140596e56b157e9db76ff8cb4e7fc87eb94c2d774c5da550ab6af586a63e99ee51af1a1a65bb9966669598c6f4dcfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bf40a271b9e29adf90e1e3dc6c37d22
SHA161cdd2d992905d80fb8f41046d16c5215a0024d2
SHA256daf2fa9518534e83f8569dea60131680ed362dff829310e743032606d56c354d
SHA51257dd4c24d91ff5f43ffd53de3d5bd92f7c875827a8f563f4f37c9aef537ba4c07efd4ee81a6a3e002f43817dd1ed0414185f7189a3e8aa20ca893e83b2724f90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554711534d81701d4b091ca728732101f
SHA11a082fa3dcf2d1e5ccd6cf5d1d98e5ca4501ced7
SHA256985dded18c92425e8c8c583329339b29141a88efc44f9658eb75a3c494cc9e52
SHA512eec02f249e6cfc6c8f977ea0ec9be7d9479294064458a75d8781fe1a9b5185146bbe1c05a7fcf8aad853137c179b22d0e1a023cb217a0e3a6cbf907282c5207d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5773c67b4b48a57c67148d153849d0e20
SHA172035f3db603c09f0ea2e32d104f0b571e00b4f9
SHA256a41a3971eb68c1e0c612393f0ed180c288fe80446071be97e92f057f0ac4985f
SHA51233e9c399d0560ee166f5202d684c96f62bb1f9e485d778115a84c5dc704d6c807d90878a23e57dfb3681427e2c53814fa5de2040e40925cc6cd09e56eb873f52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc5268f621d3cbb0930859923aa269ef
SHA18624fdb0cdcf6a304eb09bee467641a513478fd7
SHA2566f1dabd1ddec79207912a0c09d827df693854c82f16ad293872c179a23d4b9dd
SHA5125713e24a5630621a012204a010b831e34ed7f8ac09423e4c246a1ac84ee652a47eab040d48c2f5462abf233ea0cf8a108bdabec68ffa9d330b7bddd6a9ff3d3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b4cd12a193406942864ea288e4d8fec
SHA1bfa8d5ef2d4e0af51792d0995172e1c76e88c149
SHA256ffcee6be865642a0afb8b15fbb69d2dccab78c1577bd2061faef12d06981eeef
SHA512527b73696ffce7352ff49df2c85bb1198fc24f6fdf547342b0df9ab09b636574b180ce95104f9a9cac068156da207fec5d8f9cf40243ce56a3cdd2711bfed1c1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b