Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 10:56
Static task
static1
Behavioral task
behavioral1
Sample
2ec4a964363810cb9292292f644acc4b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2ec4a964363810cb9292292f644acc4b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2ec4a964363810cb9292292f644acc4b_JaffaCakes118.html
-
Size
143KB
-
MD5
2ec4a964363810cb9292292f644acc4b
-
SHA1
0f1b60486d314d6e3dad2d98cdd7947b8609eaa2
-
SHA256
c7d96c3a9b9b6d38fc66dbc45baa1adec5fc64611ae9fd2aecc8b077afdd57f9
-
SHA512
cf6a64ce0da35517a701d8cc68a9a214294b8a17719b5c0584e9b8971d49eda7039921a844b0f2005cadc09d8a47984da2cb41acbe18f676b5898f3ca76f9f19
-
SSDEEP
1536:SjXejazWCM3N53dq9o7SusyoJyKCx6sj2c7nrVZVZZiRZuKhtCWa5HyiBCC4RJ1C:St19Zx7dyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FDEEEDB1-0EBB-11EF-BC57-569FD5A164C1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421500473" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2844 iexplore.exe 2844 iexplore.exe 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 1188 2844 iexplore.exe 28 PID 2844 wrote to memory of 1188 2844 iexplore.exe 28 PID 2844 wrote to memory of 1188 2844 iexplore.exe 28 PID 2844 wrote to memory of 1188 2844 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2ec4a964363810cb9292292f644acc4b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b5ccfac555f9becbd682f1ee2b7309f
SHA1a5138dae5276177014a575d901c0630891a2b7ac
SHA2569f68484569fa0c7138958ca53c74544689dc84704316e3a8deed2d9a8da901e1
SHA5122e3677fe746e14323cec095aa8df4a62618f1b60ebaac0adbc6665760c114ee0fe1693a0ef5dc8795d4ab8a6d0df5496f191dc0431e2f89cec513eb007028338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0936eb6584891c87a6c4d22dc20352b
SHA1d76a14c0f142ec88f4431c74d85fbfc0d228a924
SHA2564f830730c5b7dd7ecf49661cb837f90f0aeef49c742961fa0d85996725a0d8c6
SHA51289edc826576c8a564555849df88153653a6a7cf082b19ddee8a41a9e6cc8df23b36315dac0a07c6d2efcf563d3a72c5c6f80f3971af5a655473ee6bb9d4ee86c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53329922ebd577c7385f8ca61ef011b5a
SHA1c7121fe2dd8735b5e7f34e8c0b5d40dfd5cf1601
SHA256566cef0a0a3031d3c42a2859acf5b13657d34a4744ae425fdb119a06acbb81c0
SHA512b553d8113872e4e98761fd63d2cbc40e0464e04493d40a8751ba032fddc30e8745575275abd295535faa5cce41b197add711e0f32480cb224614b1c558ac69bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aac3d2b967504df4e8b61cb13862d6c8
SHA180f88f3ffcb42c900674f870ddfa1da62353a532
SHA256d19d08a50fbc7f77ec43c2596dfbb7c9a0277e76a87d52cf66535c9f871c81f8
SHA5120d99bb3811fecedc250740b3282c1943fa6cd2c03c5afe071795ca92031b04330355972916c2547a129093d15096d654efbb3832e35b6000a20ebdb4c4e3abc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52064485fc5441cc1f564dc71f8dac8e1
SHA13ee9bd2e9ea01bb1e92a8d9fd6a2e18054091c44
SHA256c84716240d283be06fbe4e05e50d68ef98264d62a4da3ac0e1abe625f67a96c6
SHA5121231cc4451a901f97ae68b809c7c96dc982f013d708582ff6790690910eb02c79e840a0484feb06ae59a6af88b646705bf100cafc9c41d3e3f8c4f9f9085f287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5854115a01bb994d6c5b4e709f5b0b4db
SHA144086ca8144119dbd984810b8365ebbf16ba5b72
SHA2562df65751f004f40d1e2ba28df8f11315e0988c92e46f1fb923ca70f80b7affbe
SHA512e598a760e09ce693cf9b2cf296b0fb4314aa222fd40a418a977dd6189997f2e6f2a790b11ec2c45272d1693f03daa0aca5fb9b0c334297bb5c2f6f8a32cd8da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f783db8287ad578ab1e9a14f9ea97c8
SHA17900d700bdc55d07c25f846922c175bd7607e58c
SHA256388255c4dd7c8ab1181b595773b380d599f5cba05d32202c61b84e90745aa7d1
SHA5126876862f0c503a75cee5820c07e26275faf5829e9f73909316d77c8ebc3e3f3d5c6b9a192864334eb5f70bb8aa95fc4a33fa1412f6e851a8b2598ba8c52e8dac
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a