Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
04-05-2024 23:02
Static task
static1
Behavioral task
behavioral1
Sample
14df2120dc16d2ecda1f4a49749eacf9_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
14df2120dc16d2ecda1f4a49749eacf9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
14df2120dc16d2ecda1f4a49749eacf9_JaffaCakes118.html
-
Size
30KB
-
MD5
14df2120dc16d2ecda1f4a49749eacf9
-
SHA1
ea0fbf5adc4b03d44bbb060b91bcc8fb3a8b6755
-
SHA256
0d68387a481c8b45953625fc6ba981bef4750b378559403259b408d28c86ff6c
-
SHA512
334e750b351a905a86bd09de81bffbd08d2b2c3906adc9fbc39b895e4b25c4d78e908b51ae34de61b31e9ed7ef92b71b3b05856c333d32ec1d7ff300d09fadaf
-
SSDEEP
768:uxTWXi/AE0Qc0jTJIl60jH0jH0jk0jIX0jUpwZu1:niYE0Qc0jTJz0jH0jH0jk0jK0jBW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000d271a9698a49eff479f7af13e38fe8a1f7a9cea8437941ec5ce5b3e8ce6b9a21000000000e80000000020000200000003ef7d7e7da299facce120d3d2442ff4eddbdc99a09050a8453943c58bb5cecb9200000002948fb587cc56799b90920ca65bd0f54951ee1bf5aef21c5d333647a033488c940000000a2158580a1bf90377d38d98cb16ec8ba9018f10c77b2d87ce2f6c89c4b64cf573d23f8b9e8bd7de867b97eecddb6f63a1a33efd68b79369b2a210fcf44c13c8e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000025dcc65954c1ae920e88ab723f7595e77e569780e82351cafa95685bc9bd760a000000000e800000000200002000000085c1bbce69a7c33e8a105057788c981e926acad9cfae57dc2977fe97f2113ec39000000064c6c1d43e25b853127daefc5b37e72ff24046cd19b2b94851d506969681f48d7dfe3defe72da7a49e4115a170e56b84d222a2ee304751c4c4144cee84be7877d28b2671a553ba86ba664c9b3a69fa9fa590e7213db0c1af8d60bd3317f0b53b890cab87d4dd7e3c05dd6204d6eb9b7addf5f782a92c38bdf2b10363199f379a68918e4ea1a3e7d6a130c2554f0f6efa400000001b978c9dabded9e1513764df972006a21794c5234c058a594b45f07a4372e803b4653626c0ab637f3d623c0fe02fa03ffc66ca8ddbafef32a04ea3e66989d619 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0850135779eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421025614" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{60738FA1-0A6A-11EF-9EA5-C6F68EB94A83} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2744 iexplore.exe 2744 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2080 2744 iexplore.exe 28 PID 2744 wrote to memory of 2080 2744 iexplore.exe 28 PID 2744 wrote to memory of 2080 2744 iexplore.exe 28 PID 2744 wrote to memory of 2080 2744 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\14df2120dc16d2ecda1f4a49749eacf9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58960ccf6b289be13449cec6c45ef69e6
SHA1c18a449995c0454a806272ccda63607560bfb947
SHA2568cb59044b7f2537a3462eae8a793422308fc001dca22b199a69f6c4cf4af7d0b
SHA51205d179e025a48ac319f058e7532889da926d4623db468b8d27b242bf0eeaa1a9b82f4c8156f3e1f1b66c04f94771d4c5d875cb90084f600ca08e75038317298a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c063e124ec9b207a474d931fe5cc6edd
SHA1a2f2a6c1087da60330ae07d38d3dee4824889466
SHA256fbff051fc70c420d1fe07bb11dffecf66a09520d3ffa97f6a8ac1231b583e92b
SHA51240fab8e2c6a2db311e33804cb789d701ad1b27dd4b34acae118035bbf705f39a7db7ae062b91b9a2a62b42e30a2997a2807c019e371d0449a64c485805662b2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce39d91c1e412451a46da60e107267fd
SHA110a51d0ab3e23a7847d79727acbcbc466ff76c7b
SHA25670e76b3b2f3a3a66267229845bf96537580b6abb96435b1ca257e0b367535900
SHA512a9f7f88ebb725cc970f372e78045af135861dade1b6185521d6d7dc269813ed03cce7da7461bc583b2c995f7b1243dbfbbf141e388481536557e48a9e05cacdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f66cd98ebe03eb9f76493ca5113375f
SHA15d0540e94b7013feac3cb7120c2a862c077b5615
SHA256e62d2d253559958a3ecf4a4adcd96f69ce0abd1a642d9417942353901703868f
SHA512c621ead08a002457928b9effb3cc1e5707aa720e4914f4b9706fe6e6dc9e7b395eb783e8ddf251f0b55d1b89013f17f1e2bf2a008e3e16c1704a2f705872c796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5800060dcdbcb495ba9ef19ad9ef35f2e
SHA12072ff70c1882df145a3bd32e722ef2dc71d08fa
SHA256dcadef1941e404b9b595454d5c22a881a4b8844af09f2f84e542c7c060773564
SHA51295ef12635d5bc0555a965a715c1d8f68959299e55c1d6fac8c01ffef9f35f637a06a0e18ed868fc0b5bda9c6f3e416c036215352b4c9b0defea31a0ee52074af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58190d905310391580d76c882f7d090d2
SHA14c8f572fd6b5e60f5091cddc77928ccd8e6f412b
SHA256401c9fa4a04ce89a65fd491a553afcc885c91e0a1a8ff008f7322c49a2fe8f7c
SHA512d2d2e57064e4abd5559093dd96c38400117a9930391abf3e1492315060e1822f3fc3233be99ad33c0e1da41d7b77afcf20a062903a2f507907b661d92cb155e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7133feee556594ced031e1a464a487e
SHA102fc68c4413cbf25436a13f7bda888d4b87c26a6
SHA2562facbcee605b2307c2f1614411757fb673876db3eb2dbe66b95e886ac6ff461b
SHA5128269c80c3f915f0939bef564217cd206dfaadf07f3a00684ad0ecac36648a69a8b975626a5e02ebb39f7bee0ab23c1ecd70e483805b4dc8f53ef10ae00050ed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bed273d474f383c990b817ea2f070401
SHA14f5fc0495163b576a5a5bd961d10239da80ad18a
SHA25677f9d1beb8d9b9e1b457a601a947fde6ccb2d2749c18d42db4589f8659a6007a
SHA512d6335cc40ac032b457576ef13a021121131f5801f21266ca76a673a3d506c29a2111bd41959ec0c82ca191c15a6a9a08a5c7f488276c5b95f0add7df22ff9912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9bf42d5e9b74e22b4823ca2314f8c0a
SHA1d412903005982c5b6a4177c0671c93dae91de7fd
SHA25618a8c7cacb5925623804bd5c332c020e1814f1b2be23845dcac6e924dbfb4c8a
SHA5122bde022515ae1e52e2e0db818c072de7cb571e949fb5003a82f9c773c7f9ae5db104509ddfc654d4b3544454d38765c9e48ba247322557a285222db31c422842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576f969d34c6bdbc7181371a8fd890a19
SHA1846784be977c6fdad39a3636e00df4cc66a1f137
SHA256734d87366ccb91dcc4ed8392d2bad92da38e85e9cfb2deb88e3f67e86c31af62
SHA51203270e3efc79d948919926f2d80094a3ef6cc6cda26b07b412ea0746c9eb16b822d782d54e8c1f8ad52d637c80ee574d7a4ef802ccdfadfc2bd0336c9b58322f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OOWQLMJV\6wvxhkictqk9[1].gif
Filesize15KB
MD528414d285c25f270468206fc12445cf8
SHA185c76fb58166cf4de3275b6c73773b974ad2b94e
SHA2567c15bc132b24bec38854a9054631c0f02a07021e59d9561f0dff6b8fa1caf2f8
SHA512db48016919993e0383d7c8ce4443565f2b494ed27e086aee7ec8dde23a7ed266b0bb84631c668960a190828f3fd578df2c20d24150171a889551b1b0b0a9a363
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a