Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-04-2024 11:11
Static task
static1
Behavioral task
behavioral1
Sample
07879c68090296f2bab3565edf9e55c5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07879c68090296f2bab3565edf9e55c5_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
07879c68090296f2bab3565edf9e55c5_JaffaCakes118.html
-
Size
18KB
-
MD5
07879c68090296f2bab3565edf9e55c5
-
SHA1
dc20989f4431a6651f4aa00c36bcad512d33528d
-
SHA256
1221c2d1ee3ab782ff10b77bce84de134803d30a1ef85911d7265dbf665e7bd0
-
SHA512
67ea58ade1b61f0d16bd1182ad111026b04760eb766258f9011f9466b91142fa381caab2d51e99e105eead13a530a064583c62426797bb7a5b7df6048912ae66
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIc4EzUnjBhQq82qDB8:SIMd0I5nvHRsvQpxDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420550993" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4F32A191-0619-11EF-ACCC-D20227E6D795} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2020 iexplore.exe 2020 iexplore.exe 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2864 2020 iexplore.exe 28 PID 2020 wrote to memory of 2864 2020 iexplore.exe 28 PID 2020 wrote to memory of 2864 2020 iexplore.exe 28 PID 2020 wrote to memory of 2864 2020 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\07879c68090296f2bab3565edf9e55c5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3d46984835d001ef1c28a6a9ffe1350
SHA1fac51b051b1c0cd1acc071ab5e121480feb47a97
SHA256a6d1616f5f6eb5f8ff04a1acbfae63c8b9b684f8f7f651a8617d222bfd54da02
SHA512cd1373161b868b7d3f112651060de88f4e09b70d3e902f022e492754ef8c8057298470cd835e1d70b504fdef028d4f448ce8001133ec1ddb3886bcfc93473a94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579bb6e57cd30dbcf177a9332e535a39d
SHA16927130030531fd28d66df79f0c4b72c8f6ad66a
SHA25655403645bc94075c45437af2e1268a6a537e003684c516276e264e30f9651051
SHA5124145733d23aeb2154ae3c02b3b01aa1a49f9be178426210b0cf61d51f7ceb4b1e2bf4ef1296f5d143f6dc34f004e7ae14abbb269159824b6ab6bcfc08d88b84b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcc4c643964ca965e9960f582254c484
SHA11844a36ebc5a883c3dda5dc19eb3ebf200c58dec
SHA256cced7bcdaaf4182360d98313a6a8fa5378201d4fa791cab2ee6c4cab6e637713
SHA512ac2b6ea29103a5b4900e56977d0822e1bd568e28e3ea9f2567a03f623003a47d2945f04cf0429c6cfba5eaca90b9d5a4c78ffb5a26cc189d5f3288c3e03c3872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2f402b201ff65f2145988ae9683d181
SHA1101003e45dcf7ef635ffd43500780931c08d02fd
SHA256d5805564a3de873cd0601eeb8d2f5b2b07a6dca25a482dcc6dc72de9356c7d69
SHA5129f5f04c189f1c60a8b0b2a867359650a366b7ecb130bf0062e4e374978dc3568531f59f4b7728263d4843232b7f8db8e3debebe51475b7639db9b075b8a82703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efa02260cf001ccbfb3b129084bc2d83
SHA1e7349479f74879249b1cf963ea3b35bee0e389e6
SHA25665d382ff4af38e18557dad02a630e668b545fdd6365a68c53186cff1aa7dc05d
SHA512fcc84203c570d8d4d02a8d8b6c6807387a1a79377842353e8681a472644f632fca376520e86bc5ccccad5ff40004f8eea54451cfc4e4cb38759c99f0683e1834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5419829b30d8df56bce9f7a4f9f2e4a1c
SHA14c1b29b0e9e4ff1a70433702e6b2e37ef1a40e41
SHA25617ec1e3a74695954e14f32e0bd1d06710835ac547af419bd1a7cf7d2057e5ef9
SHA5127d5a3522c314580ecb54bd94cb62150b7bcdc60e66412de5bf654c7df702340d48ce7badd30f4435d632fca73a0981aa1b1aae00e39c73b53f186ba82c5c4b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590dead949fb3ae67d9b0a9b9a76c9696
SHA11580b305c33aa66a83f8c906f7903d1289ae4924
SHA256a5b085c4620c01bdb2835ec849947c5ac30e597f122b9abf45d45f22f015b284
SHA51238cda571850e513c1041d621c5ca44c4e84f7bd0f4cf2dd516dc925830b1a90294966e17cdc87a1c9d2c04ab0d05d48043a70353d9d00f824fab8b3511658c73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e50e525181108ca74bc964abb3cfedaf
SHA1fd508385eaa2c1db8dd312cfcc3e44c8c4612751
SHA25693abb45ffe5cd59bc121b2fde8fdde53854ba247e024df5d465b9d56c58c44cf
SHA512a6b82ba4e0796512f0f3b2fcdc26716e9699a3768330c9e53b89eae52777db655cc34d37f39d0ceda3dc3b74d4b8f4e1f40538c71a6a69c7eeeb675b21ebd56e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3b1e3dc54dd4c15d590a00b20114c41
SHA1b293b4357392823b3c87d127a8cde153e443f53a
SHA256a126ec6626ce132d017120557a37696ddb4b3d821bc1a2bd3d9f13f40f2478a8
SHA51227ea4db163d99e64d7135f1c33133ba14ca7cf278574c4e17d571bdd513964b3357519a4db10e3f6aa330987c9bf6a4ecb88d67a2f81e01c6045f1dec03e8bf7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a