Analysis
-
max time kernel
127s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 00:09
Static task
static1
Behavioral task
behavioral1
Sample
fdf857dd25e2e5e22a0d05bef7f9a221_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fdf857dd25e2e5e22a0d05bef7f9a221_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
fdf857dd25e2e5e22a0d05bef7f9a221_JaffaCakes118.html
-
Size
14KB
-
MD5
fdf857dd25e2e5e22a0d05bef7f9a221
-
SHA1
ceacc638eda222d7c5ef2f5c30fee706367936a1
-
SHA256
b665ace0352e9706aff8594cddaee01279c43fef01b855f41a1f66972fac2c7b
-
SHA512
fbc088527dc757a7a106484edc825aba5dbdbc119befb6e340e63bfa76d483f2dc66d1a0dd5b082419cc62b020d474caa221f4a997f36c0df5ae0a88c97bd126
-
SSDEEP
192:Orren8VwgJzBNqGAlpLwlLuuH8Yt6zxf7+Y+U0zxdUoP7PEQd0lLXalc0DI:EIGAbguo8jV61xvd3d0lDaZ0
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{69025311-FF73-11EE-9960-CAFA5A0A62FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419820042" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000000eef4e9dc065004b56cb1f74abe597a8bc26a972075d9abc70faa4036d5bb632000000000e8000000002000020000000ddf4608b28324c327cba9ae0f11c777f4acba54297f313c3ee6fc42453c39c12200000003fee6dbedbb190ffc48260b7d66bed73bdafce4cb40ae0467f5b26fdcbea4ba1400000008d47fbf9c57b69451bb4040137ca41004934ea203a79c5f4cdff485cb46516088731f6f14104391b08df150ee882475ebac573bec6bf95a308f964f4eeccd8cd iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0b3d03f8093da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2828 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1500 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1500 iexplore.exe 1500 iexplore.exe 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1500 wrote to memory of 2828 1500 iexplore.exe 28 PID 1500 wrote to memory of 2828 1500 iexplore.exe 28 PID 1500 wrote to memory of 2828 1500 iexplore.exe 28 PID 1500 wrote to memory of 2828 1500 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fdf857dd25e2e5e22a0d05bef7f9a221_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1500 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5e788fd40576a750ce05fd882174f76b1
SHA16e89488f8d13fb0a9773b8ce287e880998b0878b
SHA256a499cfb6065f304e14cf358bb406d13d506ac28588d7a431c7520b16959f9d1a
SHA5124ef5c36cd96dd101ed19407008eaa7e1e23496fa08311cf037f2d14bbeef0ad0c726bf5ac07c6b690673b5f0ce902cd6327f780e030b12c970cf82f570ba4b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d15f968525eea00a3851fdb7d1971b23
SHA11168919c24bdd61b49dce6f7754c18ef49320cf4
SHA256942c687e79314782f7a5aa8aedb4bf38692654eb59fa04174a594f8e0019464c
SHA51226a8b16acac27d4dc07d3a17e70d204853f9769e0395d7f6412be1d06d3b731eff6943d1cf95cb61e2e144fb9f3cea1946d8f8569bfe0c110478d4cc5bc7eafa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511cefe9a145f7a4414eaff785f09aea0
SHA12c5bb8d273ebe359396cb1ffa5549321ea78519b
SHA256d38a1610680f474d41022d06c1428a6e4f4e606391b22b33f751515395d2b1a8
SHA51279e905fc1f6cc0e092d880f28a9c0811d304722c48140ee314a75c21a24a210f394d270cd03f3dae66d3a7b014289b227c32ee550fbea0df4a4426419c5b2883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575808ef86bb1c495aa2190f708f61e7b
SHA1a6207bf652a1744c2f3145a07068bddc3539cc0a
SHA256f9a361221dd9ba20e7a6341c8b7e681d3f801addd0b19678acdebca0cc0e95fa
SHA51233e4577428a0a98f93e802d71852f699b1d68703f4a0376ef56e3e793145baed3e3836346e42dd9b855142fde29896f0dad1b109bfb36acd314283ad8cb3e66b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5972415351810b74d6424a548f25f6c32
SHA1aac2216da9dfd82fecd29729e27b534ccc45f0ea
SHA256aa6ad0cb3ec8651e709e913ace1773a78ac11afb55dfbeefd641ec1418b3d171
SHA512fe830bbad02fbb13148021ad043633ed683e5176680d92ca4a206fb71f325c4e1a58c23be6442a301ee3c6abbc07be81f60785a91a081103766d291f9ca87222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5af35cb99444c383ee2a256b49fe516
SHA1372b762d35f7aae5d850ddfbecd33ae7595b04d3
SHA256e59121facad6f4fc15bc0d1f630b9db4048cf7a1363237a3b001d52705ce725e
SHA512f85b83bfd86daf3e770081c12e098e0d5df9d3694c9f6bc8cc16a111dd4d418ba418d070efc9291175b9b376a6756e467c8c2126bdca7bf441f3d805b56625a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD567ba1ca5c4a926769ac019119f88f930
SHA1e41cb7ccb5b992aa73880e021559404af4923929
SHA256a9ae27677c5ce29d1590491d2ad49627050ce1d75e66a183881c17590ef54670
SHA512e6b6faf4f4e9f96fb3a60fefb154c5525ea1b8c91a965cc2d4160239fe2777a282959935b874ab4099813febac2f8212251bac70b61bb8daefccdad8d1a2e896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a5c0f47b95f34331321466234cf7e7b0
SHA1dd6cc38de5eddcce6fdb67b6ecd9434c266e59e0
SHA256850adbc1162b6faefa099b7674d585d11b134b3864abb007b5ecfcbe34fe40ec
SHA512dea169195651e24934a4278772aee830203c8b8ff2a26b7c3a248898215b8ecb8337e26121507990ec62b27b3c9a47268f512ae7c2643e848918f92e9e83fd36
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a