Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 15:44
Behavioral task
behavioral1
Sample
68301cd8719f486f39d248376fa95fea_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
68301cd8719f486f39d248376fa95fea_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
68301cd8719f486f39d248376fa95fea_JaffaCakes118.exe
-
Size
57KB
-
MD5
68301cd8719f486f39d248376fa95fea
-
SHA1
1fbb3bc9e3cb7ec7b17516ebb04a6bed6b7566f5
-
SHA256
09f8f3c7598c0b95d4e3f05ff762769c3330d4f4ca6621dda2d954f685b80795
-
SHA512
f2aeb6d0545b40474a6456f2fd4235ff892d8b252d0784d16217544760bbd083218f1844c7fb3d364de8286ec8e1b6139364cd4126511398879b52b1f1bedc55
-
SSDEEP
1536:NCQFWmlXAYOJ79dAGXUDhRp4YVEzLupgTa+bM1O6tgtUx5pZgLad/gW:ZWmXu796GEblcupWa+A1Rt+SZgOV
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68301cd8719f486f39d248376fa95fea_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000001b16267d13555804af60285a0862c62e460b56ad3385728044624e7fed1b3bf000000000e8000000002000020000000a02e3cd6a65fb555c826b6163e723f34d679d20ec2669b58c692e5f16521e9b32000000005bbeb3721ea5fa8fa6098b98680f3ed2937f6b160488b88f49ff5e468ec27b44000000005ea06e8cea26e638a66283d64b5cb82e4c87b584742a55355a3a9a31bcd1cd158ffd15d4bd9349cfd858f2adbffc865fdb9145afd58eb0008d7cf05ae41ffdf iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c026b13c17ddda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{77686E41-490A-11EF-A372-5E92D6109A20} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427911345" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1988 iexplore.exe 1988 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2988 wrote to memory of 1988 2988 68301cd8719f486f39d248376fa95fea_JaffaCakes118.exe 30 PID 2988 wrote to memory of 1988 2988 68301cd8719f486f39d248376fa95fea_JaffaCakes118.exe 30 PID 2988 wrote to memory of 1988 2988 68301cd8719f486f39d248376fa95fea_JaffaCakes118.exe 30 PID 2988 wrote to memory of 1988 2988 68301cd8719f486f39d248376fa95fea_JaffaCakes118.exe 30 PID 1988 wrote to memory of 2748 1988 iexplore.exe 31 PID 1988 wrote to memory of 2748 1988 iexplore.exe 31 PID 1988 wrote to memory of 2748 1988 iexplore.exe 31 PID 1988 wrote to memory of 2748 1988 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\68301cd8719f486f39d248376fa95fea_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\68301cd8719f486f39d248376fa95fea_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.rederecord.com.br/hotsites/concursonovela/default.html#2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1988 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0d7f8766c76242a8d88361eb7714db3
SHA16b648b7ee7e405c0eeb8c1d7b57d88502c93e388
SHA256decf0475905e7190932876ecac88977a5bab6159ff4e566cc3cba50a2768c20e
SHA512a02ffd2b3be292f353f1ed664d5eb77f8622ecb5364f4ffcaa5bbcdaabfda17778c7890a3121e44e9b24d13768a4f40b216606375b5ad3537c9bf4ae36713a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558661e4fe13c126fa3481ad691f8793e
SHA169aaeac94a80fe06e2eb5901108dff6a661e9b18
SHA256b03c0168be0af73d6a31368e9eb2650de7f6292b0959b95eb728ad8082d6f89a
SHA5126aa0cb6b3dd86fb130587835cf36eb1090b93e93a22c98e0150b7068f05231bbb0b06277f0f38aa1b1b59f9f53eca6767fcd154fc25e2c4e3920a2b6f80af226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ae8206e853faee7c1edb0e3216956de
SHA1fcd142a3c9e125a9d65dc4b7c79e68b2bef8b9bf
SHA256482c8a8d8e4ff3cdf4db50c3fb934cec1ac4f6eba18bb5c69f581c607ed74fac
SHA512b5e79b76e400ac75cf0fc6504ca46824d1399789d6ab67f661350277c2ccbf45c1df98a843bfc42ec2f5638df4a6a8a82de67e240c3429bd4986bad3839dc0b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50546a7c0a8454c6e2de72d88e42bff03
SHA1cc0db34271a83791a2ba8fe2d0778dd5f5265655
SHA25624ed46df48be2b5ffffe18db3e8d30ee87adf8e5092d0135b321fe53defe35bb
SHA5120b9aa804782701642973987734ad7815e210c8db6f79865bc6c1f72b41a8cac78da818bdf970e418027015212ce5fe72d2f62b148114f9da163f22402dd066ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a263dc078fa226cdc9b1afa07b076882
SHA18a202c906512803fb4f218653eaa20efb058ab27
SHA25656c926ed0e96d138813e54f4db77319bdd72d85ad518dcfdaaf57795a8724665
SHA51209fd5b8d5da13c28554fa0f22af2f465d151f585ac067894366bdcf49ddfeed989a30f0b57ce16deb1ff4f0fcfcb5d3bcdf1fbaaed61577a53ba9c4f833b3538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caa02a91054b786cdc3dfa2747897d93
SHA11fc99f68b681dd5ef7ab1e573ff50adf41b2e657
SHA2563408f566f942ddc043e538632171c5517a18ef7f8abfa8905011b743c436b848
SHA5122aeddf7a1a490ab15c26d4b8ba84c0b3009092127fab5bfbf3b9f7809a723636f22231b75c50591a8325fa6020f2a43c2114a4df630fad7da3d567d7a01055e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59894bae7c19ea35dcbd6e842fc7d8b0f
SHA18df01ccbfb6ab8fe6d5f8f55f26e576408653bfc
SHA256e1e6f8c7ab9fe34f2dc96a33acec638a51fe3b7edad5430af0f68d5fa78472ac
SHA51215366778b31a935ee32dd181de657052f7bf2b901be17eda0c91380862276e377393c18e9936cae294fbd23096e300a7210762370b7d172744165ca99f960e61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeef940bb925dabf8ba233eab739e7df
SHA17492a00a8ed59d11c762e479cbb48d66624d013d
SHA2561fc02eb51ac57d0ed139f86ad601d328351d284c5c7bba4f61b19d38c41c7f29
SHA512e910800cb48ca73284a1d90d98d8a2d82d796e0a3111940680dbe6c121fd84c2a2a79136947ce9c2eb871567fa60c8820535730039f7aef409e897c603eb2b9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c18a8b5e7d8315896ea5bdf076b97db
SHA183ece9b8a0c1e3a1618e4f9a13636b7a70c5de08
SHA25650436258fff3cf61a6b6b6cdcba30f5e70686119a74c6cc4bb3830e5858bb820
SHA51237b13ff94ecf080702f7b1a4b70cf699a19fd329cfe6c57410a4801aa4347480a0a7f7c1c2700daa872291c5c378a73ade1dbb6f27543fe25bfd4fff9bfec18e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5312f73df614bc6c504f4899e4136075c
SHA1d0e2618795a0f31c87d1ce22af9175bd9912b04e
SHA2566c3b97a1dbc44bbfc294023df4463fa4989c9ad68b958dde26e13df470707e8a
SHA5129c9873177b8dabb8e07025b1b512915700163c70404125b184946fa558600225d37e1e94c1faf556addac8694fab090c5486271c9ddb25e4b1307b6791dbe97f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554b1dd3513ecdb2610de3db61cd7c7f4
SHA12bbc673d7782900370d3c1db71299877eef3d56e
SHA256684524481356e97805ebf744c678c808685ba3c91ee77d936ada7b33c7c3838e
SHA512f69d6b978dfa2b73cb778a35a26f33f1ba9de8cab440f15e1bc704cccdf1b3d8d85cb5c80d9b31f3bf974fcd9308649fbb6ff636978986c2b2f4b9b5314a1fb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55481e2d7ae61671f6ce63e2922d8f243
SHA19c4faec069a89549fdd842b7009c34d93f2eed19
SHA256b8b06b418c43164309af8e1541094eabfb96a129a9967a00bb1919a7a1838566
SHA5122bdd722fdb773feba53c70b1e46f5894f4a64c327202ea7306a5fb65f0376a3f291b0d479e7eb91051d65fb45ca85da8ba0b6bc28007bffea0b5fa35a88ed898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c8f4240297fb02ad7d63a20e71a2e5e
SHA1e424babb31f24201020fdd117fdde335691c7eaa
SHA2563df2b7f36acfc7055232f0e99e58dede98e30f026291af7e4fe1f97a1dd6bbad
SHA5129515d0facb0ddd7d613e5326f2b127cc3c930927b2ab66a1dd1bd8c0866b9e49d5876c288acf7e41723e8a8143d42f752783f707372794fc3a4f6d6a78b148b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eff65e8aa2c4d962df2b81caf07a702
SHA1d0284f9420ba1becef83991b7ccca40e5dd6e81b
SHA256b19cf613260ab7e2645b37599c7878594029f4704001842bbd357d465d8f1b1f
SHA512e347558dddc945b65b778ddb5f205e90825f1a4482c6bef3d1416c75bada4cd09f5b08faf988c0cb1c007f84eb3c78fa51c53966da3d2e16c3a6ec7b5d17f76c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5ffc74582ff6f67fa2555f076320a65
SHA109c1f6deabc420462a3447f414ba046ac22518f6
SHA2561db472ca4fa5063eff8f8bc670e6343e82239d966704444949f7a3fd3be16993
SHA512394d513961dca67e6fa89386643dd73283688cb4288f8d372d6a86dcf73a2f814513ee26457c1a1ff76ec4979008ec7e18b22019867d8cb89cc490ba53112c34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59327868386caca1500ed8425439dce3a
SHA119588e96e8df82dc0d4bf17478dc1ca40266224b
SHA256ee728cea80b9487f7d3aeada4bdaf6dbef695ecdae8b616e07a969c84f5f612d
SHA51220b1e997450c377511d05a7cb3a2ac11d256ae33e8c841992d03afe054737de246ef920d04707d71f1e7bb2077748043e84f1400fd0144f4a53a1b4c82add9fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9ad902905d31e1f2ebc6b0c5c1ce002
SHA1befb545873c8d246bfbe8befe564861059f316c4
SHA2567f5242871e344bf932e7dea2b0051ba8764ef64f09becddaa58cfa89f65ad0a6
SHA512059aba0877190723440bb650c059403d8b91fb4c6c9f45a0faf6405599ce57097bc3f824c5c71921faabebd87f3dc2585a75b4a8226c21a17bb1a169138ffff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ca88a72de2920e650d112b7cb4a3cc9
SHA1c1c9bb7ea65f38ecbcbb1b348c2ea790853dd3f3
SHA2564c8f0035f73680a01f7e8abe06bbf7c843edecfa3b1f452db773913b306cc288
SHA51214409b63b803e40c4f9d151747c9d4ac48a0716c026aef7429888b85813a7ac2b29daf0bcc041cc489ec7c3c0450fbe2e9384bc635ab0f5d5ff36d7a73a219d3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b