Analysis
-
max time kernel
121s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09-04-2024 09:10
Static task
static1
Behavioral task
behavioral1
Sample
e9a5161839e22c0c4740e7bb53612c12_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e9a5161839e22c0c4740e7bb53612c12_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e9a5161839e22c0c4740e7bb53612c12_JaffaCakes118.html
-
Size
2KB
-
MD5
e9a5161839e22c0c4740e7bb53612c12
-
SHA1
9612fbf97dd8411c7f3a6ecd79a5e91ddf6d7630
-
SHA256
b2279b798122eaf5550d52b77498de63368cf7f96c7fd827357ab691b7e89356
-
SHA512
200a8358ed85e3c4151cf39684423b6141e8c5876c0d9f19dae6a4275dd7adf9bf63aa72943ee6e37c1988db58d8eb69f7c7c3d3cb00f3eceedf06be9a7096aa
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70cb88e55d8ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000097e7bffb8f424c3eec0abc566606cc8d483f4390594f909164dc01e60d24a68e000000000e8000000002000020000000379f3bbf4d256affcbfe20410a4e773ba1497a80be34e8560e4ddef8656d3034200000001a5c058e767d279897f63455b82ae67353ce093ea3be41ebd76143674f5646594000000026ab89fe1313d7aee6616b4fdc92d5025c6d782a6f61010fde692d0b8d31139079708e9ccb6a5dea88f7e8bcc98100d4b50da476ee5a69b2927b415112baef3a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418815725" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0E068BF1-F651-11EE-BC03-E626464F593A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1888 iexplore.exe 1888 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2924 1888 iexplore.exe 28 PID 1888 wrote to memory of 2924 1888 iexplore.exe 28 PID 1888 wrote to memory of 2924 1888 iexplore.exe 28 PID 1888 wrote to memory of 2924 1888 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e9a5161839e22c0c4740e7bb53612c12_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588bbfd3634930d49bcdfac2a345daf02
SHA1780112a20df6c28723d9d46b1703473c825f70dd
SHA256bac0ee1aea014eba3a721c661760367200d22ed285612675c1ccf64cea53bca2
SHA51244d39b53e4b2c446b4379485728a76bd90722ed60ac1cc6a67ff0f09a5ef5bd1117a4d94b72cea0cbde026df15451d65a05b3a67a9796935d0d2630fc304264a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6ea2582d044d71f97aeda3d18993022
SHA197e0f16360f967acd0e9850c5e5ceb78f4fd5cec
SHA25602499737497f120cd7f4691843a262d6340334e12ef4932ad0fc9a11db18bd59
SHA5121964359b1a5396e14b1ee26c9a44c4e0428cc67bc2e112b113a2592d29045cdf8dd164974a8a0d0ca2ae86f3f49a04cc1ed9beb2a4f0077921444f9e32a58fca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c915a3669519f07ce3889aae3eeb2793
SHA14f1f49c937c2c61c7837da5ba39fc31631faf03c
SHA256239e7702d46ad7ed1a765bc72670813e7faf774f9dd6c76a7fc53cc074fd026e
SHA512d9e9ab1d89bb9589fe2a100c2fac375aad4efe4930c055c74dd6c8f8a0c1b5cec640f7e632634171291a2350574d33a93ae71ed4188a90da3a8e369eefc17933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f89329d7b9f7e9769b44e9ef76b404e
SHA1849dc3066078efa517f066528fd82278dca58eae
SHA2568c9c57c410daed716117e6f752222e4fb68c28bd00b3dba161d7cb0b577fb142
SHA51254b5681da40965c6e4d99dfdf7d221ca5c993772044b78f8d181550f06d8b79ed66c29ab47a4d5fc5bb0d2ceeeabd6b3bc1764e02c5ca016978c4abb6ee6526f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5354481b5e068b21b96bfcdf82f0666c7
SHA1d4b1b307b98ac8b03bd12f7ea784fb8cf9cb2e64
SHA25643da7fa2ad6799cc817e244d95a2bdde77c4da15ab8c4e80e66fbb81701f3383
SHA512bda932b2f7155cb261ae96a763f088f75547690dd36ae7f98379d07fb8784909148fd08a7532d122380634d74c9c301396e63421493b197514046c5e91e328c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505c8499ee034fc45ffe7c7ef16d347f7
SHA1615350875199cb0bd3d006eafd02e933dc9bd1a4
SHA2566a7f0b5435bf8caa920df7c7d3e90e252c0f0425422db475cb76909cba1fd753
SHA51270450ba61faf3b6c31c91990753c577be3d9e0871109f2df5f8a0dc2927b1935f6d544b12dfc3c703b95cf3a4fafc864083ed7988404757542181943f5a70411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d308d4ab2fc6d062d95fd6129b6820c
SHA17621f7bee1e6105dc87594b7586b78fb171ac143
SHA25612c11541138ebea32bf54da891941d8a9d13742664a67ace05c95f81eb6f5543
SHA512226d7ce04b343115112c26e8cd6e5893901be47075cf3a18ada862f4cc232e7bb3fd195c87a1edcef1f71dd03e9f85c91995e0ee8d21027cbbd40953f4002a78
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a