Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 08:22
Static task
static1
Behavioral task
behavioral1
Sample
3e8dda2f6a2d3703d4d8a908bc427de9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3e8dda2f6a2d3703d4d8a908bc427de9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3e8dda2f6a2d3703d4d8a908bc427de9_JaffaCakes118.html
-
Size
20KB
-
MD5
3e8dda2f6a2d3703d4d8a908bc427de9
-
SHA1
f58826829bbb6c407d65314f9814028a8b2e2d96
-
SHA256
e57c69b53a8e8ed75220df4f37860cd370278af4743f8980e7f5fca6adf8cf6d
-
SHA512
0c943e8de00209a15fb463bb18f6ee07f6d33a3c9b988ea6d15ab59e8ffda766189241e49ccb431f3d39d46e72ccabdfb3bbf8ce8dec5a442d675ba73b3f6326
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIO4GzUnjBhKs82qDB8:SIMd0I5nvH1svK/xDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0177DCB1-1102-11EF-89B4-66A5A0AB388F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421750448" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2964 iexplore.exe 2964 iexplore.exe 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2184 2964 iexplore.exe 28 PID 2964 wrote to memory of 2184 2964 iexplore.exe 28 PID 2964 wrote to memory of 2184 2964 iexplore.exe 28 PID 2964 wrote to memory of 2184 2964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e8dda2f6a2d3703d4d8a908bc427de9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5405a81008c43a908f52d216fbefc73a1
SHA1c0e265bc00aaf48158a060635881246583c436ad
SHA256bfa2ec89e49ec490b7cdfd7cb14d723c72639378a5f32acec604a10a69df588e
SHA5122808ecc34651f08607e727d4ea3d0b1261987f198ff7ee3e9afb57dc3ac8025f4cd68db75139e06064b4cc7de748d1ef93e147a89c0689da1b970781ca61ab1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584110e622fd924aa28cd0ad20c2552ba
SHA17a18418c49c61e239c819519a6ed67b8c3fd2039
SHA25641e4ce853f1cd805b70520e8c52969a26e8c6ddba9eb57ba39b4278e9f51d7d0
SHA512ed1b11fd848b22664f4210cbc09317388bfd8b55776e2f08d113f5624f24a103e05952f4e49aeb76f00526d17b253f9ed32e8cfbea9cee0609dd231372e7e52b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54588403e24a03d110e9d7a5a0f109c2c
SHA194dbc757e302f059854e5a22ebc887b3a6213a18
SHA256fec526e2228ff12e5d73949009610c696ee40c46d3f1f1f18b54be14038d27e6
SHA5128e55f628749bd702c1bb7d8e5c5edbe3c297165f3347e1a66ddc0babe92dc1816efa8d2b3c02c5acb3967b25f057c8e3c39adc0d896a814274396bf6102db4f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59895c74d02e5100b68c573c04b788a8a
SHA1c25141a756b1b51856a85c5d40c3c20b6bc709be
SHA256c20a026866755ab2aa885a982bcfa27f15e034c79b5081307971f70d82249f8c
SHA5126fe96cbfab4af743df76467f28345bcba62ff4bb8569aaafee7afc024cd9f195fb544c529398c14c1619f25df27b8c2078fb5aa520ea2e7d59a103e90117410b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54685630bf172d0e93336d643de78fe16
SHA1627ffbc3661ced2eb5973a4442bbb57e2304e1b7
SHA25694ff118981ea3c40e8e7ae8cb73f17d0a204acb798b751b5d1abe2553d6d4a02
SHA5129b753085ea574d3c1ce31e69af7c51fd09dbf168305f224938ace393a5657accce30be26909273902eb6344685c3bd0a08180e745177fda3eee6eed747c05ce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1e2a6cc0b692d8e8772aa2f12657bdf
SHA1821af0c6c77b862ac0300e755b4bd82965a72280
SHA256bd24c7ff0ba5366b2f2771f17546f0efb0ed66708bb79ad4104fcef8573fd72f
SHA512b1dbbcd5e2737f5aa05e7c81a6798812cbaa1e471ea4b40414d9ce99eee1264c0d879a77e78355dfd5c411a4bae6641d5e3b8abc103dcb57977ed34a2bc78d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e53698e00362db5966e207c0524c2960
SHA107c1f955fd1b5c7e84901ee15c5ae2975f6f6ab2
SHA256cba279e5978ab7d80243b04811e9528b937dd13bb52bf27ae2256718465107c7
SHA512b367b20b557ae7775082c82709b3e14467d6f56d98f6a4f620a1c5ef435d4133c6393461f23369d1681ba67128762106a45b0dc7c83df4c161d2814ea07475a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5726d48973009312ee5e1763bc79b4933
SHA159f64b379096912609e9a9648cf9602dc609d0c4
SHA256675a551ae1830bee4efd49a2782f4dce674a060ac6bf4fe99eb54476291efa28
SHA5120b55fd725c1adea9704de7b0909d367734835fe63ba625675418078c8aec0bbd8e1ab05cc8329bed9153c2c0809910bb70091bb49727e8108d67e8b2a8ac4172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d375e4b028ebe4cb8e8c2968e7d23c42
SHA1e1e14eedfb11e9d2e8dfea6b1b2ac9c81d1491a2
SHA256dbe6fdaac16669975a1979ff8f5857fd9196b00a6d07325531b3b11e5ed8b1e2
SHA512e9a0b9e1f7bb56951af3374b80b7c259a260d39482b7f04a987201978618323bf5605691db9b67d4f516668acc659258ab78ad6ad2554fcd87b8774aa9c801f1
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a