Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 22:18
Static task
static1
Behavioral task
behavioral1
Sample
2bfbd8cbc5deec8a4bc026d88a8eda30_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2bfbd8cbc5deec8a4bc026d88a8eda30_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2bfbd8cbc5deec8a4bc026d88a8eda30_JaffaCakes118.html
-
Size
279KB
-
MD5
2bfbd8cbc5deec8a4bc026d88a8eda30
-
SHA1
d4aead91bb5791a82fcfd3008456b45272862215
-
SHA256
1c013a21318d757167808e58cf0b6c782bd9506cd63d5fdc06daf49af3cb506c
-
SHA512
e0926a8455c48b61b67d0e214eb5cbf45b88f8ef24f4975fbd91f4dd272b1c3e80d495e097b320e6088e212b9ad90320b684a3c47a505d9711901ad1b9f42d96
-
SSDEEP
3072:yOiXm4ncNvdo+zz0zxdI0nbyc2Sop8tksbCnrbo3dR:SZq0z2S6JG
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421454968" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0AC01BA1-0E52-11EF-80DF-F60046394256} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2900 iexplore.exe 2900 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2420 2900 iexplore.exe 28 PID 2900 wrote to memory of 2420 2900 iexplore.exe 28 PID 2900 wrote to memory of 2420 2900 iexplore.exe 28 PID 2900 wrote to memory of 2420 2900 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2bfbd8cbc5deec8a4bc026d88a8eda30_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2900 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f52eec79ce17a853cdd3329abfdc71f0
SHA16547b5a98b955ea0f072c2b1406a67d911a1a1e3
SHA2560fd9fc8ae12a4c2b0ce828f2f9b8f9fdc62edfc540fb097e113fa8443e5a072d
SHA5125e4a7a7026a4f97edfc6333a1f5868d6f1f5272e335236651aee7fcd707af83bf2874017d5a41bfcc3744d4dadd836a8f3c1395b0ca8067b145426f240af9395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5443fe00e97f496aae55558a8dce7cd78
SHA1407d926149c9219ad2328a2660be051fa6934487
SHA256e6277e8462723557e4abe5309acb870d1ad95a3c860c09043e0a5df5a9e05b5e
SHA51259d39a45c89c5511399025b0d384b2339f35143a5b7941bbf785b99c185740e9377197c5110a948650e765f06f904aabe4afb5fe2d78c630eec4dd806abc464a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5686992f7aa63d726871de4ea0c9b7b35
SHA136b631c8701d56e35e4c1caee186d118d6965b5a
SHA256792a23988920b9caa1a95a23e5050deaec01dbc1144ad6a0400c213c488d259f
SHA512226156d9a08ed4c630f6548bc25414d99c51ced6f78bc2c5e5884aaabc9ba0079f05b917423b9bafd5faad08b887eae1489bb0ae87fdcfd71a20007b79f19843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527b6939028ffaf7c3580a54d7fd66838
SHA16ad30d64502a0ba6ce6508ed81a8a39cb9827b27
SHA2568d450be5f2b1460c22256bf0349709556e7cf324f629c96a5d1d18065ded7553
SHA512d27096b468ec087a41935cb240d76e3ab8f76098b54b5239d9ba48b03d31e170a625be7bd8474833901475acdfc83a7f4a70696f57451ec423e74ddc87f695cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4bb3b0331dbb62a8b7f45e09934e449
SHA1d8d55a2f5f4b4710a28027afc8023573a00f9f71
SHA256130c8d1f89493c89f496e69331cbfef3de3fc467a375f1af1a6dacb27f3c6d34
SHA512e26fe8aef5c2079bb3529f68e69cf684d2b54dfa8f1457b4fbb38c5fd0153c4914a5676a76926a5f271538900e5cf042fc9c21484603a902ab4fd053de75e50f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d7f87dd25ed5b6336e37e3ac365c62b
SHA10356d77c7351e5a856ab3013f73b7747ed8abd94
SHA25618036e198316ca878f384a69507f1bf8eba599a3d58e650e141487d441399876
SHA512f5606afe963aac571af4c86fe9ef9e0d30ffe82ab621739081112cccbdaf8ac64fd4cfc8dea17a307034c0d51a4c0ce2c4490f65618dcf47bf6138eeef8f8ee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586bc5b8f22ddfeecffad4333250555e3
SHA1432a47bd6ff65f8813f9e53b8e93f814622bde90
SHA25605c9ee0f557e5eede85421f839a7a203d92f1d30f41a675e37291169d145cce2
SHA512812d184d5d26ba9db4a9b0ac72895be0d6a958bba9365fe9101ef6604f518b2af11fa8bb297917e051bbbcdbe9eec147891cff455d3b5f5ccc09b552cb3efa8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587803a6c18868d5a16aec95844a71feb
SHA1558ba850a21304a5ab1b02b185715914df76eb44
SHA25671d893bb74af59ec1d37e7f07a0307f505e2aee89032030191c37ed963af0f21
SHA51282c34cfaf0fcc68aa45bce219fbf84a76cce7ed00c0fb50975a3b9546fa6c41d1433b3d65add53931883e634a7f82b2ec3b6bc79f4bde04f22f3ab8169ccfd24
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a