Overview
overview
7Static
static
368a774f3d5...18.exe
windows7-x64
768a774f3d5...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDIR/nsWeb.dll
windows7-x64
3$PLUGINSDIR/nsWeb.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:12
Static task
static1
Behavioral task
behavioral1
Sample
68a774f3d571934c9a465d7d26aec861_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68a774f3d571934c9a465d7d26aec861_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsWeb.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsWeb.dll
Resource
win10v2004-20240508-en
General
-
Target
68a774f3d571934c9a465d7d26aec861_JaffaCakes118.exe
-
Size
60KB
-
MD5
68a774f3d571934c9a465d7d26aec861
-
SHA1
0096927c20da3604fd58e4db31906adceb645f85
-
SHA256
b2418eeabcba175d441ac8835ecca4ee9491901d4b2356217dce25307faa59d5
-
SHA512
e5ead75fc3412ca3ea18dfd7e85f3af80ed97522820ad5a916a397cb18aa5c203d697fc00214fdb5c76229a4ddbf37e0918cc3de247f4ae1629d6a109540816c
-
SSDEEP
1536:6oLDYsacy7mHMowHjXJtB5i7zxp3p9JtnOndzikr:6oPyys5jXJtB5iRp3Odnr
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
Processes:
68a774f3d571934c9a465d7d26aec861_JaffaCakes118.exepid process 1992 68a774f3d571934c9a465d7d26aec861_JaffaCakes118.exe 1992 68a774f3d571934c9a465d7d26aec861_JaffaCakes118.exe 1992 68a774f3d571934c9a465d7d26aec861_JaffaCakes118.exe 1992 68a774f3d571934c9a465d7d26aec861_JaffaCakes118.exe 1992 68a774f3d571934c9a465d7d26aec861_JaffaCakes118.exe 1992 68a774f3d571934c9a465d7d26aec861_JaffaCakes118.exe 1992 68a774f3d571934c9a465d7d26aec861_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422574248" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000002b566a72b5d011cea703fa482a944b2a18fa0c2b74251fbb541f855f89a63b86000000000e8000000002000020000000ca37039d77395ce3e5e11cd2cc9e0463e58a69ded2d5a20023bc2d2ddecb95d7200000006e30f2f03345c7e2a743ef32df6d169d908f96776bb3925319bc4ee9ce816e3740000000714cc2ea70c4ed2de21a16455e007fbfdf7891c6012a8dd4659b61eb04378a7330353de48a4bf344e00766cf0f2ab51e166862e81980303f4f39c94b56a55e3d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{11ED5631-1880-11EF-8FA5-CE57F181EBEB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0d6abea8cacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2476 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 2476 iexplore.exe 2476 iexplore.exe 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
iexplore.exedescription pid process target process PID 2476 wrote to memory of 1708 2476 iexplore.exe IEXPLORE.EXE PID 2476 wrote to memory of 1708 2476 iexplore.exe IEXPLORE.EXE PID 2476 wrote to memory of 1708 2476 iexplore.exe IEXPLORE.EXE PID 2476 wrote to memory of 1708 2476 iexplore.exe IEXPLORE.EXE PID 2476 wrote to memory of 1228 2476 iexplore.exe IEXPLORE.EXE PID 2476 wrote to memory of 1228 2476 iexplore.exe IEXPLORE.EXE PID 2476 wrote to memory of 1228 2476 iexplore.exe IEXPLORE.EXE PID 2476 wrote to memory of 1228 2476 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\68a774f3d571934c9a465d7d26aec861_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\68a774f3d571934c9a465d7d26aec861_JaffaCakes118.exe"1⤵
- Loads dropped DLL
PID:1992
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2476 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1708
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2476 CREDAT:472068 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547b6bc5746b809edddb6cc68b5ab2718
SHA182e03c4b431ca9e7f5154a6c90b5cbb14cf9b980
SHA2562df7855da8ef25de5d16d11eab8d3c92b92d40460d949515d3fb01102022b73f
SHA512ae7812476576ddb06a11b50d4d36fe3e0f138b310f2ea9a779714785bfdf9186242043be9cdea2990cd74ec1ac57873856e2850b02619d333710c97ad1aecb9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514145d8aa55a7fce331ffdbfaea433d8
SHA115aaeb42919dd802a14fb0a096576a35a16c7b9f
SHA25636eb9fd21c3bb741bcafaabf7d0a1812d05abb7c2576f5782383c7aa5161f0c5
SHA51230c7dcced84f13d13221f776602bf6af168a05513bd4b34b6f781d46325c8e866a7da2f87ee0928b8b1ad9d49ea138383689519424a4a0f6bfae3ccab62e2b10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54946cfb75930b0d482a62a5ea7f17950
SHA1e5b353e130ae56d1bbe3213b0bc5fe77ed21201d
SHA256b868b4865ac55db541d32ddcdad0cd0fe5e5e9c1ae8bedefbe5279489d9c508e
SHA512cb3b409f77fe6dfbbec9828d271a19b468ccfa12725e4ed381705aec091ca9201e4e34d3af42c6661f2a20031f57317ccf2b567ed7fb7248f86aeaa2373b174d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521a1a0183a8e6233fe1f862d9c36ae48
SHA160836f2c00b4609b4a986f33078ab1ea8094f9ce
SHA256f84582fcb1f6bcf9d19cc3870a7ee5c38a6beada44c478fed970fbd2337e345c
SHA512e317594e58383c743e8c720c93265535e0f386254e8604943d8f09ed694c1547da10f83c47133a43d3003f300244d856c233ba672cfc4252d2effb2a391df7c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553ff082c34b795ab5d7537ec0ec48e31
SHA1fa69a01b2aecc1fbbaed31eff3e7b48da3939539
SHA2567ebdac207d6a2e6e05f6d9724f349ec9acebcb3cb9cc15970e2735c0bd2a5e2d
SHA512f462694f5423b8dec0feeff0e2eb81a4a99b23d12680f1ee655984d08adc155e543ef94b81dbbd4bd252b8fae71612469884f56ff776fa4ab722b7b39377056b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6836a52d4ef5192ee227f49fd57c4e6
SHA1c53c80e5947fbaa96bf4da523bdc807fb26594bc
SHA256871e3b62b82763a0bc534221a0b265ed57acea0d72dba6be7e6d57a6338b333e
SHA512c4e545f1d7dc9e7338a9a28251586649a0a1509047ec681e71c0eb6c0b6c6dc4bcc893253cc40d4c22e77986eeafd97968a06e8710290f3656c41d12bf6abb3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52114ef7cd297a3aaff58d850ad48fbee
SHA110a91a5a6e078a38b2f2280bcdbda0e2a17d9635
SHA25644ca2eece4d67b1bac9417f4d0746ffcea4cfdb2ddcef620c392d73908470375
SHA512683d48fbee833579c37aafe4a2ffdf2e6ac0c940ff8a37718dbf2fc1f1f37e6dd1f9c3b878d926040ac2409bc6e02e365db6a92b7db7e6d80524509166c8243a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f701e1b30db11a7c1d2fcc29a28b30d1
SHA15968af6d8e870a29346ddb97f57efb046c53cc1e
SHA256d4184be1de250c1217e26e291603575f3d164da50f395e9ddcab174e846f8f76
SHA51209ea4528009c6b69af30f9456927d586ca410531380ea276ec78147fcc034d71535d3cd8d769467e433520d761dc75e6ae4485dd50db5ee2e8dfe56b0a916e12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51749fbdeafe52973f9dc95f8cbe2351d
SHA156cccec49363796f94a222f9977b8b8b533f9dae
SHA2566b9079e22c44b7bd11a9c5b1eee00b510a9b9c3e8fccded84a1d43705734c73e
SHA5129598f434e81681810f5f217ec29b1384b95d23679dc2fae95a81887aecb7b4ab0d8f8e8e1cd567a30e33e07e43032cca19aa6999b898f86ed0e576ca7ee90e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d6201e3328d17d04d00cdbc26485142
SHA1681d360f4365744c9b3bd024538e3e421b30eb78
SHA256f64c52de06d76bff4a3dfba775aca1c593237bac8d38a8bbd1eee22f67a0cd2a
SHA5126efd9ef6205d7d8b7d5ecc3513920d768123fcf71375f65edbdc1c98b00eb7548df1497d879f93e93d83e241940f5d98f58f079223ae4a46b79ad96e73e49990
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
21KB
MD5d7a3fa6a6c738b4a3c40d5602af20b08
SHA134fc75d97f640609cb6cadb001da2cb2c0b3538a
SHA25667eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e
SHA51275cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934
-
Filesize
8KB
MD584bcf3c71e70d5a6e9dc07d70466bdc3
SHA131603a1afc2d767a3392d363ff61533beaa25359
SHA2567d4da7469d00e98f863b78caece3f2b753e26d7ce0ca9916c0802c35d7d22bcf
SHA51261aefa3c22d2f66053f568a4cc3a5fc1cf9deb514213b550e5182edcecd88fadf0cb78e7a593e6d4b7261ed1238e7693f1d38170c84a68baf4943c3b9584d48e