Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 12:04
Static task
static1
Behavioral task
behavioral1
Sample
2f0356b325764c837e7ddd67ac245be4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2f0356b325764c837e7ddd67ac245be4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2f0356b325764c837e7ddd67ac245be4_JaffaCakes118.html
-
Size
77KB
-
MD5
2f0356b325764c837e7ddd67ac245be4
-
SHA1
087184341deef6bf62b4463e6eaec25a4cb438b9
-
SHA256
9478abfc37c827069cdd1b068ba87f864db762ddae5008c35ecc2c48d6bcbb6c
-
SHA512
f989dd8e9ed1010436519c5e5e716c556928ad70f14ad5faa4e5627da78f4eb7467c719640e6cd18d90e328055f2e675a8a0aa70d340c0062c069ba77f9fda07
-
SSDEEP
1536:EbP3lUi3ZBEywQCJIj0MANvYQWGOi4QoaeyaDUE9057RXcJYZN40eb3OLHZ4zBsF:aUi3ZBrwQCJmkE9057xcJYZN40ezOLHR
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000009066a8c905def0ce208eb94a878dc8f652da9f9a12b0b5dd35b04e15c0c260f6000000000e8000000002000020000000b7dca64f6581bcfe9e07b3fcdef73b22cc2c6991fd367b5b4ab666e97d60db5a2000000089f02292faad2a07d0ea1e01056e9e0f7584b03bb3ad722a64d4291663aaa48240000000ca50104e69287d69cbf865e3a1e7d93b89f889dc00ed747274f61017fa74537b58b11bf0354ac5ec31c886cd35ff10daaad9fa118e59647ad68dfdf0c068e3e3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00fda05bd2a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{844C0741-0EC5-11EF-9F07-6E6327E9C5D7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421504563" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1988 2084 iexplore.exe 28 PID 2084 wrote to memory of 1988 2084 iexplore.exe 28 PID 2084 wrote to memory of 1988 2084 iexplore.exe 28 PID 2084 wrote to memory of 1988 2084 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2f0356b325764c837e7ddd67ac245be4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b67c274f877d0bf83f205277777e3c93
SHA1e336dbc655eb8ae219a8e990ba45053a9907a4c5
SHA256e95304563e323df4d6cceac88f142f3adcef8446125614be0b88bb2390f6644b
SHA512d1dbee39fd0f2d8aaffd1c1f7fb5d4b0e5215729537d86f82a0780c674e24f72b5f7a9c7c2c98da41f7cdeb2e873fb1a89b95555cacb0784ec69b008bbabc540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7446b4e985d8124d39a482001d8857f
SHA18443beabf8ef6bedd4a450bbf56c8fa961ae769d
SHA256d2900768dec2d8e7c980911bb14034d81a6ff545d49c6d25e770d82246ca61ea
SHA5125ebc0c2cb4741733c9e7d19f63cd255291b54fb10fa0ac4fd3e28c5b154713fa8eca87d434e6b5b1dd497d6825fb5db3fc2a2c3dbf3c3442776aa72164b4b81e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5526e35fac7bb43d955873fad911b04de
SHA1ea402194ca1b0b705f2e093c03d6f4459c863699
SHA2565d9547f09482508a33f1ae37b2c7d0f464d30765cb5e23b31aa9a13dbb5ec81f
SHA512401c4cdd3cacd0fbff2bc0e0c31fba1e06b67e6b7baa167d2369835c5340840c2e671f35754c0f99ccc44ec9fea0a5950cf3f923c583c249f73794a0f6dbf801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eebab1c010cb20271cdd70618a850af7
SHA14884623eb24582c7a4c6a911a75add407676eaf2
SHA256070c9b3e540c85052ca787367b4b296162f175dfbd7c380f8e409aac945faf88
SHA512b7c9a3cd5849a28a81029016a00b70443847e93008f8d3b5667a1a5ce918dd5823a76854be22a332bb9c87f7a510c4d0b4318cd8a2267ac3cb0c996164c0f42f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515541c42175ad8a311f670964be8b00b
SHA10220442a1816bf135e0b55cfe1d1f56c1f04a861
SHA256b45440d64689664e6f91cea0a58b640d48d7dd5b8bbcafe7174a18816594489a
SHA5125ffcc41dcb656456914a6bd473cd190b0c276a9bae0acbd62fb4335e260394ada91fb38e97f10d3f955ae29334b77ca729796f349a2c439fd8006cda1ca014aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528f03fce4f572674ca5dc8993dd6a6ae
SHA167d4e02c6d52f717ec23800aa591ca5bebfefb0f
SHA2565c598eaef20fb8228169931f1571e85aac1c3ba6f3906c34b3f30445a71a4d11
SHA512ca4495c2402c2955a1fc27b7387abe7c22504974710c48a8a620f778b1b43fe3611bb942d17807640639b139c5789b7b39c4d6da6efe98c1097759a58218b748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9834433639b2e7c7153ce0305c02db1
SHA1c18592fd3d6384030d5ef37661b7807cf10b580f
SHA256cd67400ba637ccaeb5905cd38b8424dc94ced242d5de24822281743e570312b5
SHA512045d7d6657236605cb765a3eb2c184e28432113d20ae519de36f5d4489a47ef2176e2bae9d9540c89bd9edbb5e3ae8091b3eecc9996c5d9ae4667b7a1282adfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c26e6972704e6dfd8e5261f178a12a5
SHA18b77432ac9ccfd58c9c35feeb1112c590957871d
SHA2566b92bf8c890733d2c0152ce910314c31c24db6d8d4fd4d545c2c6e7f85a814ca
SHA5120caddbf089aeb8582abc91bb5593332898fb2a8f421bfda06257509bdf02bf43691f774b905850655edd152f296968060ca3e1b795d183608db2af4b7ebedfae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5597f0704309255f4f9c037355187c097
SHA15ff30d75ac66adc64a9406aa793bbf8a76fb413d
SHA256c8ab2ad4cb0a3143a03a237718569a1770d28f51b4cfae24934285d80ecdb8fb
SHA51252ebde29e594054a34047d37ee64fb5708ece7a0c411b42d61fc4f3982c08299cfa5f8c702d8d4849f49a7696ef1fff11ed9c8ca1e0c447364cb4de0212ab9cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7882380b2e2f8b7075bba8519f2fbcd
SHA18cf9e1a33023c9bcd82285f17673e1a7396311d9
SHA256470f9e6b8be481ac1c43b64940eec922e2c150a0720be2cc50482036aaf61efa
SHA51279a96b0862362dfef61ab27a59b652940c84b7e9f4328d671620ae3edad3e3071fbc6a9d4cc875ecf46b3ee7efae1667e18b66d46680b4c47d57bd57793746bd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a