Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 18:44
Static task
static1
Behavioral task
behavioral1
Sample
478603b7755249ab0b0162616dfc2683_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
478603b7755249ab0b0162616dfc2683_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
478603b7755249ab0b0162616dfc2683_JaffaCakes118.html
-
Size
36KB
-
MD5
478603b7755249ab0b0162616dfc2683
-
SHA1
cb5c07caa4ba36587185b93aeb49f3e93c94a1be
-
SHA256
4d23d2eac2202d6c32f3d51172f5c43e686785382239d9ab70d4cfefcb9e108f
-
SHA512
6e320ac721a77e3c91282aa834cacd6a704fa107fbb8d4ed4abcc3cae8f411d1428a7c946c94f241dda0a0ad83ca5328edcf8198163fd04525289c8cdec7d08a
-
SSDEEP
768:4FRbt1b/4lb2vbgJsha/T9b6Ny96eNoGey01JY4JHYAX2V4jdP:4FRjT4lS0JshaJ2Ny96eN2oSZGqBP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421960563" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{38EDECD1-12EB-11EF-A1A5-568B85A61596} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 1560 IEXPLORE.EXE 1560 IEXPLORE.EXE 1560 IEXPLORE.EXE 1560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1560 1952 iexplore.exe 28 PID 1952 wrote to memory of 1560 1952 iexplore.exe 28 PID 1952 wrote to memory of 1560 1952 iexplore.exe 28 PID 1952 wrote to memory of 1560 1952 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\478603b7755249ab0b0162616dfc2683_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d05b23b00515aa11bc3b8a9c24023766
SHA14d9ef608a80363e9b8535befec09216471662bc2
SHA256706cea437184fad6285cd2a2408e73f794bc79e835072357f42d46619cda180c
SHA51236cf13075ed036889fcd3b63080fd9f3641db900d0ffa8c91e9e0be501adac3af0ca91401da556a31d07d3fb27df224d84cc0b23c5ac1f9de7afaa2d2de88b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51738475ab780762083e5717e1ed2214c
SHA19c8bdf6d35a91b518b67a4621a1323d22f47ef95
SHA25699f49a49e5edb02ee80f182ba2f98aab7075cf4b85c7a781e96f7cf900edb1ef
SHA512bbdfe053b0ecf9d6fb15b932b0f31e114db57fad3f6db931fe55e11d5915c35c69575dd75906179307b2e4b6c84cb8ffa8f7c7185461980c25b53fef5701ba09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507af51a5c4002a70c49dc13f4003a066
SHA10c314c20984d3a404d11167ee3b699af43e73487
SHA256b29daa147206004d4fdbb04091f6b38b19544a7ed5d0f6c1ba2f900e71af1cde
SHA512aa51fe3216faf61a633c5e9021ebb157ceae76a8b34c4293cc5017e72d68e034991585873aa99953bd16d342a635d6751c3a060699f5676f532cff5449817c97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f2d60007463d43a2548514a0170f99d
SHA1b8dabbb41dacafba7879cccfc1b933bc5ce28f41
SHA25679dcb5a8fa4d58b392b7215083012d701aaf95704a74c92015e98dbe9bb13086
SHA512683b8cac551f40928978c7707082e20b1c8e78f56b6098a2db2ca957ebb8d8c3336b8c75af8bc3abd8ef6ffe5feb46d56554eb9096ca4dd375670b3797eabd2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5caaf154322fdb6381ec371d8307cf00d
SHA115c66543b4b4451a579fd8a7038165af1f5e8105
SHA256fb537b0917b658fc82ea92ce13d589456ea9bd941b6c0fbf49b4773fc8e30157
SHA5123848d236285419c03030cef8065593265ef7da25ec9291a864659b51cbffb88c24df79fbe3522ec1c32e1881c43b0f39f58968b54ce954c170d8f43c8f7685c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d390603f70d2ad0e2723fc106eef1a85
SHA1714ff5f739ade85a87487494abb6ec5dc5377fc2
SHA2560a184f938561df312573d81ee0a094a221c8a546db05866e3811b0871a393e46
SHA512a95421fdfe666c78dccd06fcc61c57a8880947a8f86da7cc8d3dcc16940eddbe192303d3ffff82e58834ea645a2dfa0b4f32aa4a05d7b96c8a73c7c95e2e2a24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56853c7dc6f664d6dc0947dc20f6192be
SHA1abbfa93faa28157b8b37036f6be72aa22744dc06
SHA256f1f60ee908e6dd22e1c4de75dc0ee0b59422cb2f1e8790b36c555f8723fadf64
SHA512f1a4122981228a51948c02d859bc628a6f5039a3432adcd7c8dc094192e691fb1d1ee0efd3a763b18303a7776b83241e2c101317f915fa24543b8d050538b8ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50891caa43676c54b07f109de187d2d4a
SHA1592185b79daaa715db4a9370e5429101384c4e00
SHA256bfb359ec3f749eb1a7292a545f1f7d9dadb17bb8ff42c5f400406965186701a5
SHA512b2566d17dabdb0bf3df605716833aa1ce5d0468a222c4e611a48fd50db7a3c9087c8b39ac9b71f543d499b98b6e7a1fca920816b66a6f3e634c1e4c7401404ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d635c06629fd6c10ecd19758243da39e
SHA1c09d454fa94cf36d7ca808f8581a1cf3991bcc35
SHA256ef3da6871426bad2f58df9333ea4f962d203afeedf594c2b26fcd783996fb9f7
SHA5120d6534d7845de651ddf2d404616037c779bd71ebf8f18d7280b5653e71ad7f934b6ed8bc2a92b91998228255fc28d2375bb216642f81dbbc4b0a133095a39a07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5766e215130d4199861d2ab2dcb07332c
SHA16f4ef65f7c111afdc08ea4b18bbb7fc5e0900757
SHA256975f2e9979881a128650eaddf3e2f150ceba4b759925238d218359d76985cfc3
SHA5128e646da2311af1e3eab9907a17def09978926b1fed5b7f45403172ffdc59cf056f7edc5f373cb19a3fef0702f11bdd11e98952113a7a0ac77a6fc487792f0eaf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a