Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 02:11
Static task
static1
Behavioral task
behavioral1
Sample
fbb2740ba90593ef1a3357b74261e8d0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fbb2740ba90593ef1a3357b74261e8d0_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
fbb2740ba90593ef1a3357b74261e8d0_JaffaCakes118.html
-
Size
4KB
-
MD5
fbb2740ba90593ef1a3357b74261e8d0
-
SHA1
ddfb0830aace463d777a994a7ec13a73d4457a4a
-
SHA256
bf6a0684a6a7d56958ce6c2958e7b54965203a12112ccbfc60f88cc2d53c3ce9
-
SHA512
99e9017606570c5f7e65c43f674bf0e025b3df59077159c90e69e8a2289cd158a1de14d8e35b10e8b6b77321c42a659ff366a808024f2b7fe05ba6aa7bebc677
-
SSDEEP
48:c8UfdvyMFr3j/9jJMmizqF/37ZDFQiCtlASo4XugJASRBxrusz4LO7S/kmpnyY:C3j/9937ZDFQzufS5rJw7f
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000001a958929f7a35353fcfc5f8819f7052d7ef0d642b43547f85ede9627041bc13c000000000e800000000200002000000047bc7ce5d5fbb99bbf924592b93a0de48e038c90c50f9b63a1fed58819bec48320000000c5eeca1ad0cf79c4ff59a5178af6d7909f23a7e7ae3da2fd84a977f9a748426940000000aa5bb451311e631bab70e716c85354725a3d5a221dff8f6d41edc3c3d70c5fecb26286b33a1c1f397b067f778f5875086914165c9f46de5789ed262be1679bbf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20553217c892da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419740942" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4289B2E1-FEBB-11EE-9DC0-D20227E6D795} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1888 iexplore.exe 1888 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2972 1888 iexplore.exe 28 PID 1888 wrote to memory of 2972 1888 iexplore.exe 28 PID 1888 wrote to memory of 2972 1888 iexplore.exe 28 PID 1888 wrote to memory of 2972 1888 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fbb2740ba90593ef1a3357b74261e8d0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558d2aec12f687a043a9a3f0470537283
SHA157b70463258b84fad17e1a83c0e7ad18e1b79611
SHA256c681ddd35a3c30475c7194c8334544c8f4e6dd85f773f07a75cde58132cb033f
SHA5120932750f3d853808778994670ab43d4d19886baf3d09efde8f06afb25a79bb85600ce867b5ff9bafde6ea440f0de4724fb03c6bcaebac7e66ab6add2a33a80e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58472e2edb539cb26e1fdca0901cff3e7
SHA191f0bf855fa77041d596d743bb7966762b10e1fb
SHA25603ce7763cfc13e0ef3ad229feddeed9bd459ddbf8a2afa683dcb86ecadfd7a36
SHA5126fd32d1ce44b282c4c336dcdb4bf9894146ff8ee48ea658f8446f3de79870481f437fef10d2172f80e0abc03062ba5c6d8664c4d18f40f8d5220092bb3d85fda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8898080297eb442683bc21ad6039c27
SHA17c7d9184e7178d9b1599ffefb141e12dfdbed7c4
SHA256dded64c5be6a2a5cbeeca255b69f2cba4a5a7338e66012ac1a1e611692dedcdf
SHA5126d3c743e6d5e952eeed8b0938053d911fcdd7ae78f1516185311aec3d74b453390a4d6d054e8ab957da6dd0285ad433f29387477cd4ed1ca94da1174f5c0f33f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512e472652e39508969a516ac4f0904b7
SHA1983ccacc77820b427f0d64c41f32420509004e5f
SHA256178ef32905561d54ab3955ab0796c27b05a45912cbdf2babb4605ee5f9e50e96
SHA51289e76c93c76af969b6baff524b096befb771cd49681a1efb89aa7a64e609b36975d50c6d67349becc009cbcc4bc0a056945842fcf929a4c1130a51c7e1772aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592a375c32e8b37ff4b242759d2afbfbd
SHA152cc2509c59ae9eca774ec74c3d6f02d7b5cf5a0
SHA25680349a21729a4aec741dafd49869c7ca915861da44ba4741dce225c3df9e4a2b
SHA512bd62cad1f4221488358b76979b8a4d30161d55431d8e85a1d175a124dcc78b19ec3de9c53cb354e757edcc84987230beb46dc162563338cf9a9f430bcbef141a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574f1dba2d9c09057e291e09de3724b31
SHA18ffb45a82167722074c0df2045fe4d6101b28246
SHA2565ac22c5f13f7759f44bd6b86071f47eaaa0cf88f60633586f890bdb6c9990aa6
SHA512453f704b7d51c0a47658dc2a777c7da04b5aa38eafbd4851fd419640fbb381d0074578a4f6110211cb639755762fa6a97da0dc9052efcabcab19276589ce76c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1c858c5b5d3822a27813d247451a336
SHA19b48976a1803a5cc25b327544ef96e9c6cc73ba8
SHA256de283d0f4c8f5b56e1b5d1210d6cfa2d6be0173ad278752f7ac91ed468ef1ffb
SHA512e1a863f9bb7b04c5bf47648d183cb34d30a9292c68847991d7d04c84b991151aaf3ac879dc97b39f89cd62d9ccf963e2659f15791a2340b7f65e5433cacf063a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed62025abd1c1b063e7881fbce8990d1
SHA1535720421d2facb1801fdd0a9acdcceb959c645b
SHA256cc145f3d4a076b035191b1cecf2c188de26778a179bd51c456a4240ac3b17ee9
SHA512321b94662005246c35e31d51c6b53fbab7d1575d4849fd506da12546670734b4b44c7d915ba355567645d3f5ca8197bb9a82db6467320d577419bb08eb01f668
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a