Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 13:26
Static task
static1
Behavioral task
behavioral1
Sample
2f56049e68b47a00f357e1b5d4f6fa6c_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2f56049e68b47a00f357e1b5d4f6fa6c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2f56049e68b47a00f357e1b5d4f6fa6c_JaffaCakes118.html
-
Size
47KB
-
MD5
2f56049e68b47a00f357e1b5d4f6fa6c
-
SHA1
b281713d10b0e93136304d17bcd3d95dc3710c47
-
SHA256
2f1730f0944f6940f1c04b7f64163028cba8742005ef40920de0315e5e6ba13b
-
SHA512
7e55a4170ca02766c80da26ebaa129410ffb1d258296f7d84685c465d773dbe0e86ccf639b8b3c2db9583f91ea190adb887a12ab08641c089a8dcce0e7194fe1
-
SSDEEP
768:M0zai8mZrJhhRh7Al2huXKY8geYIKH/QsVH6qhXkXTCnfgvsnxIGNwIWVFs+SVxA:MmYeYIKH/QsVH6qhXkXTZsnxhwlVFsVY
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{009B3C71-0ED1-11EF-AA09-E6B549E8BD88} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421509497" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 952 iexplore.exe 952 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 952 wrote to memory of 3012 952 iexplore.exe 28 PID 952 wrote to memory of 3012 952 iexplore.exe 28 PID 952 wrote to memory of 3012 952 iexplore.exe 28 PID 952 wrote to memory of 3012 952 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2f56049e68b47a00f357e1b5d4f6fa6c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD51630045142b681db44886e80d4d42285
SHA16974d890307bf9a65ad71eeaf5328ac1f77b0192
SHA256271e334699b90fe18edc3f564f11f3bc256fb3770fb1b0621f4920fdc3bb2c6e
SHA512b2a51f2c2839248c3a7f7c94ee685690234376058cfd22ab492978a9b921118eb4d777f36d4e15df9ed73308c08af04defa95de26785a024b2ef93bc6004647a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589a380db87079472da61984e17eaa106
SHA1b5d5e32c26c13a5f5a2cde024c7ad31d387d8120
SHA256430db716b9ef17f6ccb0c4de6f266f7a32943260e6f1c70832aaebf06439625c
SHA512e602cf32d8dab371e8fb51dcc21dadf448c7b92c0b8cec8f4021958e17a978f66b58b5f659a01aa15214e94165575f71d8d5f926584213aff003f67f61d268d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577fa46bd073e61a3159f2fe8b092b0cf
SHA15d541b85b8ba74f5731fc2b37babf9281cf2e7df
SHA25698f699bcfcaf097e4b193bce43f39b75c8c4a7253fad04a08564cf4e6b9bf2f2
SHA512502fc72917e30a9df74223a1a14c24ad1ff0ab8063265880b71f259671b29ebfa0490ce1abcc08b411ceaa33d143b707f3188bfd533462bbf0a9f9b7aa2bf418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe36ed16cbea6fbdaffaded68f3f8c46
SHA105e36b4c7e4647b7617fd3ad7152f020f12c405f
SHA256b48a91976442a03a5055583559119b55f8c0b97d8cea109bb270c5cfb2bd96cb
SHA512b50b4a172b20471d35a160c1178749893bdb07d6fd9f41ede78b339885134d6f6cfa57793febb7473660a0fab75e916b4cc661ebd361937535e2bf8cfe42c415
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a33fec616accb3540b1890ccbadc7e5
SHA15ddb8434908f6d0212cdb5c479928ba8309d0c4d
SHA2565c9782bd9d7fc7352b8e3f35d695d51b0951a6ab75d2af90a372a8492fe13259
SHA512546f5f28c860d092b702abdbd02cea2fa16d94a0a93dcf5a2d03eb1b14c6bcd48579e82611589128fbce17c32ec313e3c64ed00135063c0d0fab5f8b2dd4564f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5872dafb15b3f95f95c17aa170bcd3b3f
SHA1a43c14781126d524bbb75106dc6a53df3ecf71ef
SHA25673f6cbfe9439ca8179cdf6ace501bfdb2644a0800da8881bdeb542150d0c53aa
SHA512bf62338a716a66a6642849f855cafebe0f6bcd039488e04c791141dd15a12a4b4edcbe4230c117f76be9ee5df039f17e89de1e1acceba33c8ffccd9bd86ec5a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c28e494578e23141f45e238f207392a
SHA1395a52e20e9283c6510bfcb4b945903b0955201b
SHA25689207f8e504151f44fcc949138102b03ed7c197603dd4e60de6eac046489cc74
SHA512b536c0edd4713c8821494a8ba00cca533341e64dde2963c4c10d0ac601405d997072a06bc4067fac546213ab434a6d6f0a4e72f9f713ca2e9ef212039f715f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515ccfd3d8eb99f169939edcaac18006b
SHA1ee032e352fb71c04afb829b00e236ca26fb47df2
SHA2562912d3f7ee5e391f4b8b8c9b9417222821c816f31a7d4aa9cb20e4e4e2133c60
SHA512bd15b8da1fcfb9ab1842d164cc3fb2a17c18174f1b8be002ecb12dc8872ec7e3f90a76d862e1096eb4968b3b217b846b3b5a855d2cd5629c2010cc9288277798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccdf4c046c49861f80dfd277caec1d8b
SHA193ea1fd173b1cd29970f979e299f2adbd809016a
SHA256d6c9a7a988e4c3d2c475bb278426bbad290c586c499ace508a5dfc23095b0c2e
SHA51225bb14dae81f176879d52f33f6d16ec5a648d9a7a3ce28e3c11eb5cf551b94f3486dacb9813c6c4df29f1b9067fa1c485169c6e4894119dda92f8c5e6dcabc59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e4b531e1d898a4ea555c6fcdd8368af
SHA10a2c80e719602b07c853b3bb4eba2b4770ca6491
SHA2561be3357a0562aceff044b718f58130539eafcd18b112aea6114d6c7feb568031
SHA512185420068a89ecac7381ebd3daa77476dd9d03f33d7b9aab80495766b420e6d6ba04fa866e1816739c9dcb53191bee58df4c98248948deed2c9dd0af5c3058ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD55958876778251ec8b90075029dcede05
SHA168f36a4cae55c0b5a36c845560b472c690b73cff
SHA25658eb6205a9ee4707b34dad258b26e2ee0eb61c7930fe194e61dd00aac09345fb
SHA512774f00fd6e64a56683b4e8ec08e57ba30f15e1188df091039e5700957b364fdc3050c4ea8ecb2a834748289e714b696ad03cf9581343e85a0b630686af151a9c
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a