Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 23:14
Static task
static1
Behavioral task
behavioral1
Sample
4380de0cc8ab53e0bd0b0986be5174a9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4380de0cc8ab53e0bd0b0986be5174a9_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
4380de0cc8ab53e0bd0b0986be5174a9_JaffaCakes118.html
-
Size
258KB
-
MD5
4380de0cc8ab53e0bd0b0986be5174a9
-
SHA1
d8db0c138e084d91a8db50e7ed5fb3be9f048cb5
-
SHA256
dd11398ec480e748a62017c88541cf4dc32bfdb505714585c842e89334fcd471
-
SHA512
f3a9a9f20acdcea80b0dbc05da2f456f8114252aaf56f7ed483216ed0dc5a5f203dd7501884d1356a4d5098ac7840b81f19a8b1e538dab0743eacab3d9082f15
-
SSDEEP
3072:loHUTlC7AR7rhB9CyHxX7Be7iAvtLPbAwuBNKifXTJ/:aUTlxPz9VxLY7iAVLTBQJl/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421890333" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B3FF26E1-1247-11EF-8859-DE62917EBCA6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2508 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2508 iexplore.exe 2508 iexplore.exe 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2900 2508 iexplore.exe 28 PID 2508 wrote to memory of 2900 2508 iexplore.exe 28 PID 2508 wrote to memory of 2900 2508 iexplore.exe 28 PID 2508 wrote to memory of 2900 2508 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4380de0cc8ab53e0bd0b0986be5174a9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2508 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_786387CC77858B88BA3234B304062475
Filesize500B
MD54ade9ca0b2006c972249e019dcfe6136
SHA1b1352413d781e94fb91eb6eaeb63e9649f77fbf9
SHA25606a595cb894c665eb128ceb23e833ac49c450241cab7dc62ae39054d95c36492
SHA5128aba9b6dedf98ffdb82e1506c6113badc4977392d85696cbfd02db33b04fd37f77b0826f0bf66d7056f91bd4fa79aa1ed2f5990f5e581d3dcbe066750c9aaa1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD560fd05f3d806051c64c465f73632c6eb
SHA187e893039515f1b82e9c02f267fbfcd4552537bc
SHA256651aac8951f00e3e7b9587fbef592f66c33d5b06684ac9806da45e3dcce969bb
SHA512fd6de479323cca5c9eaf8f8de95fed712b06fba96f3b6be110fbf03f3712dc953e79f3469dd2caac4a7dce698eb3c97f090b174a6427bd3d786cc17218732269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9faa9d9696ca83150b47de1a9053fd6
SHA1a71fcbb8721d02ea52cbe96949d07a4ba3e609cd
SHA256ce113f60fcc3611d42d924f580cee455e0a38daea01907c216dd790229875d00
SHA51240db686dd18065a46b4505d591107d0f95da673795f2c1ebe7416ecff434f7bd27d012fbbe2b1542b3824387df7a7b79fce4211ab3ee1a4f1b905f4a7ae51494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aaa8f6ef2195acefb82d736266ce630a
SHA18d54677839b0e6690e65955d0951d9c740200bbe
SHA256317fe0ddd176d05c35277393fff9b93aa55862226eb56cdb4c97b2bb7efa9cda
SHA51228596e14c217dacd1fd6576e86c35b2b2b9f23954872629216bc77babf35c1351e1fd9e31b597680afbaa2a7b148db977d70c39da2e9b2f912a438ea73b144ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b0e3caa8437418c8a288cdb06a12cb2
SHA1fbdef7e0d80607376ab6791d6e1b0d75f9d74474
SHA256e963586914a869531774f494d2488cd6d2d190db036e03df8740e8af0100a06e
SHA51260b50dbf5b2b87baf4e6b7ae3e1a0b30a134fca08193538a172e7733749e42acc81f3caad29d890fe242ed424d014e8462987c9f559e9b27264549dd7543f267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566f4004e0bc0461f878e421cd4178ba2
SHA1732bc0246b676ae1e765cab7bc15a6160911fcdf
SHA2563fb327cc5c8f4bb865c3894598e60723f2990685ba52eda17eeb18f9054b700b
SHA512449b87435a5684c6b812088bd56e7f151c51d8017a002714b49fe6d9463106ad606b6f1fcb4088cee99adf7547cd75b2c7ff43c2212e4888c2f8fc5e7ef3abe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541ef0a74796b0bc67f2eff80a2d56652
SHA107db8fa7af58c4ebdafb248255fb8580e9412743
SHA2566146668a2fa2b14e8b5dd6b18d3105a71f89572b9a28e5f188254f606604a9c3
SHA51210438ba13d11fecf451714201defed1016cd023b4e44966663d6d26f46de991cc1bb53f87dcab13cd75606c25ab6cd189800ffa54cd5a4eb809685c42dbcaac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580e6ee1dff6f1652caef534cc93c5e19
SHA1ea014dc80ea9a09e9b77167839b383adeba9bfc4
SHA2561d2d60ebe04bf5e9c4882836bf362878846c3025712442910e6e66996f5e66a6
SHA512268653be6fcc66e3badd76129e6b5aba43eb92c98baab7e303459dd98e7c1ad7ce834937b888392bec4f013ce8b59553cc46d72b14a6449d2fdc0c17c0eaab14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5feb48d20366ecf2d7bb6c4e957af0100
SHA145f712e5dc9bca3c17e0ca63c0c8a5d901764aff
SHA256f430e8a49a71191730db6be937e71325f1a4d4c8aecb3dffc01593759f6acd8a
SHA51280c894c9b0b8bc37e91f19170057f2a18614c3d4da68130d0f73c309d2f50716b434c5d54e803355799d894acdf50bb0510ac8c025b8ab3631ebf2954d9e2ce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5263e517db4137cc05931b55a561d5063
SHA140edcf6a6653da4ba09f6e2af2ebd6de1081c149
SHA25623c8e2a64155bbf943d9ce1a2f1773d511245309b62ddaa6ebcaa40d3942d0db
SHA5125e7691d26c0c1d5a1af6b8e87bd685b0b4d05e21760a8207d948195ef9a801c5746c910c9989d7b26fe3a5509822ffadbda5eb58a6581868fc833306e4be2d26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c2959714659899b954435baeaf4eca4
SHA19c751ee26a03e675b33bb699d3c3298e4acfc6c3
SHA256772afabbefa18efe96146481c19541daa630474890ddff496ce65b70c074d71e
SHA51232497d23b3b47bd5afb8b77e69cea02c3499e2ff3f0c28d1524554cedcf4ca32b918b2bbd41e81bf2ed182ded584b443de8055c0da7f924298595831cf818735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525bf0844035a9b9932608d605b2a89eb
SHA1fafebd54cd40b08818bea97b1ed3a1fc0c3b9f64
SHA256c99711ae7cd61a520ae52fc63bd22782086ae69c980a81fec0cfcc2bed6dfb84
SHA512f713b6fc0bfe45b54bed6f6c075fdda78efff9ae3728a451d8d4cc512f793f2919551583a4eb0b5047e4db3b7a321a49c9ea99915001c01a8daaec21212f6b64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab470c901f145f4ade190aa27c604db7
SHA18ee24c70c7216df5c27e9deaf72ce9c5f0bb5e69
SHA256e17f3ead0a2e2dc826c693214cfbd823d8e3ad72346051c8592f43bf2e08e827
SHA51278508a31ec3816788618dd766ea0308c703df96fa8308bb2399d38c870adc51cb79dfab95a5d66c907844f972a515cb16df31e587a3b505fa37dc6f3c9ef3df2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5799f0fb4fd1915f89925bd1f8bb6d7e7
SHA122e33440a8d415693e9cb072fab43d365271c637
SHA25685583e9bd538a53b82132bd1f868c6ed8e347b6ecdd94d4410b4dfc48444275d
SHA51223f3b4358f82390ce4aaa285cb9d5db452f0a0e6e9c48069de1c7df8b57e9e36b6e327deca38a23e7309f9fce12357a3f4bbfe4043fe960bce00c055b70c7760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5575b82b4ebf01a64dac4c744eef64858
SHA12783677b197492ee5b17c8ef3deac671d6c3aea6
SHA256daeddb45bc15fa5b45e8c76bd876d6639071104758db1030010743760993cf7b
SHA512efc23a2fa326d716d518f859c1ef51808df6294d70ee39b811cfefa482effec1cc726690068eeb77ec48bfd74e529d2e264c6b722d6747c7d77eb4152f5527ca
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a