Analysis
-
max time kernel
144s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/04/2024, 18:52
Static task
static1
Behavioral task
behavioral1
Sample
fd67bcffa1567862b05fdd71248a19be_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fd67bcffa1567862b05fdd71248a19be_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
fd67bcffa1567862b05fdd71248a19be_JaffaCakes118.html
-
Size
3.5MB
-
MD5
fd67bcffa1567862b05fdd71248a19be
-
SHA1
6c7e60843629aa6e5ae3eca03dd932a08b77e5ed
-
SHA256
f7448b27f435b62d39a2651618ae26a543a5abdbcaa65513479384e9545acc18
-
SHA512
a6bd560d721abc596605941a21a0a48cbf733cf271bd98bafc752c6c1144aa77c35326c00c21bc9d1367e9ab6b1c34037c46027932c3687e64315e8875fe655f
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NyV:jvpjte4tT6sV
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{32B42621-FF47-11EE-AB07-4AE872E97954} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000f3624240e802c8f704856fa242b2460456279d54d12d989c653f88a3d57d8d3f000000000e8000000002000020000000fc57146cce1ba7b97e1192901a0716bd20028705d36a477d27c391b20dcb0b9120000000b28e11444e2502de3aec889b56633abb9a4c6c6cc016d8a16cfbad73e420209a4000000087ad5d189ead9065b6c59ee8202125f3921a6f852fb84e66a91fdd2d30fdb6cda1c20a5a0b64eddba3e826d286be4f669186c21289dd4798b524bc3491bef790 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3031fc105493da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419801049" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1996 iexplore.exe 1996 iexplore.exe 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2292 1996 iexplore.exe 28 PID 1996 wrote to memory of 2292 1996 iexplore.exe 28 PID 1996 wrote to memory of 2292 1996 iexplore.exe 28 PID 1996 wrote to memory of 2292 1996 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd67bcffa1567862b05fdd71248a19be_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1996 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD56370cf6797700702b4df48e4fc7dff9a
SHA1653db054e075ef3b6395be30263c0244247f101f
SHA2562dc220e4e4824204312b33739acdff1da6908f204c9414b15243d94b532247c2
SHA512094d80bbb40ca91c086f6bafdf3547f2a50053dd3c8e01df2606e9434d6a1b76402bcbe15281b6df2fe60d37add53dd1a227370c4f7589df80eb438d7df51dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ea5d062f336567d27eaaa2ee71d303b
SHA14bb28e4246c55bb1e599dc5ad429004c600cf63b
SHA256fe80d5d64ce11161857db19cc6e0109f5c02ab496fbdcca6d87df700dfe77c51
SHA512146bc5827023cf2de7e9253e9da1813c6b6ddb0b249b14621b3d111681da4eb032a9801163a4e37e0fdd4f722bec0edeb73fa87d9fd8cfec028b9d607597f6d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2ddad96e3222993fdfccaebcad8dc09
SHA13339469327c1f77a7d538f411c428a836428c895
SHA256b0782792bce5314e2af910d66e59a8fcf12b4242ef5d81a13c910c08bf2d8e42
SHA5120eea3d09c706f4a173eb12ffdb8589b82ca718a9e418f4cd0f6473f1e1426a7b3890de9368b8323a4236b66c0de01645bb8757b959a6d0615e566f14645f711f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6034e50f11383e9ade252ac024427fd
SHA1d71e8a9e51b731a57acea0450b65c949459dcb69
SHA25660a3f5b133b18494be3901b388fd770cbad296cbd120bdc4efe53f53eb700fca
SHA512b6ac3c69a07cd47b4f689b255ccfcf16d5c299b2c6d785be456aa48e4fb92361c8003fdf77aa70c0faa8a52501bad5d768d8a22599713b621f1ba7af3a3d1435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2da187848232ed3eef2898af12552ef
SHA1a5deb34bc42613a7b088b698841b7e83c775ddbf
SHA25607b91bd20649fc3a2286be70724de366bad6d8d0121a6ea1d81fd5ee3bad3e3f
SHA512ab53fdaf6432e919c0844dbbec9d1b1a52249109889003a6fb3eee52c15f2d6948da1040c1873bf3a8a51a77a42ee0dfd4825d29501c803eb7003269617a66bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5c5f8c6ae7f211d38e0b5fee4d3723b
SHA1521d554398936c4a78587990c07dc13de7a5b4d3
SHA2564a9b2f33740023f156a38e1ff5d0d4e299d684c8bd56880a3b5b0500aa20bec4
SHA512f7a8aadda825a6c42b1b97430f39e24c39f042353cb63542b8ef2d309e8c362dd0a1504c36d0c530af23303ef63af85196b6cefecb25a62c3dd7700dae84b75b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e908cdad2c6c93087a66e5107b48b52
SHA1fd821ab5db4abbf58455b92f0096e059900bf92d
SHA25608050192e8b42a813fe4df0e1e440698cb6d2d092f4c567b2b27e0070423dc78
SHA5129955ed5b47cba2298951d375501c0573f0e804386a2f5ca95ede0e075f239dd8183b43294bd73593d0e02f6d34607f4c9186ced91a225e855bbc9cc2c4ca0768
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dea2db6b5c7da6ec001a8496edba3b1
SHA15e55cbaa2641850edfbcc61525604d1410b3baaf
SHA2561bbda671cb93c6741a5eb731867f4f62e9f8e60cf35478258c60373769087b61
SHA5121e170aa845ec6c50c176ba6e3ecd71e13c730bcad597119ca5d0b0c1421e729aaf9be37fc9b98590924d4ab0a3b38d4c5a8ccb6ea44e3db0ba529aebe23d0f5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5931027a2f795f68f731aff36431256c5
SHA1ccbf43b5172ab7bf4501fde004b5f3fdb0fb90aa
SHA256eaab7657c7e0050f10e695a0f178d630f1b03f7b6942d5fcac4b0b3df26202bb
SHA512b8ecf0ee4a33f0ea0124a1697475c01b3a0d8822034a5acbc3a11af17208f06bb509339c4f5c9a32df3bb476ce8a984b066e30bdcb385eb4bbdb24fb6217e708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5beb8240a8dae3fffd2711c1ecf06de38
SHA14135b2f54a205745bdbe647351501a5bdd312ef1
SHA2565abe64af7ca2856f02cd3973ca6b71009ecd9fa52c9c403bddaa5170e9064953
SHA5122bc3937d7ccbfa105a8ee51c13b1263b0836ba7eb8cb99a1a3d5f919d229cf903910d351a37de461fdce3dc5477d8d0a2df34f54c1632ad4e804660e3f3b2502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d31e0e032903af555fb7450345feff6b
SHA102311b4b99148b54b9e43c8115a90fbe63a2a119
SHA2565ec37dabd32f9c0074532df8c8989f84dfd034a4d5121d27220b297a20ed2e9c
SHA512c270a9ded27c4caf6571468a127fe693bb88d7b59624e24014909b0315d4b93474a212ece2eb8c59e90ebea69163627ed44deb4718bac9f5aabb665792c5c497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD517d7daf11d712e26526d86303b596cea
SHA17b53637173831d8adfc5eed18b085050c7463a4a
SHA256cca0d952c514ff7c9f02dc127cb182daca8e7f4450efbf10d79021aa5996a54c
SHA512daef1038addf4570fbd9d793fc438b7b6f3e023719ee03e7c3c814fa4822b9a5cda37376ded660ced17e542ccbe31d30fbc0ff04bf9cea8ea385b00b1d661811
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\jquery.min[1].js
Filesize83KB
MD52f6b11a7e914718e0290410e85366fe9
SHA169bb69e25ca7d5ef0935317584e6153f3fd9a88c
SHA25605b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
SHA5120d40bccaa59fedecf7243d63b33c42592541d0330fefc78ec81a4c6b9689922d5b211011ca4be23ae22621cce4c658f52a1552c92d7ac3615241eb640f8514db
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORQXHVT\jquery-3.1.1.min[1].js
Filesize84KB
MD5e071abda8fe61194711cfc2ab99fe104
SHA1f647a6d37dc4ca055ced3cf64bbc1f490070acba
SHA25685556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf
SHA51253a2b560b20551672fbb0e6e72632d4fd1c7e2dd2ecf7337ebaaab179cb8be7c87e9d803ce7765706bc7fcbcf993c34587cd1237de5a279aea19911d69067b65
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a