Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 00:19
Static task
static1
Behavioral task
behavioral1
Sample
2768950d7d137e7ef4fc969168e6e71f_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2768950d7d137e7ef4fc969168e6e71f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2768950d7d137e7ef4fc969168e6e71f_JaffaCakes118.html
-
Size
214KB
-
MD5
2768950d7d137e7ef4fc969168e6e71f
-
SHA1
41d1474434e71fc7acbd09448d7a14ab5716ba5c
-
SHA256
579bdc097a6bb3990623331972127ae052c1e867f8e4fb3bba3b83afc1e4d279
-
SHA512
3e82065c49559b5a804c09d80bcfe1aecc9bc191f8f465d0c013defb8185ed06c5424dd16843a300cfe60b6cb77b45bf80d2bdd48d8d00afd52c884dbc726b9f
-
SSDEEP
3072:JrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJl:tz9VxLY7iAVLTBQJll
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D72CC6C1-0D99-11EF-8ECF-42D431E39B11} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421375854" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1664 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1664 iexplore.exe 1664 iexplore.exe 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1664 wrote to memory of 2192 1664 iexplore.exe 28 PID 1664 wrote to memory of 2192 1664 iexplore.exe 28 PID 1664 wrote to memory of 2192 1664 iexplore.exe 28 PID 1664 wrote to memory of 2192 1664 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2768950d7d137e7ef4fc969168e6e71f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1664 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b98ef689d1f9594b2e1ce3f9717eee06
SHA1e9e6ed724dc40d32c2c1c1d5711b38444b759c1a
SHA256ba0c2da00a3be951ab68f7dc4097b525b21788fa28e4101fec50a14eba456e8a
SHA512cf5e542bcfa021ff480bf2f32e5ec097673d00d024a1d07a293eb78e7175421296c31e86d0145352fd3cbca292141a65840ffcf7620040954393759d7945b992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561f2a17d1285d420976982b9a6eea198
SHA1488e69fedea0a9af8d7678ff02ea55aa2916981e
SHA25654e64e61b13bf5eb634c52e182e6f760f2cda20e9f9ccede8117ccddaef6b399
SHA512f2bf6dfbf192420af983ece8500ffe9b2cbcd4896c31377bf49ce39e1c7f5585196a238cec25f52731e64080bdf89fbb3f739ce820c5248763676a4c543b63d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f031eb1084341df30f4e43e5ec9e71c
SHA174d9e267c3f17b061756dd760f690da705b31b35
SHA256b87f4e5fd56e4e3e1902ee1257c4dc00127c8f39b0f24c1845cc5e570a7150b5
SHA512097ff75f6d81fd547cd23cd91bdd9f5710756cc82bdad37f02e651138fcf61f4341188d5c6cb2def544bf720770e67e43dc9b1c82f5a25540598807427778056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5022132e26faf7f1f1c6e4f3f19532447
SHA1e8ccb4cc59740d68db74396947d7489d096c8aa9
SHA2560a806bd62c9574e531ebffcc5e3b85b51dd91a1efab46c857eae4bc42fbf604b
SHA512343d7c24eb4ad3086609ab82bd064a64e75bb3fe9004778c7820952678a04c2d05860879068b8c3762a4a0998b5244bf20b1940b8a6b7c8a1b230d295273a15a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5837c2c2fbf395def79dc04fc6059a3eb
SHA16cb041f8deddda3f80c7309d5b1bc9586262d9fc
SHA25650b2e8f3e1d9dc50ae7eb2e9fbe274b39b96fccc3bd55c6365a6d4da44436515
SHA5124ceb587431ec1fc1b45f38325daca1fe3885e50f9271041c69c391ec9fd3f57d0126fe94a2c82b2686e7b7912b0860bc230faf65cfed53746a556c083ef5a6f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aeaad1b1e7144f3d061c8490cfd84ce5
SHA1068516d1d2758affbe6c8b04eec453592afe0bc4
SHA2560847329e37d3cff569a148030e88a8d0a0065efb36fa7825169d0b2da338f8c6
SHA512e509e3b1deb30c88ea508deeb2a1095bac1465374bf1a2922813d42ff3c73614e403a07ca3fbca2b146ddc5cad9b8c502bef063b1a78c4c30b26caab3267caf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bfc803c8e8b0793a27a1ce5b716c655
SHA1d618794a8075d6b3dfa62ce241ebb185e68ba766
SHA256e77bb6183756fc23684546bec5cd2d0536856be2b0f500f4c7a2594db0e83c87
SHA5123a3b86b91eb2bdd1e3984bb34e17e536d9d7dea3e4c7ce3a3de3cdb45bd2ffcf42b3194d88e3f54c5246833050dd71d890386665c8a4c3ca5ef029723d53a14b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3a3c947b76f6362935592952989741c
SHA1d1afcb0d3e33b3fe7e3371666d613e79a6ebf10e
SHA256cbd18c7261f50cf30419cffd0d3de2520fe05713cef2ca80bfa635b8373f8ead
SHA5121284802e073690bca44b6e921d035844d16a15760156315494872511082d5128ce8227fb259c6ef55d99bf14a8782598e8141b692221fdd15849c14e5e6e3292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e4a70e033a91e7afd86aaf3a9a8cf5a
SHA1cacbb2c9f71974c59425868f905f8dff73f8a016
SHA256d016bd7c4ab514e904e65f3b9930bba1f2f2e15d0ad783dd09030914f7a7cb40
SHA512aae43bbb2ebc23bd673eba0386bd9af0e084bf579f3e41f039ea78ca6b35d9db901026c851ef779f339ea635d31f1802cc4ba272ed8a5b162f0305262e63b510
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a