Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 13:19
Static task
static1
Behavioral task
behavioral1
Sample
2503ba341d403b3b30591952b475d9c7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2503ba341d403b3b30591952b475d9c7_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
2503ba341d403b3b30591952b475d9c7_JaffaCakes118.html
-
Size
18KB
-
MD5
2503ba341d403b3b30591952b475d9c7
-
SHA1
84f2bbe510306f3ce5f2b7e1b130ab5093571754
-
SHA256
35504421a05ba56c8f911e7a17d30efe921cea3c9191128a2f1ee86a7da74041
-
SHA512
87b9210ea9d6483bd8de323f2ae6df1d010d059578c4913727787a7f7f9f147e58267ea5bbc3ca3c0a3c327a317ce03d0edc116463caa050eddd9ab0805e263a
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIA46zUnjBhOg82qDB8:SIMd0I5nvHPsvOjxDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9D329A01-0D3D-11EF-A4EE-CEEE273A2359} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421336243" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1228 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1228 iexplore.exe 1228 iexplore.exe 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1228 wrote to memory of 2796 1228 iexplore.exe 28 PID 1228 wrote to memory of 2796 1228 iexplore.exe 28 PID 1228 wrote to memory of 2796 1228 iexplore.exe 28 PID 1228 wrote to memory of 2796 1228 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2503ba341d403b3b30591952b475d9c7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1228 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d126f5fa26df3182aa1879cf31ed9f9
SHA1e455a4699c368a29dc75b468d8e42b7a200ea209
SHA2569cc020c10796672ab360c913219b73e4beaddf5e85832667e7d89f1b2e242d4d
SHA512521c70cf1d940f447ab2280370da0dfa676ec45e7a725e882fd95d4ac87ae1cf2dabc8f7df56fcaac0c41257a3a977a4103d9c0836bf97d01c73bf36ab05a26e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5281ec318472c234a32bc9c797799e165
SHA16d9122c412c06e7b120124b135acb9730ab0b580
SHA256309aa0df51e2e8c61449b18bc89ea2654625bf5920aa4cbe3cbac01ed6cf7191
SHA5123ea3922e0d5c428568c1374d8fdcd22745184eadd7d3b9ba9bb112e5922baf39caf4abcc0919bd1e5eb4a731e32d55e1f89910b80669f842f549e0fdc2312178
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a17e017c7fafe0073e62a15211c2b10
SHA19a86dee3c51ed5fff98951cd248e7722e6e263ae
SHA25612d3dad0c427410125ded5dd30f0207a21d7ba5cd12a308b9387a75f6b5329d8
SHA512bc9e87282f8f5aa52b11df312dcc894636b071baf3ea8b01623e533b8a3ee29f8114e5bb7a89a1177a204d7a32239231e328da97428c30e62884e32e699c0ce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad7baa4279b389ae662dc6f3715ef263
SHA1dfe1987b860017ce2f7e129a444aa0c6d743635d
SHA2568206eae22290318ebeb315c0881bd26c5db90617643ea881ed7e1323163e2d1e
SHA5126e8133d4066283622d5426baa4050bbab43c807988bd306877324668d744a0294bd9d74f04e049bed1e705c3bd1f9bf580e45771da6c4a2588ebc5d6eb89e3f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ddb456c3695577f1d388b4c4284154a
SHA180243efa4ffda1ea03cf8313502b0f9624155610
SHA256214562ba75f125d1e05d034ab94712c27824c6659462d24948038970dbf82126
SHA512ec361f1cf5a2e5998fb83eec5b1afb699555c0a5331a2821cbd9181f3ea0e14d7879e2af72e51cd8e0c3b03e8b5f9a0b647099d9eb3381a6cf8b9e85de586a01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5539732b498c70c360a86502f1b9937fe
SHA1edf82d6b1be16ab4a59976dd22c10e7f9dbde00d
SHA256448cc15224d34cd9e1986046ac092ba5b4acabf054fe241f6261a1b086f31235
SHA5122979f32cd5e8259d9c19a311d41b60b3e55af71c167f5cc595d8d36431c8363cd630b6a42dbbfe57418a321ddb13b0707a7b44d7d6ff2b6130d241a6ce002f76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5407f34d83e0dd8fb1fcfcee6bfdaa776
SHA18d9f01197d74080811b523ac4c84444ddf90c4a3
SHA256a988a7621c0e073c21c3d524541ca2617f6d0fac45bacdf546cf2c51d011c65d
SHA512b6f4b50fa3f283c680c7861d1646c143f427cb45bddbae00b2a496627b6200b1e0ab3332786606e22fec4487a7326a69815d6324ea31931af0cf0597985ae292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b693011e4d3c3a8d3b703dfb0998d79
SHA1ad13976ab74c689bbe7bde0687819b59691fc868
SHA25662edebdfacee6a519ba9d6eda2ae966c814955bbba441c603b5c2d82be884d41
SHA512d1821fc6556e82ef74b7c8397702a07965dd6868ca7ed2867336c143bcb9dc2f4f8a3b02f4e36c5c3bad135f39a0f35a8d474195ca87e927d32038442197f41a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a