Analysis
-
max time kernel
127s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 08:28
Static task
static1
Behavioral task
behavioral1
Sample
16d1b2ff6f8896b20f8c2017674c9b8a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
16d1b2ff6f8896b20f8c2017674c9b8a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
16d1b2ff6f8896b20f8c2017674c9b8a_JaffaCakes118.html
-
Size
51KB
-
MD5
16d1b2ff6f8896b20f8c2017674c9b8a
-
SHA1
d475cf435d8eefedc3523988fc09a22fe0c8db8a
-
SHA256
30f71681e090996069f87d46f46462d530ad7aa191da71136c1fb2a3262b28d0
-
SHA512
c132d81a3b9922b07876d545bffa9de5e46914c3f27fab2d2928c294006559661584320465c826ddf9d7dbde922c43f3aa85d1e84a3f902c241935f3bab4e30d
-
SSDEEP
1536:rTIE1XIEqZx00Ql/K81VrO0BkE8XKS1yHxBwRQTev:rMZMrQ1MxB/E
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d087ed41c69eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000bedd6b0aff39529b54432dd6355ab66226ca19573280d1e7f20b46f40a48f895000000000e8000000002000020000000d7525a1628cdfc3238af63307a76a0ff0cd189c3a0f4499708c98a31e7cb444b200000007c10a99463eb73414980e43cfd48543664abfd737f4d85ee74391da702788b59400000004e30058a9eb3165b61dc8ee3a75601d4dd358c893e86ed3ddb35e34b5ecb31a5a32222649c8191e258e8b8d3e43b780a942982901b9b3b6724651a3da6904f0f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{65927011-0AB9-11EF-8C47-FA8378BF1C4A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421059560" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1932 iexplore.exe 1932 iexplore.exe 1760 IEXPLORE.EXE 1760 IEXPLORE.EXE 1760 IEXPLORE.EXE 1760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1760 1932 iexplore.exe 28 PID 1932 wrote to memory of 1760 1932 iexplore.exe 28 PID 1932 wrote to memory of 1760 1932 iexplore.exe 28 PID 1932 wrote to memory of 1760 1932 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\16d1b2ff6f8896b20f8c2017674c9b8a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1932 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5e3e4307f5813230693ceed63f8afed3b
SHA1a43c3bafc0ca5c5d2eef0a5228257bf692248b27
SHA256b63b4a7cee4d1394b87da0bf4c3e741d62e2b051479611e3de32bceda131e604
SHA512a1182ddde51c107c777dfb08cd6f0c83ea809cd73b58742aba345f4add3369b387f42bf5575001e6261635682ddf811b38739eae5de1d42a8426a6ec22ade344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c4380a9b6539921314cd9bfbdd1e2d3
SHA1a466901e8b24b0b6c3bd057eedf596ce7afa4837
SHA256665310a69470c096ff130e1acfe99d9dc8d904da1089dd47ffaa1369c9315ae8
SHA512eda9e2973b00584a2e3a00e4143d8868ae8156a58d45cd40920e8955539e4f88aec1ceef70171fd470c19a2fdcc0f5465b79872254c25d0c3e61a5d0d4f8ee18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9c587118706549e0b46cb2234537e2a
SHA1e5dc1c258348662309aead8b395b2d5c9b2515c8
SHA256094e7f91beaff64ed2d8733a55fd8a04f0d4c9e425a3e65c1e77311d058790a3
SHA512c848651d1293ff407b2c3cfb5e0beb98448050dd681943aea3ea23864bb050a8d252da2acf9c910b7d077673be0b69e752b99fed6aecfbe7190365d7d9026f82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531ead91d7e59f32f84ec1d1bb24f1947
SHA11595cfa2a96904de832ff1791987104bd41bb30c
SHA256570cdaf28d33d7e439d4ce6ff9b9b5f5cb741f819a054270ab649c1ca2f68956
SHA5129f989c1c6d13525669efddd3d0097a695583d8145024e859d007057d597e746ef2fc48f7abfb01f9dd9b9c3fe00f175fa4388959813779c4b956ab268739a62c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519aa53e3a1b8e207ae4dbd9c7d7b18a6
SHA1b6606036284cf1fd47ace7818101131d27862505
SHA256b14223b7c3d1924f4de14fa4eea3829fa647ad1ab6afcd42bd4133aa5e9c9efb
SHA512fb220022ca6cf5a7dec87244639827d5d2e0373dc874202d085af28ca424c15b411b348a1a77d4ca720ddf0627adcde5d8dcc522923767aed199a462766dcc1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51647e5646ff0d12c522db9dfc805a802
SHA188ca9e8b26fb123b646157217f839e96a7b856ae
SHA2565dea26b5733101af3f598fe6a81550cb207573fece15b3ef650a8a40a3df4a13
SHA51220b91066f087a61dbe5695099677ec462b07527cb728cf37c1d2860537743ab0f1a3e32b959c06928487006f89c469a11e3b93c9b8e9bb077897d1e7f151d738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535faf09414dcac3bf7ae74fc5f862c95
SHA16554c469a1a7ab7cfcfb02467b2110654f64844f
SHA256d45538b0e3f7e4ec15f2779fec3abb2f77a2e312a3e56be173ed754e5b93435e
SHA51247425c3f81a897cc1adebf0dd486d0f801a1af0a628c0c633478f53172a655bec23669e98332098eb3ac0fb8ee7eac66350fe01351c92cd9d11aa3d722092401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53879d17fb72b674303f53332213aca26
SHA18803a721eec6ef93523fcf2245e79f598c08d2a8
SHA2565795aa9ffd2f4b97976f94fe395cec6fbcc2256a8616d67bc620d1e940afa482
SHA51261029038499e4f7d58f9fe0756e2e6b1b19caeef0272037c3d2ef6fbb62d652efb3efa11ae343aa0d3baf46baa96f08288b01a2370f8affbbdb9741fcdfc9187
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9M0HR0P6\cb=gapi[1].js
Filesize64KB
MD563e5a0b45632b3dde3694ffcaf0e3f7a
SHA1923736d0cdc308331d5cfaa0ea159bfedc83d53f
SHA256889109910477919b3457416e7764bcd0add19fd959848253026125c7c35c43db
SHA5125b886c4b5122d61f0209ede748aa84445c9388cf38813316c41b3dbd2308216e88394d9a45cfc27113c0cf3bc93b9c37d808f6d3c67888244c176ee095d42259
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U8A9A2DI\3604799710-postmessagerelay[1].js
Filesize11KB
MD540aaadf2a7451d276b940cddefb2d0ed
SHA1b2fc8129a4f5e5a0c8cb631218f40a4230444d9e
SHA2564b515a19e688085b55f51f1eda7bc3e51404e8f59b64652e094994baf7be28f2
SHA5126f66544481257ff36cda85da81960a848ebcf86c2eb7bbe685c9b6a0e91bca9fc9879c4844315c90afd9158f1d54398f0f1d650d50204e77692e48b39a038d50
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U8A9A2DI\rpc_shindig_random[1].js
Filesize14KB
MD523a7ab8d8ba33d255e61be9fc36b1d16
SHA1042d8431d552c81f4e504644ac88adce7bf2b76f
SHA256127ffe5850ed564a98f7ac65c81f0d71c163ea45df74f130841f78d4ac5afad5
SHA512e7c5314731e0b8a54ab1459d7199b36fc25cd0367bc146f5287d3850bd9fe67ba60017d79c97ea8d9a91cd639f2bc2253096ce826277e7088f8abfe6f0534b63
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a