Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 05:48
Static task
static1
Behavioral task
behavioral1
Sample
330802507c08bbdb949a95af3965a5b5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
330802507c08bbdb949a95af3965a5b5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
330802507c08bbdb949a95af3965a5b5_JaffaCakes118.html
-
Size
154KB
-
MD5
330802507c08bbdb949a95af3965a5b5
-
SHA1
6e958ced492769b3f3c4ef0e7e224462db731c33
-
SHA256
18044c9bbb3c155a0ef5164301974b3bdfbbb195388370ea07338595e9cb61d1
-
SHA512
a4f72f0781ad559f37e2e37e46fab7e7cc3cba3d10dc62369fa35cd77979ebbcad12ba204345e5e19a47856e3e67cb25443d0f12b962a0addf4850fdda4ae534
-
SSDEEP
1536:E12R43mYMUmgtxDvJfak7Ym4mtlWmj1ZmkmulBmu0c2fO:cmYMUm8xDhyaYm4mmmj1ZmkmulBmuBR
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421568363" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0D19AB11-0F5A-11EF-8E23-7EEA931DE775} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2800 2872 iexplore.exe 28 PID 2872 wrote to memory of 2800 2872 iexplore.exe 28 PID 2872 wrote to memory of 2800 2872 iexplore.exe 28 PID 2872 wrote to memory of 2800 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\330802507c08bbdb949a95af3965a5b5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c85bb1c5f7a00c4a3a66f961a0a6a039
SHA1e08a786128f7677f00fd4792720cb726a2ac5550
SHA256246033cc4c506b945f04cde728484224073590a9003a67d52658075f230749ee
SHA512e3e6df309c772af348dfb81cabbe153fb5e53273efac90d5b123b436e2fdefdab0f03ae9510b16e0a0694d34c6a14e73234b235a50cf62d029992bd7f2ade076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513557742900eebb166edecc6be2d74aa
SHA105e384f1bcc89b8b574874162360d455fc724824
SHA256d5295f93fa26374250cdd8fbb1dc452494145eb9599d3534c993c9e27b495f80
SHA51228cc63e40b56afa9a64585bc99e1bde9fba56ef911e882b4b20dc7407e766482b4aa4aa3f3c39c14230638b216019202d68d3e4c547d774ac689b1d78310805e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56712046e4ff4549a216b5e224d523d34
SHA1dd88e848906981a2c3390af8223e5648883e447b
SHA2563399d7630906576ffe72947557a7654f2bebf5cb42c92a8732e1fbb362d723ec
SHA512c2e324a3fa554aba0193072978277fef34fa0d71761db8a08c0e8ce19ffc4cb0bae17ee46b13ddfb3c5b3870b2d20fbdb36d4d3ecbd149f205f99a140aea2a8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513b5c04e81dd3a5b6b181260490ab2d5
SHA11429c70c1896f80b5c6d4c56f6d7d007acf31720
SHA256badc3249242b9ec445534fdd00f788046d90bf3edf9ceed74e1ad2cf219e4c05
SHA512d5b4f48bf6a1afc8a95b49224def62b52dfd751f561f8bf4f47dd8e802ca896aaf248b5ab16efd9f03b6158aed41160993df7859a3c6058694227f2d539cd00d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f65d9024b093f5cc2dda808c89573c13
SHA1f6c1012bcb80a2fb0c7a3d74158f217128942ba8
SHA2565a458b8880e5d033e10050763b529631205aa1bc29c4614c5f7596bf06918202
SHA51299164584cbaeb7b04358e079cbb6aaaa120484df0c867ef037c5045f303d1c10aeaa408eb73a9d790ccb6c91de6f3276cd658219c8b06a4fc8177a045f01fab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dba55fc2f4ad8edade8aae1f9984b21
SHA104af3166872fbfabf73e34dad4fc10c62f5d1663
SHA256ea29819aebe1d09efec23e0e64d21d1ebf7d2f4b6829d25d9fc91da5094bda4f
SHA5126ab981a956327129b00c06d4ff7a8140c10cf5291b02e215a5f5525b5fbeebb72072e9b9b5090f05131c42edd17803aa1be0e79bbb95918ccda611dee29e4812
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a