Analysis
-
max time kernel
136s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 00:28
Static task
static1
Behavioral task
behavioral1
Sample
2770168465d6b0e3886bdf40bd0907d2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2770168465d6b0e3886bdf40bd0907d2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2770168465d6b0e3886bdf40bd0907d2_JaffaCakes118.html
-
Size
158KB
-
MD5
2770168465d6b0e3886bdf40bd0907d2
-
SHA1
4c78dd130ebf73a4866ddbda4da9b75d3de0f8fb
-
SHA256
40826629de1a7c925797dd44b9575823a00fb6b5bcca9e39ca796788f9088c83
-
SHA512
1dcc67e4990e38859059e680aa7bbed8f680dc1534ce581ec8761e43961284d303ce1cef8b41220925b4f8cec992988703f667d0dbe34c3f5ad4e6feadce80c0
-
SSDEEP
1536:S7uVaeaMRD4j6PHleHnZgeyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09M:S7fvmE6eyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D368151-0D9B-11EF-9542-4A4F109F65B0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421376402" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ad8d30a8a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000fb4b696d52fa9334762d64c1edf7f7316352da7e9151323c28eacbbf3adfd163000000000e8000000002000020000000e8b333f98cb644b3425c542e31a3abc8d2ce273beee126b4819f06f3b865937b2000000002c04547ec8dfc5ff5f95c0c249cd0fbd3953202faf23e3fb59d995826f4bffb4000000026a30d7e8a3140f8a8f2d1932ac9098759fd80f883f43473f95a89ced9905809164e3818245c2b3ef1a1495763a451673add5adc79f9811d15e2dfd1b377bfe6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2012 2380 iexplore.exe 28 PID 2380 wrote to memory of 2012 2380 iexplore.exe 28 PID 2380 wrote to memory of 2012 2380 iexplore.exe 28 PID 2380 wrote to memory of 2012 2380 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2770168465d6b0e3886bdf40bd0907d2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59e965c3c5963c35e9083911acd3fc248
SHA1422c2bf9ded9138d450b2199a1aa974c10702018
SHA256313128f37670e2ba621cae0b455ad263bd0fa8fc80c852f28c8a8bc4c51be776
SHA512b7574563234079e210c47af80fbabd548755f1fb39c2cd617911ab4b229a46e198449af98f7762c80cceebfc52f1b221ff111a03b01a6bd8232000ac44f77199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cd37b09f3f7b32365723d3dc1be43953
SHA12f0c22d89be0ae9ba28c48cbad0f2ebd6afc6c6f
SHA256b834715fdd31ea8a54452e577fbabab63099e3e481b389be32d1b8aaaced7309
SHA51218f8c0d237d45d1c835535e165cc5b9f2571708a0f7bc4812042fc7a8c8b2d05d47ac3d582fbcefad0fa545aa829b4a82fb14ac14d936ac8b27d5a50f6386837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a437249e3ae61f6d9015927c6f4c63c6
SHA19bb1ca0505d1c7ad10e3b35789fac452729d053b
SHA25627f1a5107d2791b911817d4bf08519ed72fdf7b1027c70fb7e15a7cd2d784fba
SHA51245d5366b8fe116647cb050960aaa6569f487b4b603b6ae6dc53c4aa9be09fa23a06cc0872da1702a176fcefe78695cb39d8cb003e3ab068f5ff5a7a742e11b38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD529e6a27a3ee024387b13d3debef1e37a
SHA13d93a8bad0549e4934561d03ce78b7a29f2a5a71
SHA256ffba526f85e7b7e614c787fecc69b61582543818d633fd2be27d5de839f68e67
SHA512643e74e4daeeef928314a4e3ca63d5512358fb0fc936b4a593c5dd37ef2437352598e0af64f55dd09b2b5cf838acfa3768462552ec69f348e2232f2f4ea5cbfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD541f68b970aeb490e1ddfc729c7e78d56
SHA10a6c3bc8a10009250ec7ca7867bbc3f463fdfeb5
SHA256ccfa82ea0402b7c9e350820f3f11294c937608dab330f8f28994899866a0ca7d
SHA512d3fb86ba7b1e954aead2cfe9d07260c674c5a3c1553b8264115bbd10eb0010b33a9567040659d8ced71e48c1a1214bdaa0fe436a6d29604c37bf1d6b4fd1360d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b868c3d6e6f7912fc5da7f29e512c0ef
SHA1778109fc168118605c843acc46313689554c68fc
SHA25618b79cbe1d12e1cd84556ff7748255ef7865278318a3a09091da48c9bf3f0918
SHA512a91a8e8b259ef349d8ff0b38d0696c768b8123ed7605e0188ec955a6c81e4a173c07242cd48e33bbeea46d61a1b6bc7912faa70cecb7dcfda9851657ac6b2d7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD500177e47c03382550f5cb8e0ccbb7413
SHA158015461b3e1ac7c1e5529e03ddb35a79c0a71b3
SHA25675898ea05b9b591503ca83e19f7ea88f0f5d8d5999b764ffe55b24d922bbf0b4
SHA512ee29b73cd62438b0ed87d2469466d1ad4f6646984a09ba7c026aa5d42ce63592944e6eda24b4b5e02c11c283ba0c942e5239e5696adf1a4585cbc6216fd82a1a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a