Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 05:07
Static task
static1
Behavioral task
behavioral1
Sample
3869fc0b54b27a19455c2cd8316c5cc0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3869fc0b54b27a19455c2cd8316c5cc0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3869fc0b54b27a19455c2cd8316c5cc0_JaffaCakes118.html
-
Size
137KB
-
MD5
3869fc0b54b27a19455c2cd8316c5cc0
-
SHA1
6db75f1da8f14e40f523749a281360c32bf1a3bb
-
SHA256
2b19624edc2f025d090e55a27813916dca1bc14996764c8826be10526c5395b8
-
SHA512
e2129214115e2158b868ad7df0669755ea28654dabe38883e9a777341a32e7e430711787c0c66f9ee4a7019c3022b7d7740ad4d7364483a342bbc3392bcc8841
-
SSDEEP
1536:z9ZydlEbbA99YZHqRHHEExx66++IIddtt77bbSSSSccllbbFFDD998811qquuHHs:zqdlEbbA99YhV
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421652344" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{98113031-101D-11EF-9340-6EAD7206CC74} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2880 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2880 iexplore.exe 2880 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2760 2880 iexplore.exe 28 PID 2880 wrote to memory of 2760 2880 iexplore.exe 28 PID 2880 wrote to memory of 2760 2880 iexplore.exe 28 PID 2880 wrote to memory of 2760 2880 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3869fc0b54b27a19455c2cd8316c5cc0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561cfd5423f4a0db9042f29b8c7427701
SHA13d7780c3b98e9432bf5ed28c18fa1ad47658af35
SHA25605c04cd4371e8e17ef4a0d89c973d2b0bf243c61d97b0a3e4d70b4f82b424001
SHA51232669792122632612fd0893fffcce96331ff40f60fb829ab025db763c7c82f41cf7dea16e8427f4feb11721c0e31257c5024e434373f3f3e4644956fb84a905a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503559518e13e5f25e924a05a32da3124
SHA1255e4af0d505fcb80c2ceddf4871dfc8af5f3702
SHA2567e4846d462c29cf092f81d5670e9e5cf1860aa7afd3a803ac7ac60b76ced4cde
SHA512a6b9775f6a01e921d37fef53ba9a73f87537f158d8c8c79741e1365b51d2b4a595cac406a01ecf27ee280abcb5e9567923d6361f71f3c9815269e2bdc867977a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565d68ba1e833b7bdebec6515db2afdac
SHA15949b2dc07bed508424af65453b95654b55770c8
SHA2567f0509390fd91d85875b431b0c52c024b96bc2dd0a6bc9db3afc2e68cb589b59
SHA512c652023d9c8464e55349e9003502b6cd0973b1c1d10946acdd7d6f7176d75bfcea0e3cd46c992979357e353be712b9f4649db374a01c5c396c8e804ed1858bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c485943a80536830c36257e15fcf42d
SHA11f5cd7a069ff8ebeadda45657187d21393eabbf9
SHA2564f0b57fae5b83a7f876f260e4a68b5eb78ec5363bfd4c1612b7594cdc3b6181e
SHA5129cb2665a7a9818698c746d07664037591f573d092a28aceeea7e8c8dba8dd21b76f3a1bd0beffb6253c5f08d058b9f0d24f45b7b4b78bec8400efccb33bfced7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef132af5d88e9838a52d166c69dea137
SHA10987339dceeb5ff0ea1121288e9e75281cb68ad3
SHA2567eeb6b94a5855aae05da72837e95091f8198035e672fb284cd96cfbedc1c557f
SHA5128438fdedcce6d739d010ffcad8610a0046a0d35481f0689c79402102f20b1ebd99777d952888ee0943296723656e072a376cb13d29fa6215ef33a8b2baeb6805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562b5c487ab4ccb9ed6a6e3b1c3c03451
SHA1e1609064eb043918117cb76f51727cedcc68c950
SHA2562f42e42c24168e6e2074cbb7a6862dfb255e8b0acc1da766dfcbdcfef179fbb9
SHA51283945b9a1224f7e8b98cafd78423bfd6d8956640cb351ae50a4ffc1a07876f1a8de61d30e0da7aa824e0db32eb7dae93f6e2dde9d5252710041c06bdf781eeac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5850b41818d16631ff3d6d340b9d1f4e2
SHA1185c6d6be362dcae14d3a3b4f9ce626b655a97c3
SHA256c147beec6bbb46edbde951635fa69c86cca75dc2ec74239c6fcc65f0b937dff7
SHA51259dcb10abf0b5007593b459955e7066b0536624c4aa242473c0b566fbcf447553b8d893f0282f61f9552db6a49d42db08113ea234d8b4eed498b2a859bb0102f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c408f7cf4385c7f8e86448f8bb7b2b6
SHA1fa105914eef1c8d9d1a467be8769e321f79bff55
SHA2563deceb87112e46e2ed141d9a33a88b1b0772185d8aef80817b880126c63266c0
SHA5127fb6f57aae06699bcb73284b2d77baa02b0c867b21bb8019cc7855d70c2cfd79e07c861207cd7b070cdc83908bd5a79b49dbb737fa377bcc2c89a68858520ec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5680db4b3689d7a192dc1fd2ab871ff25
SHA1044ac827e1b7e254d11c937a459d0d611a9f9307
SHA2566d8946fab718a2860829ae449086cffb8c2655f68c1386be4c4a33aff249cc8e
SHA512e15f4585a87b7a146bd28132e2efee6b2f443e043b6bf9f2ff82405509f2735404079c5dbdca2613faeff407c1be9fa41fc42d1c3607163dcd0191de9066e45f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a