Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 17:40
Static task
static1
Behavioral task
behavioral1
Sample
4c476b93ac33d18c9f1d03f8035f5955_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4c476b93ac33d18c9f1d03f8035f5955_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4c476b93ac33d18c9f1d03f8035f5955_JaffaCakes118.html
-
Size
26KB
-
MD5
4c476b93ac33d18c9f1d03f8035f5955
-
SHA1
e6182efe5a765ae2a9e96b0d5ec11fa3fc1415b8
-
SHA256
1af57e656a0804f25214fd58127158146486efab4655685fe8316e25d705c4d8
-
SHA512
d227630d1819b4f3cc6993eab1d075cfb6acc93b4042fcb86cc17a9d8453bb1779e20fad2afeba8c1b064fcf74b4192a66b57a0f777dbd99675c9c8fd362d9cb
-
SSDEEP
192:/kP3DOVOmn8YIEx5uy/QeE4nthtKi+kclsWMZewOHrr+jX7D5GOv8ET0kFPQQcek:8P3q01AuaxByRQewo/+jrdGO15PRxzbk
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5974E0B1-13AB-11EF-BDA8-6EB0E89E4FD1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422043080" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2940 iexplore.exe 2940 iexplore.exe 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2968 2940 iexplore.exe 28 PID 2940 wrote to memory of 2968 2940 iexplore.exe 28 PID 2940 wrote to memory of 2968 2940 iexplore.exe 28 PID 2940 wrote to memory of 2968 2940 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4c476b93ac33d18c9f1d03f8035f5955_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2940 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d9bdf60a855e2a543fe0e454e9abcf0
SHA13ddddebac5556392f1d13bb07ffe7662c1722b54
SHA2566e7cbc9afffff8d7bc71fbc4e80895e6877fc2192cd138b18a5f683e5a25c15c
SHA512a4ff271ac7aecddafdb10d34ba00e81a7fd7332b0072465f1c4dd0f4841871bb522a825f4cf3dcc5e2d73226a1f4df9cd89ac0fd0fc8c3bbe67ffe64db928448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1dc9dacf90de8e62245208d9882e298
SHA1c81d0059edf8380a5f27908836a6e3e4d8e4a1c3
SHA256b255d038e7c5b63d04dda4d4d46a5338a97683ef2307299c3f1f8543c27feaf9
SHA51230382a11c81051e5090a7877680c1567c021789b39371e5e8d70ebc65581faf3836d2aa29b43399f162c0d8a632adc71f34867cfd295cb44e77918e157cf967d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6502b5310c79a555f8396ee5d96b61d
SHA123cdbd12243eae56223df0a2533cb180411601f0
SHA256ccdd0f7c71b79eece01b2429863b3b64002d2e7e142ee3eac29959e0d8e92000
SHA5123a0ac341447568811cd7442304e2c06f51e37512f7a43573c5400c0ce616d064bb8a258bdfa32251dc24d871074d8c9b283e8e64ba5ff69d2762d1224e32db2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d663b79ee763036a2381a5a4c8e964e0
SHA1c02d95040e175d1603236408911089ba62fd1c38
SHA2569ae4e2446eeaaa5a488e0011adc5570763755b9868de6e60d2bc29d4cd5567dd
SHA512367df67036c1717cf1577ae72cb01a7f8ec61dec040b002e951ab862f03f7cec1c6befec53aa6dab3c8de01dbb5c334d2ea370a6547858b9c45e47d065535c28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5455a033f9c2267c991e288b9e926e105
SHA1fadd9421e318eb2bf7a550ed70abe54f6f8b27d7
SHA256f0ec2dd13eab19dd7cc2bf522e37bca0ee02df001c4aa277e4e056b927e5e68d
SHA5120b1ef2d1942ff1ccb1fe0e3311deda21882a936c031f748e2adb1fefc7d4fd2f4266a377847069666167ce5eb09d1802e00ef4c593a667748cf0621cd6fb0d4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566a966011a009c81328c4840c148ed6c
SHA16bba6b58fd3c6dddf8b666aa3c372d40fc82e59f
SHA2564e9e8dd606aecb9e277be3c26ecb0fd113343485c0948ec8ab6018bba012fa36
SHA512ed79ed0958aa9bb001e78f9f4cdbb17069deb8b989dfb45dea51087afdd5cf947889b7dfa2f119d21e33fb61a0cb4215c59fae46b697f14a3b35abb4e8c63753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d71bcc97ab6bdafc1df834782e48609
SHA142aece49fae8c224d7ae274512614d119aff48cc
SHA256f176438654bee907506c929f1b7ba260ecaeeb7bed76017fb00a0c2a9f7d621a
SHA512b890276d6e15047a6f0f3a69797c9633e61d13dc894f7cabd10f1156dd8849d66220886bb4cc5429ead94d66e0f6b799d22afbf1fc5e6f1fd1f4f1d8fd13985d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddb51ea1763c67b7f089426e1864f253
SHA1cf7078d770815214462bcdacf7d79765d452bdac
SHA25613c58eb1bc2eccb5250d9f9d99e1ed5d3d21dc75b314e15bc1d3e4afb492c7f0
SHA51256b4bdb81428f27f1489d6cadb4bfa403fb364728d6503432d5c01db0c72d6454876259ff7eb5c1ed3b8190f67fe741eb9f46285e10f18dcc30e646dab62fb36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5843749ca9bc112c2aacdf98dd2a7fb
SHA16de2eb11ad0c199a29b0347cb751be9aaf8ddc36
SHA256e6f80462758820a35c90726ff0a5893f5b13850ec25f1b488340627538535b24
SHA512d30b81489b522fa100541ccadda05ff362272724e1e6ab1c6553afb66f712ed23fcd0ab02c49589683edf14b2fd195490636aa095ed8a8a73b4c2cbe4ad3b243
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d30c681e32a5dab3dacde6e3854e4e0
SHA10b35c60c7b3ad7aeed117b260d9dc11bbcb94d74
SHA256fc6b9dfc3e53849a118aff3cbfddf5aeee53356895ed1a2116bc27f92a51a7c1
SHA5123a1fb5fe2493c3927709d8eab348dd105b44b1e038c562f79f6e508ca383c94f0caa04172a6ae85a37f43eb0148c34cd9b472e6da11d13c21b3c45ff4e4fb1e5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a