Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 00:19
Static task
static1
Behavioral task
behavioral1
Sample
4c091867b87ac30a4dffc63089fc6837_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4c091867b87ac30a4dffc63089fc6837_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4c091867b87ac30a4dffc63089fc6837_JaffaCakes118.exe
-
Size
64KB
-
MD5
4c091867b87ac30a4dffc63089fc6837
-
SHA1
93a60e3d40ea2e0fd6243b793053b9bbad843d16
-
SHA256
819f6c694168d6e6276caf314a2aa73105124f4d171f588f6a9b09e9c5d38258
-
SHA512
669ca2ad4f9fcc2304939523486decb0f3b7ceee0a71c917337e929b3fa80c5c4feb040a2ae0de1b2c7e001d63c2efa66d98f4e905cd6391dc37026b0ba3b26c
-
SSDEEP
768:8CpqFQuwuL+9WiMOfP6gR0z96A0716ezP3t24jtVjhzMXGbFF8E0yyLvwvuXs8x:LpqFQqHJOfPZTAITnVgXIgyyLYvulx
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b000000000200000000001066000000010000200000000f307879a9cbeecb4597c84fcf6d31175435ab2218a65fc750f7fffe18bef4c9000000000e8000000002000020000000f128b7b50e0b0aeb8402fc07831a32eca546fafe618be59782e1ba6c8620410620000000238c502a837d7b907c93e24b883a57e9754633b3ce23f55eddb1edc4961c87dd40000000bd9764cf50082bf1efbb06c7ec7100f4795d9c0c50fa7384337600f5c9b5af2ed3123e28283961b7ae1a639f991ced742cdedb10dd44ef1813629f420207db55 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427251060" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1EDFBA01-4309-11EF-AC89-C644C3EA32BD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80d5f0f415d7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2488 iexplore.exe 2488 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2488 1760 4c091867b87ac30a4dffc63089fc6837_JaffaCakes118.exe 30 PID 1760 wrote to memory of 2488 1760 4c091867b87ac30a4dffc63089fc6837_JaffaCakes118.exe 30 PID 1760 wrote to memory of 2488 1760 4c091867b87ac30a4dffc63089fc6837_JaffaCakes118.exe 30 PID 1760 wrote to memory of 2488 1760 4c091867b87ac30a4dffc63089fc6837_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2112 2488 iexplore.exe 31 PID 2488 wrote to memory of 2112 2488 iexplore.exe 31 PID 2488 wrote to memory of 2112 2488 iexplore.exe 31 PID 2488 wrote to memory of 2112 2488 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c091867b87ac30a4dffc63089fc6837_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4c091867b87ac30a4dffc63089fc6837_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.marsegseguros.com.br/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5979546a81de1fa0b07e2a19b557be980
SHA19b23f00978847e2d4e69b8a99e2fb5fe243835d7
SHA256a14d274576cb8745ac2222bd9388c0c2eff1f902e9332ad1ddc9a2d730f16387
SHA512ee0a2ffcebbd3fabf4d71d14e0257de0b93492779af5ab1a7b54023dbd8e8c77762a5aca9770704aebee9c02c4d66eff30897e72400606d409d033953266aaac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd5b1a874909cef1a3c638fc24d82778
SHA1b102f7f90b5f95fa820573191c6261bb8eafb4d0
SHA2564bdf61512652f960a4d7d5c7cf374fb18b168ac3efc6e85a547f4016dbdc1b75
SHA512e257284e8b81cc191c8fb60904abfed4cad4e254841d9ad3374a7c42157590ec1d7e38ee6bf754322976df103bb2c6860551ab3a469f1cd25a7688ddcde403a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598e5ee483f5a91d2ecc281ee6336f945
SHA1ee8b5b946ddb2a1c6326348b82672b43045a5d2e
SHA256e6f44f20b049999d32d4727ef288fd9988773beb87800c015f4f8c8f24620580
SHA512f18c4fc8599c830825786fb74fe2e74dcf958784724050ebd37fb66d7dad07e6f18ed536366e8e19359d8604f743f2a8169e46b32a61c69d407c59eefb24949e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5e9e2bac3b44a3989faa81530031041
SHA1ba3cd7d9b360adf5fe484e882a3e5ae7208b9004
SHA2565e064401e364b78bde551be3c9c4119831b6948d894403111554fc26468a4db8
SHA512d6c5c9b48ca84a304fd8567c8923118a62beafb746c15656b68c99f001cbb49ed1ee90ad75e2ed3f2a6927526387cb8ffa741144f452142406e0548942133690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6f915d0483c247b9cf4d9d550b107ba
SHA1bae8f4609a09ac3ebc07e756dd2760676ade7680
SHA2560e92e27678d03701df9b853069ea6deefdc6274ac8bbdb3b22eb22b121c95678
SHA512618c0670b8844a1853f99ef5c1a29d38157eed4d2baedc516c8c05dbb3dc7b3092afcf0b7d25451968540e97a3773bebfe91e9925d5eed26653d174c17a7b577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59af32f42c08c3debbc0ef39f04ccb045
SHA11ae415bab8e6d702484171ff978a8f77f8c5dccb
SHA2560f41f1ca68065e0c87b920049efca1b3c449d09defbcfc73072ab58f862ab281
SHA512ee087c78e4d563f3011295b4a1a230016e4b788433ad06904625ec2da9df27dbd9e7509634a382df50e8989692d00a91af748be6605ac0649c0bb4862fdf9a24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c280722e9a371d86adb8ca1c7c8696d4
SHA1846df0481246ac75f080349d991f20af62ffa016
SHA2562b85922bcebf6d7e2819339bf8604cafc7a6582d0e3da2302d62c0daceec2399
SHA512662f0aeef5ff8c57eb35832411a34e5be36b6d3215b34ac9385e54a9cda6bf3a81e36763797721c07596831fcfb8a063e164aa1f03c0d4e4bc564771f12d456a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586dbc66a8d9377a73ee75810eaaafec6
SHA1e700533f88dbe4288447c38d56a8ee61be328876
SHA256469b2a62f7c4e9428d050b311c3ee5efc103ac2b0a683e168dd91b7e72bfed38
SHA5127bd1c3304f3f4c49ea141dc57654b6e3fcb3b049368cc1507c7e57f8fc6dc55abcf8ed34d35925828aff0e183c15502a0f65808a16a2a8bed52d6c7eb150ffc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cee53254eb3dcbeac1b24f44f7773b6
SHA1df4662d637d0a7b35daf81868eb4e19cf65ffd50
SHA25614b4c82ff6b4874e153177486f52a7f0d1e7a481c6683ccec7442366224df1d3
SHA512cf095ce43c381879adc2e0fd059e9ee60a94d1d3705d8e15c7a1afb56f63f33bd9aeba4c66686e937f66c8b816692893158b039e55270a90bd8ebe1fc04e263e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569df997d893c5d62dad70cf2a421581f
SHA188b81de1f2eb8f95d7a3a8ce0cdf9fd737efc2f0
SHA25694a334c2b4d42b6ac5729dd6b6aa0e4f6d4c1ffcb2f59162fde331daa73b9214
SHA51279ed892be47459578dc89ab4477f92fcd03f4c93e66a7fb5aec698b76afa2c155a10808a289b51ff708b05ca9146c21887104d5b11ebbe2823a3b1e5edd07a75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c414828473f7f3a4c065626725bd2cd
SHA1fa323f6a360a08f8d19294bf9b5c18562ab7442a
SHA2564bb6009b38bf87cb77a98584caf32d24cc6ef99b40730462f689f8345d0839b7
SHA512f99695e095dad3a31549e0142d08fe9f4a2c4ceb11eaf269459b59c8d46e7b73ef3b68c06d1ac8a374c3570bf510def339290f8c11c8e91d820f6b7168f252c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520355b93298ede18e851702d86bfba97
SHA1ad194e9b7d23c36fed72527cd467b06773ce5295
SHA256d1b0f6231556765b825cf2e1fc842b4d6c8b2fece113139a418cbd53a5862fc9
SHA512628ffc88c271550c49ef7b8125b755ecb57be9afc81e0b207f18d6ce4b5f6f73722dae224e2be0c4dfd15093dbf951b021bc18698e63559f68a5bffe0dc35869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522c6a48b2fe4ea9fd775a67acb761fa5
SHA13e2a7e65e3c4cc2bb9293d44a0db48417eed5a65
SHA2567a6be229f6689d9c5b1b7ad185eee88a1f1368cc943ef4c181dc50b8029b5731
SHA512638c01d3f8981561f6a9d903df1dc29a663ef2d293b707a1cc1c9753815686a58994eff5e34a49d4ffdeff66dfa64d43f08c77274f9b74074c47b2a173c70d76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bb3f33bfe494028eff41ab88ac16ea8
SHA195bc349556c090ea871cc76a7df3c1318b741e4c
SHA256e31fdc76991819b866e954f0f71c595bdfda03ddbb8b20d77285b3c904bd6dc9
SHA5126302d3bda895b2037c668e5726c6656caa71fcf74b419b257ec6a8dbdd55a772445d6625c48c707ac816252b9f6a1252889705d7d290de29fe43363865e07a26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de9056d678ccd198151e0a9a9df1e503
SHA193b66785b72fd4053db1ba96c0a63ad0eaaceaff
SHA2562a87fec05e8209885b79bb0d3473d27d154085a13798277ae74e99f63dc34203
SHA512d2ebae9cc8a704effc3787591ac133dc82a7803c2e9c93ef958125db0c6b784c4f935b648658ae7236593b5d9d00b7ef2485207f32d831b50831641c1d683261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523af450280b93378b07bc5d43c92c995
SHA1d5a4c0cdd583db2823d7d4dd4b301c01f67c4933
SHA2566794c912a9c4979317d925dd81742385738b3793d91abb4c0ce870976bf27565
SHA512d4ac314e5d97a621a59d98e8ad097e9c3fc7d9c661fcf5871884c41a6709f95940bceacffda1baa9ac120d2c1d4c494677e8221055b2eba3148668fd8cc78b66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5338182c3d321f80eab592c62353b3340
SHA1ca43cd330a375b72457611061c9dc7200c4c1c2c
SHA2567444a55d905f2019c24c06bfa58a490325483e83431801ec9e70f7ab8789d346
SHA512aaa63a3dc439fec4e555952242ed4bba0f12f712d96f249e17a4bcca5758935fc671b8670ecc721a6d1684a626e78fc763f3d1ffe697700a124f5f73eba61290
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b