Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 13:47
Static task
static1
Behavioral task
behavioral1
Sample
3a6b4fb8f6abda4c3f7db83346c3ac9c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3a6b4fb8f6abda4c3f7db83346c3ac9c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3a6b4fb8f6abda4c3f7db83346c3ac9c_JaffaCakes118.html
-
Size
17KB
-
MD5
3a6b4fb8f6abda4c3f7db83346c3ac9c
-
SHA1
9caafa3265344f221cea5028560282c8ca016d54
-
SHA256
0e2feb19e9245dc33a3321cf8c81ec200c21c85eeac846f628f2db4a620460ba
-
SHA512
2b22093ccd468c89e1677861923c0c5ee1776d74e91083245bf454cc6ce4130d9c2ea9bbd58b060c9223d8ceb9229bcffbb84a81851892b1912c6ac5ef516b53
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAI61JJrQ47Dzbhf6psJzUnjBhjNrf82qDB8:SIMd0I5nvHZsvBAxDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{260512B1-1066-11EF-9A09-E25BC60B6402} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421683507" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2656 iexplore.exe 2656 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2540 2656 iexplore.exe 28 PID 2656 wrote to memory of 2540 2656 iexplore.exe 28 PID 2656 wrote to memory of 2540 2656 iexplore.exe 28 PID 2656 wrote to memory of 2540 2656 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3a6b4fb8f6abda4c3f7db83346c3ac9c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5da55af9db7403d6f95fe645048735ff8
SHA1298b4b82328fbb840490b1c94e76734611372daf
SHA25621787740bd1ac7062fb988919a10ca8cee5575732a9b64d0517b6d84a0278348
SHA512e00ad823fea5ae6632304d1fb954e9ae7bd5c1327af84375d6d7bb74e0cc67a4933fa88e67de42551939253718df3650bec106ccc263895e9d6c664b976f96f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD543214223444e90af5a755a6628c9739b
SHA17f8aa8b1cc1fb30a6a6aec482aca665482383768
SHA256fa39fd515538a45644829bc9f5731737a32dd0a5e6d5a64ad96cc9114f14e454
SHA5123977717668153dc0e74d4a8e1fc472aff8a51492007e4418ada218f4f47c922506029364ed0e8562a2efe6419f633f9c5b7b75cbc32a986df1e599cf6afaa7b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bdde6fd9c74712976e3b4e9554e16443
SHA140e995330ffeddf7d3f03d2007fa30ea7cbc449b
SHA256a2964afd55f21e2ac35d2f52000480f759aec6ed849e0ea09d69effaec12d308
SHA51212b3161d9392b508aa33dd19748c53a0b5bd8296a24e4e9f93b3e2de233d013ff20f6b7e2e84e3c8b47b8e4e5cea63a2504cdb1108b4337cee060e6ebeb0466a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD598c0854f66d526e46c4f95e5fee6273b
SHA120512f83511da6daa87505ef0ef07076a5a266d7
SHA256d76704562e27e2965ea8f76fb299a56086f4964ff911cbfb79d5c8e22fb81e1b
SHA512a45d568611f9e82b797b04ba894934e8a5798386eb1e1ead13e2f5eec17edc4d120d571beebdc9c8134b3209c13f50830eac3caeb70dcc8860fbf4f612bc8cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dfef35e0fd5e02b5c2e5d4dd882961b9
SHA1abf00c9355d0ef0de9fe47b322db852b6c2feabc
SHA2566375fc902fe84cfb8203a26641d365ba50f76bab15102d0867c9a76a801c2217
SHA512da3af4ac49bd60f4e307b5101491deffdfae7fc37937953288d1ecf04dacf54b77e2bdcc5a5f2c886847edb97530fc65b4d83e67d6697ef63f73cbbd592d6588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dc0e9783c408c7208bbffcb090f49b58
SHA115d67fca199d76dce0da64344d8c61a31facd184
SHA256c900bc9df9d1520d68ae8e123e6f920e7567fb2b691eca3f9469e5be58a14a0c
SHA512ab43425bf7d62dd3f5a329bf3d7206903ca9c22b29f610387076c31b878699110b4901d36e00d7264dd326992b6049fb3479871588150caecec1eaa7b728e665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d7f00b356bf1f120f9fd9b2f589787f2
SHA195042f0938601022538e265a3e42b3f42f6e9aa2
SHA25632a9a961dc74683152830c54f3ed6336e7d9b8fb64b871da21afe8fc122abb16
SHA512e23a95062665ad7089f8427ce103cfe2b106e3a05f18e98ddc9de5881d2415ece5bbb3dc3b12667b64104baedb1bae863071dae4e6f62d6f08e3255ef474703c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5331544babd1f6d89c80e9e8286b10784
SHA192b55d30e9af330f1f27ff69a56b1297f3267f62
SHA25623a0b0729a44dc873f0252013503991db6ade7d1974f4f4d7e35fbfc7c05e88d
SHA5129b9227fc97074e077d4d9b995833274ea1e95ed34bf8be9974e0688db72da8cfbc2abcffeac26fbc34b168c8fb7d6ac46717e9bdfc2ac3edc974eeacbd2e708c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54ff42e6721b049719eebd8a96653adae
SHA10e475598856f593d82954b5b13dea979c3d2160e
SHA256ee06b2e7b932b33f13fff0c3b7fade415de98d45c345de3575a5e445259c5e06
SHA5127c4c259f7c709ab5234e073c81fcedb31e9d3a43c9adddc879b2c4908fb205d1f83d7ae09f9c8695f6b06927b33b83812600d531c6191c3712bab37a7398076b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a