Analysis
-
max time kernel
135s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-04-2024 22:25
Static task
static1
Behavioral task
behavioral1
Sample
03c2ba7152477758bda4fcaa097849f5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03c2ba7152477758bda4fcaa097849f5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
03c2ba7152477758bda4fcaa097849f5_JaffaCakes118.html
-
Size
28KB
-
MD5
03c2ba7152477758bda4fcaa097849f5
-
SHA1
bf2fe339c4414f9b5700656c812f53980a424751
-
SHA256
25f070af0b32cd27984a595898814886efc66fa607cb497788390afba1693065
-
SHA512
b889559581992461d75f3a6653c8e643d574eb150933b7e7b290de99b1277fc570016204a416eae5aeb5dcdc81d27d1a3528e61d3d62ba78f6ea43e2b9f8afa8
-
SSDEEP
768:Cyi26E9hnEZsB3cBJ/JJJxJpJxJyJAJeJYJTX1n:CyJn3cBhjX/38eQqH
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0768BFF1-04E5-11EF-9A09-E25BC60B6402} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e008a6dcf198da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420418588" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000002262ad1fa5d73d0455943764d83ba318d8deb323f17520083085fc679e86116f000000000e80000000020000200000008a21dd2e0decf622517576a7aed31b06c3dc12d0410a4d64ede0c3e204dffd1d20000000f342fe578651241d4e939aeb81bd49b973608a9d5a749d1ece9896fae3d89291400000003c2aea9b941f64e790d5b59119507965c42533daf09170a01d177e7f82d6ede5dc16b25a3bb9f834dacbd50f7973d0ac9a4185b461bb42dbe824ab83f3639676 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
IEXPLORE.EXEpid process 2540 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2660 iexplore.exe 2660 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2660 wrote to memory of 2540 2660 iexplore.exe IEXPLORE.EXE PID 2660 wrote to memory of 2540 2660 iexplore.exe IEXPLORE.EXE PID 2660 wrote to memory of 2540 2660 iexplore.exe IEXPLORE.EXE PID 2660 wrote to memory of 2540 2660 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03c2ba7152477758bda4fcaa097849f5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2660 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cd27d073992340e466a1c0d2d816534
SHA134eacb37564e5ad4034bf1efff1504aa75c9aedf
SHA2569e2153f1c380ee258a6a19b2cbaaabfbd47e8aafc5184e7bff080a4cc18f21ce
SHA512caa403f1685d0744c6be66cb5dc003874879e8923da4a945df5d5cd753bd7308b47e3c0c1c853f5a5b79b8501ba96fef5a5a06d6430b155751f0a6397de0cf32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ecc8203a10f5afd87e06ddcd2d5da3d
SHA1ee392e0fef435a701b16db9e926dd357d6826f34
SHA256d2182bd9e35531b7d5384168276d4585b1ef9ca86b3ffd0602a1c6e3d30811ec
SHA512d16773172fd4bf29ccaa624c65544194d49f1148b216597284595f8b998dea8ac1d48432ef5de964af191a313683755c6e0a84dbd9b09478cc64fcbb3763e3b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555aaf54f8e73dbecd1e3d7d899ff7336
SHA12cf4a3388a22518b44c4f6087552c01382723566
SHA256747b2df9c46266d8fa69bc0493c9de9e38a9c7bfacab1428366490abe25cea1c
SHA512c1449ba5a49873fb01f8548b13563f6540f522d5d790b163400394a4868a182564f9a3183751d4ed7e04d5b1f922d4aa915ed4abdd9b33272cdb2b6f67082a42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbbf1eea93f52d41de1a41d8b7130cad
SHA18121bdf9a4189112d0eecbc8b21a4a406c11696d
SHA25670c503f0a9e0f25b8048ff70bdb2f8af471ca7145265da3f9563ae0d2ba05565
SHA5127336820fbae5f7cde3442e77d710c04f0a99f9e611dcaf53bbcf1b2fe7bb2b6934c1ae94115fccfa606fb1879228f4287b9b375a8fabe54f140f719810943795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8a8786dd7f90c2455f2ede951ab350b
SHA17f4862422eb3e4f854ab845931b03323e4b8ccee
SHA256e4dd5bb2ea9683cdf8570e02460819c96bafeef55a46529dece9201c0693d66e
SHA512f0f5c5fe165fe4e76cd8520a76c33cacd7438f80d0dca2a3bdc2486154056a6b7d85ecf5c36d9158454cc010e5bf054fa83c01677494c343aa704d8f45bd718c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e55c05f6b98aea3311d6bdb8c3dfacd
SHA1de8558327595337af7ebaff04fcc2a2c3ec5701c
SHA256894f03ebd7a7fdfed5800bcd65b8e59d8dbdbe5eb8c0e9b70d3dc55fcbd10875
SHA512f28093ff798304d6fa4727948c282baeba17a6db7d6404edb7a9a6cb946974db236cc3e6b459e8dccc2183b3fe4959580bf9183db38c95e2db47a9fc811ed46c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568a238e9ef6a467fc6b86b10383ce6c2
SHA1dff5e0f63b3c253a0c584ce5e041871a1fe9d00c
SHA256a7b7b961637e0f53a2dc03f57804e43abda66739a17776b3446e9c7cf14eeef1
SHA5123f867f73ef4e028bcae095b0f5bd8f13afe0075ddc7052960ae30aa6fc63afa24f0d31a73ebca495a8ee4854d5bce701e26d02f0da572a6f825915f408dbda30
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a