Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 03:38
Static task
static1
Behavioral task
behavioral1
Sample
2309723a480fd3696526919bfb2f13de_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2309723a480fd3696526919bfb2f13de_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
2309723a480fd3696526919bfb2f13de_JaffaCakes118.html
-
Size
18KB
-
MD5
2309723a480fd3696526919bfb2f13de
-
SHA1
48037df706bf9f2009e89c1216cdd5fad754b7ad
-
SHA256
efc89fbec2f3de558b5fdf796f2f5c9ba99c3917085ad46ab161391d78279b56
-
SHA512
8913e39cb48ce42c9059b0ce1acefee2e0fb6be3d8fdd0af2c95a2cfa7c9ebe16d999082603fc75e631268abee4f163b09eb47d641535dc2a8f336c78b3398ba
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIw4szUnjBhIC82qDB8:SIMd0I5nO9HdsvIRxDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7EEB55B1-0CEC-11EF-970D-EE42DE2196AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421301403" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2004 iexplore.exe 2004 iexplore.exe 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2512 2004 iexplore.exe 28 PID 2004 wrote to memory of 2512 2004 iexplore.exe 28 PID 2004 wrote to memory of 2512 2004 iexplore.exe 28 PID 2004 wrote to memory of 2512 2004 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2309723a480fd3696526919bfb2f13de_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c91913fdd433d449c7926c6a52fc74ba
SHA129fbf94080d90930b92728d6a23c01c4d0c2b747
SHA2567159cc8529c5a2ba36729d1afba9749c9bc6cad12b06a2f6f292ac4004f01c56
SHA51294802a4b923ce24094c812b1b619cbac1915c7d493f6c480d7f5d83d43bbf68ed37ecd818fe52a373c5df9809eff0e9ed2426c7cddba2b50be29916224f9a181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7b380e70326625cb86c97c7f992c1bd
SHA1f588a85fd18d32dfb4d57753721248c4f6002318
SHA25651ed461540ae5a95a634872f552ffc7ea4dcc9e79b8b1f286f9a2f687e1d00fb
SHA512ea5d82f36c2b567eb3809bad4ea34a6c0c194a935ef2e1784740fe8ec21956eacbc542c0af9eab77c2fe9b4bd2b83717b7fc9092d8bbd83463e4438951794b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1a99c8ea4baca6a1a40458e4009e490
SHA106b608bb8643a1c521d530fac4c159812921ad5d
SHA256f6540d9fc4f780c94329d9fd044ec7915757de0797c03b3045dedc84a9a785e6
SHA512d83c0894e929ac995c2b292c50b41e4c6cf51dfc602c8c7a8a0460880657d638260bad6c380ea7455d7fad904ec82c43e2418adb2d8bc572de22f15f25151767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f146f17343edd67bf83cce8b61529a8
SHA1d0de1fdb1a6a45e7a8044d52fa635584356194b2
SHA2563e7d0994615fd38df46e2d54e1fbd274d98b04088195d1d33799f53bc3118335
SHA512fdae1305079dee27a211f0a4cd94c07298e29bdcda2bde1a6536e0beb57c75575d1f9306eaf3e911cf5f9e2aec2ccfe3a1cd747fd267e153190231a3ffb143ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c1892b4dc4f7b7e1a99e8e3d0f725cf
SHA1c2d119cd6d505a66eaa20b723c49dca8f8a2c678
SHA256f94df7c5d461eb0deb2defb02b52c5bd5de4fa6364118e4026082e0ce9ab58a1
SHA51207e1a06c9961cf9770386209d75482789e1b6eb675eedd8d54149161e9c5ed1395ddc76951383eb656b5d6b8166f0114fd6a386d3129aa8f46d570c856f90e01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d78af44305ca349cc5ae898b28b67fc3
SHA1d5868c483b79253a8f158d7cad5cd2b61d17837c
SHA25698c3620c61c7f4ef8dd72e880ea2158e0129dbfa13e3f9b9eb0abeb90ef355ae
SHA512e555cea40f9be12cdb5c94c2d8e53f228b057275ef830823aa8258689ea7759dc204e30b90dfbc6fe2b0fe8367f79986d8e5d9a8cd6566b161ceb7966e3d73d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589e4deb70f27ac75bfbbfa6cb79deb32
SHA1d7292a7f2456fcf253fcc77091a779eeb03a6eba
SHA2567d18943d08ab7442788d2917f453128c780efc3fff013154ae8cad12ed7a1162
SHA512ed1de16bb1a94a6ac248ecd93f8e9b80421dc9340e87ccd151ed0f64af650ba732bf3b3aeb170f88a6339596187569aed44bf0460ba2def40b8488175b27f26c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ff19cdd793d3e593fbe029374584bd2
SHA1e3bb05ca34d30c9633c035503f897fcdc46bede6
SHA2569799da40adec212a0d6bff6633d5ec9db4ac1bdf2171e44e121bb39c8565e4f1
SHA5128b85b4b37fb555ceabb49a94630d3188b0a0b285d0ce6b36371cc05132ca0e6a9291a20ca327c1528ff946b30a70a8908b5af2e8533f3bbaaec82e1d02040d84
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a