Analysis
-
max time kernel
148s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
4ff1700a67b228cfcbf10b68059ef7c6_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4ff1700a67b228cfcbf10b68059ef7c6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4ff1700a67b228cfcbf10b68059ef7c6_JaffaCakes118.html
-
Size
17KB
-
MD5
4ff1700a67b228cfcbf10b68059ef7c6
-
SHA1
4c6da39595937d1d35c27030ade6cfe66035fac0
-
SHA256
1f65555bddf63ad1c3f6f30b7f6c88ad98ebc89c5131be2457bdee2b9d721031
-
SHA512
81824dd20ccdec80112538856614cc3664d412e66dac968130f637f61c9b1e3219f4a1b0c98e4a280b2f71bc579c4e72905285f0379a18d320179f8bea2e6391
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIC4YzUnjBhE+82qDB8:SIMd0I5nvH3svEtxDB8
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422117006" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{78306311-1457-11EF-A5E3-DA219DA76A91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2984 1924 iexplore.exe 28 PID 1924 wrote to memory of 2984 1924 iexplore.exe 28 PID 1924 wrote to memory of 2984 1924 iexplore.exe 28 PID 1924 wrote to memory of 2984 1924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4ff1700a67b228cfcbf10b68059ef7c6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f439859a793667e634898bba14a887a6
SHA17d0519df2a08c355d1ec781975ec81da65ecf09f
SHA2562953b190feadf1aaf7e52cd73ded8bde6d3acddaf63fb5caf56804599c13df26
SHA5123b9420b36c55303808eb8696d5698b7054cee4ca2f9a04fe5b953199dc091b677cbc66c5fd06fee37a2f1c3db57cd2c6ef8b57420792eb622910ba19eee9abc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5650fc3ddd1773fc496400db3f57d5a4c
SHA1d8179ec76ede5c6d4100a8d373eb3fc5f09e12a8
SHA2560fd2391512ad3930de5dd6d228351bf9807c76caebd95c7b0193183f7963233f
SHA512b0822031e5fffcd4a8d968ada821e55cad605a7dabdccebb32df70e5727b1308128fe600af63baf52a257dac4fb678d5d00177f57fbf8e0dc27382489cbe2272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5067458755b75cff53cc1f56875417187
SHA119b6ccee71f8821373a3a712c648ac287dbdafad
SHA25642efa3a9d82aab3fd5682cea38f7bb5b14a78dbafea883bd218f1f99519631aa
SHA512da7fed322df0d37a223426a16811dba50224ca563db1bef4e5680d4bd4a60893c87cd71ca7e31c7280635eb5b3196e3d968d0f9a66b9c654d323e77138e7868c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5c4c0edef319828aa9d38a849bd81d4
SHA12f3ec9ae4b336590a9015d66d09b484bbad7b1d1
SHA2565c2ba43da8150d38307349c582a53fec58a63048a6726814830552f44f0e0850
SHA512075b6952d078decf4f1102fc343a382ff9ad76dd9cb29fa91f24f603f2edea106ca2e3cb1339fa3f01595c79aa186ab5413d733ffcf706103810d60d5895e03d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5a0a70aceca8be9af24709c0e0ffd2f
SHA1f7fe9c56f45a2380cdcd79007b2a5befeb0b2129
SHA256873eab477694e446a1c59e2f02d43a570ab20798e5c35e65ae52507c20527e7d
SHA512b2bf1175591980787882102c8b959f3709e48b5515f48dc563b7ec9351cb13c44e6c7d3e8f61b2c28c870a20c80ff8cef6a98413a078ed146a2ec9f794f56f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b10b72a43ddd200a2a79e86d1faf4dc6
SHA129c3dd0c29b7856372e73729ee48491b91a49a24
SHA256633b92428e3993e9e887a44745b914e4cadfc9b69a5164e303489719c2ef406a
SHA51266a1fc2cd319a318695aabea183a37f9757b32b1c72b881901d0971173d0d976a775fce006bc93defd035f0503190dab6083f0a3976d7919d913fbb897f083cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5e748e9ccf76bc5730f84a1839e52c2
SHA12588e3fbff38b23e09f987b9446acaa981539e32
SHA256033e6384e561784da501455e70f8c152a35069a8b674feb60558aad65efecaae
SHA512f718cd810fb237a663d91246586e6dadd133a14a8902cb4e9ce03346f64d698a2994fda6ff9cafb0b96fef7d54690824ce56f9f839a3dedf25ef312e5ec78b9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533f820e8ed10e0967f80af2cd3c4412b
SHA1a0ecdad8352361c1ceefab7b4e85bd42dd8e176d
SHA256dffd6149a5e8b6a6b0ba44a733a977b41b80aca188564c8a6b2c177ed8ddf841
SHA51283efbdf1223b7d709552d2ee75f695f4ee9a97f6f5789babab629b60610be9732de7c58f00801a5131e4dea152883ebd8087342f39859b4940aada1b00489fef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba2c1afac7405457b2f0baa2a29b5322
SHA1d767920935fc082eded6df300041bdc4af45abc9
SHA25618ea29c43a031063b721025c9a1000e47bcbec7b55993c93a703ab591929e2aa
SHA5120eeced489eab0af7920cb3a5d6fc97f02b8cd375c340c0db323afc86fe3fc58f6208b649db079751fe09afce7c1b2ff54841d79f1141b5b1d65c896aec6ff68a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a