Analysis
-
max time kernel
137s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 21:04
Static task
static1
Behavioral task
behavioral1
Sample
fae81654e81e72cdb0272a92b1fc3f31_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fae81654e81e72cdb0272a92b1fc3f31_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fae81654e81e72cdb0272a92b1fc3f31_JaffaCakes118.exe
-
Size
43KB
-
MD5
fae81654e81e72cdb0272a92b1fc3f31
-
SHA1
0683f6f48faaf36257aa371b33b7ce5f9d40df1d
-
SHA256
afc1ffbe3e7f9d2e32474c5e0fb5a17af773eb1aa81b74597014fcad37cead10
-
SHA512
b7a082ba3b22bd801b0488e5bcce20538f39cfd145c7ba5c0113729b16c793b54cd633dafee6c4f53d30340dc46028e1601987731ae0674b44671b339624577b
-
SSDEEP
768:F+QqD1szCw2i0HYUsGJQsefShsvBQnWTKy+CdP5XeL9KFv403UYYUHTXo:YQqD1sDwZiyhsv/1UahXo
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fae81654e81e72cdb0272a92b1fc3f31_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433632937" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15687581-7D14-11EF-9E99-E699F793024F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000e09d4390a1b9be28073add2a8a90f130c0ae24b20d257bf90fbf2f286bab19ef000000000e8000000002000020000000c9c8946a31a84e159d22697fda14d4d22c7426a1010f8f6500e9fd32706ded8920000000b2b6af533aa476efe33b006c1ec7758b2ff77efb2245c060bf8652d3a0130e4640000000dfe7d0812d5497d63e1cfe99fca420459046c61fcca05ebe639a9ed50b21f45848d6f7794a67965eef864f51547642f309e984f51bec93bbcee9af0cd2418f2c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00ac39292111db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1160 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1160 iexplore.exe 1160 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2260 wrote to memory of 1160 2260 fae81654e81e72cdb0272a92b1fc3f31_JaffaCakes118.exe 29 PID 2260 wrote to memory of 1160 2260 fae81654e81e72cdb0272a92b1fc3f31_JaffaCakes118.exe 29 PID 2260 wrote to memory of 1160 2260 fae81654e81e72cdb0272a92b1fc3f31_JaffaCakes118.exe 29 PID 2260 wrote to memory of 1160 2260 fae81654e81e72cdb0272a92b1fc3f31_JaffaCakes118.exe 29 PID 1160 wrote to memory of 2780 1160 iexplore.exe 30 PID 1160 wrote to memory of 2780 1160 iexplore.exe 30 PID 1160 wrote to memory of 2780 1160 iexplore.exe 30 PID 1160 wrote to memory of 2780 1160 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\fae81654e81e72cdb0272a92b1fc3f31_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fae81654e81e72cdb0272a92b1fc3f31_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://cts.uol.com.br/recebeu.html?id=0E02AE20CD01BCCECD018ACE0242AAC80189CC00CB02B304C900CD00CE2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1160 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afd521d782b39c0fb8345050b9a7db02
SHA11b569aeb252a187320f748d5758c6f31fac79891
SHA256a41538704594c074ad2dab3c7c1ea2efba05d27d35db18823cc0fdb44362ee38
SHA512c254a51de6131d1b442ed6365a4dec80aa35afb58fb7107ca9271f32ed602c15833b32fb2d22db3019c155594650021c74df9434bec1e53f1400aed2722a1dcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea448ada330cca75dbcce7a362bd2eef
SHA1f40f06845384418c41dd9bf0434e407852ae603f
SHA25664326e84236c672d4a18e510c06a525b91e054fc850f918dc2f6afa33f6efce1
SHA5121b794129d384435c2262c9d83f992d8c0a6704b1bf0748ef75209e144a9ab5e2f1a1e9717ce4e593111ccf1392c3003571ff38ff6f4b58fc9a207a0b8555da14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585897265f015f322bbd172f2780c50ae
SHA17491884a37afbef1da91f804dcf2b944b6ff02f1
SHA256b07c4532210558f75f4f0a2033cafe8d012c537e93d264ed6c7f1a6960df3e86
SHA5126e7b1da4b717778ad99dccb5e579da3a93714322d2f30cfaadfcc9f72bd28b9d0746fec1e54b93c31dc3cd00388f71245a41d997957013da95c1d3efd935cc05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5480c33929733c0c6f4b4c151147a153b
SHA1d60d1a0d955c939ca4a6fc15766820c5c33edec6
SHA256472bd90b08bd5eef27b5a171e4623dc33f799f96421413189bed0e0304c81de9
SHA5129e9969a7ed9fa85f48817df11f0cefb0e1556f39790970ffaf4a0353237da8fc88b9fb189f720af262e4066af94cd651bbaf1b8ab295470e0f728de850f0f439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f404e704ce9c46fba1eadd41eac5b41
SHA1118d59296bd4e2707b9902c71f105544623cf2d3
SHA2565fdf9e71483fd58ed100f1df3e7abd1728f9133146191b10e7f08c8d55c5a4ff
SHA5123628548e5015ba20518b6333dc7e8a836e4726f50f2c69c9efc98f647bcd1bf79ab666253b84260c1945410e72740d1d47c1b92f75044fb05109cffc9efba0a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549fffac1ba6ebee045ffe28e7bfdfe27
SHA12a83300cfd934024d0e0ae99ec04374e1b10520b
SHA256720ba981945fbdb64befdfcba43b8255e3abff2a19d00a027396dd4e287d2814
SHA5129dadbe9c78371d5a46bc181192a3082a7f87beaf6fa27fb599807848431114af228085515e8e15aa14a73ee7f39a1c6a5d03fab775af17fcbb4e7e17f6cadeed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a448c6e24fda7fac0c64eed4939857f2
SHA112fbbeebd41731316342785b8ecf21432fa629ab
SHA256662d31d119befb543a834a7f3e2aeee866fb641c458ff1d24227300f4519d615
SHA512ef8b953f1f8397a99b6bb38aeb87cf174b883c4383ae86bdc1602e73f471d3cc022997e1aa8ba37f54d2be9a29da887881dead733fd520cfb770bc79a4607920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a48f5cb1a188612adce5a429e5938e53
SHA196068367c78953c8aa7eabd3ba172f72f28b27b3
SHA2566d9bfa588ab1a4427db63c1cf5dcba474d79c71fd6714ba01ac4c29c151573d4
SHA512dc3d97a701cee27863d7bbf513ab0d1368c9532a0616909c4e4afcec15589c1af2edb7be0bfe1606e10cee44845f0c29610996494d77ed6e52cfcd8160039609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c8c77b648b971a1fb5c2edfb9bac658
SHA1a735972ab3b7b23483f5ed34a66f0d4b206c8fbc
SHA256413d9a35cfdee00005df7b3e678e11b42f5adc4c385c61b0f10fd4687bf9b0f9
SHA51253e652ee616c30b1c35dcc9737849419fe1d04fb35b323947fd43dbca6cabf0face0ffc724fd447946693ddb6bda9bc3d8dd3247c19e0ccd164bb5db5132a192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557d6dea12daafa25769f626bff7f7bfb
SHA12de581012e88246e94196fcdde373300c12529c4
SHA256f38b100f7146d7a061f112480830f3cb1a6e3ad5da9958a598c1b989ec977603
SHA512ab653ef86d93c411e59978dda3fd918a67e7bd6bb653e0c7469c8c5a4304b40d6fb1075d374ebf676fa3ce8a7754736d26322503b6b02c473d57cbcde85a05e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591091a02884edb0c281729df77e0a0a4
SHA19d4c1c09a3c9b0ef20584904f0b94bf95ac092d1
SHA256e9c11c18e8f7cdae04093b4c6c5896a39a7921efd921455e4608b2f25b39cce6
SHA5124d4c601e3e5d06b7213de926725aba8bc6bd9c009277bc55df73dfd65dd030de4d44c72a0b8bc4d0e240fccf9131336bbe55c71f53a3adb6912ffd3d710ba544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea395f2b4f0ec21b63af3a4f352997a8
SHA10b02454ba258f22552a4804c742fb7ffc830aabb
SHA256a64ca4dd1dde02ba554654f839e22f15b6ede30cc845388dc52e65447d1c8f20
SHA5126e55306169d90951ee6d7e90926d1d1670473a3191296aa18ba39a6f4dbf8550d3e296a32f77604ee8fd051b1d198f3bd8de51c01e935ba96771685aaf5a3daa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599bf354737b75607417e6ce551f144e1
SHA12f98a6fe0032731f1d36146a06769ab3ebc93e59
SHA256a837a1ada7d9ca29b678f11c3a54f0526e996d0da769ae60c34fa13e63c79e2b
SHA5123ee1c2ebf8ce6fd473ba24dee8e9dedd42ae820d0e6ca28a69de75e3a1cf876bbc43629c11390af0b68ba41e4b44d190f0cb0ae37e65edfcff1d9de783f5a39d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fd657d99dc024c270171f44b1f84492
SHA133bfcb66441ec87be25fdc3a794d5c61c495df2b
SHA25663854450c838582f0b75be7ee10ee483cb72a723d68053178baf32c43b37dbc5
SHA5122fb71a1c117c3fa7909d817ba34dc1357128835232bed1b0ae008635ef6a3465cb572d48d0a888bdb149030d45e4a03cc0d80aefa071bb9894522f608f62a1f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd07e291677fdd1a6617a06ff1292b63
SHA1e370fa0179468fcc43f4bea653574d58bf8ec8f9
SHA256037444b4682a0d81c0ed1a73cbb9fee82d93795cc4246745d45edbb73cae6f3f
SHA51283bd01216708aabc7aa771ac4481b3694d65270f0b24d7576ec7a658c3339373a706abb61a58eacd33eeb82332d53a276ae8ef364c83c4a41b73529240d8121a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccf6daa2ce91fa41e42beb27e4e34710
SHA1f77f7ee83e6d4894ba3451b5b84f1f39941669cc
SHA2562daac360f615b2f5ae630d75449499b4274dbde75aa8cb85fb3830ac15ac9477
SHA5123dccd1d31068bd2211832734d503dacfa4019327a6f8068c91f304e3e42b649f2f1544423eaf225fd545f29ed2407895af021e02f90b7fbc4357b43e1348a949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5962977ceeeaa58f16bd9a9038e52d056
SHA171c075f7ca932d2e7e1b3b9db12d4900f2ce2015
SHA256b0bbecbd062049526a115e82cea3676be1c94260f9bc64da38ca50ffd2766ad0
SHA5128dd57c8a4405d0a2e188a574f11215bd5ac38c14f702b177d4dfdbde33a492ff7c380f8c49744e8051b6328480b21d21328c3468f9706bcef8ef79c0bbe43017
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5552c407564ec4359027c4587faef770e
SHA1a806c64ddd2e45f342569ddfb6b09c11be30a335
SHA256f78f021ac9e752eb3440c3277a5088b9870b1ca8fdfa5ec5569cd5dc5e564349
SHA512a6cb47f601911ea145400a04269ccce5bc6cae061f6a7a180e8f51b394bceb2a4b2d791abb1d3c80be356e4447c9add7bccf80dfa687492f378c1228e38f272d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b