Analysis
-
max time kernel
148s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:05
Static task
static1
Behavioral task
behavioral1
Sample
65cb4c2c45bd886825d8b62a0f7260c3_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65cb4c2c45bd886825d8b62a0f7260c3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65cb4c2c45bd886825d8b62a0f7260c3_JaffaCakes118.html
-
Size
18KB
-
MD5
65cb4c2c45bd886825d8b62a0f7260c3
-
SHA1
0561e0887344e00dcf3ea43703904364dca76609
-
SHA256
430d32a7bd89ba7e6e8b5c6bb5896b5abaeb10c41255773b0f265967d660155e
-
SHA512
6af1cb0532d69b5a19902b9be75d6931f6f84ef84644dbde7c1dc3509fcbee76a72cf7d611a5d48f0c4c36025ef4e2ca6243635718ba46c0938d320c22141383
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAId4zzUnjBh9X82qDB8:SIMd0I5nvHdsv9sxDB8
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{204BAA81-17E8-11EF-B27D-6A387CD8C53E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422508988" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2716 iexplore.exe 2716 iexplore.exe 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2716 wrote to memory of 1940 2716 iexplore.exe IEXPLORE.EXE PID 2716 wrote to memory of 1940 2716 iexplore.exe IEXPLORE.EXE PID 2716 wrote to memory of 1940 2716 iexplore.exe IEXPLORE.EXE PID 2716 wrote to memory of 1940 2716 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65cb4c2c45bd886825d8b62a0f7260c3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5190848412de27d049168279928c87abf
SHA175d404a6987e6b70f631c8b3e63cf11f1ecbd56f
SHA2561f1a7592beac6e3740ec2ec40a153a3f54106207d1568f7cf5046cfd548cb727
SHA512b9bcf6d2d0b99ca6a3df041fcbfb6ff8082cd127c680f647c4132861fba275d064c5f73264893c483925caea49192da0a245485688b3aa6d2695fb76014ee212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3202f82c324855d6488a15bec01456e
SHA1fb372b0e8b544128a570cdc5168a5ef6e37029cd
SHA256c9930059498db678f1e1018d76965d14061084fc9ae2bbbcdf7def9aeda09373
SHA512282860ddc9f19f2093c5f6cf135e561def846160b5bf906ebb385eb4d4d94763ccf3487dd303cc31a4285ed503862aad93c02459742c97762500b51067644575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5750246c4552a3e3b5e2ec4b3c72290e3
SHA10fcc3babc44cc3955fb3c6874d0c267626ecf9d5
SHA2563a181a322e7a28231a93b47eb22137af28ea254dea29b63501cdf4e4344d7311
SHA512ff2e1d45918fd14e84b265cd2e625f35ac4dea2b2da7bf5756581d0658cac6759d3d10f6906d1e3774fe1ea778e86fe51a886d5e6e6cc7e2c4079534288b51f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591bf41a2466d23c9d7edcd59001755d9
SHA1d9dca05d96f973b1201e0ca3ac5685fc33c41fa2
SHA256407407703eb915a23d82659c2af0e7856fa81d50ad71997d08d6ded44da95f44
SHA512c4515c9523889f138e4ef36146f65e373333ef00e8445f189bbfa881198b7e3215c3ed8ef0f927876f3d88d9b0906096e9d0fa2ca714220ee1af832e504be623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4976334a32d6f50bd593c11af8f8058
SHA137404c6aa9d3a7474a3aa45f9aca7eb875599812
SHA25657b0eca6e13194a4a74e39a9b1677b73754b587575df24f29a14a5f76d8a27df
SHA5121b04c51c34679cf43d5884d6cade833f2d4dfb0e4a48e07114627aa22cd2317475557ba20916111a049a2e8abcdc4e958fadd1ba2731ee77681bc491e6c7dd13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ad712920724d046d4d309e4cb213d10
SHA10e3b6d1b8f7365636f137c1ba6a76b9ada37a7f2
SHA25677775b25988b4238314fe19c3b4f202d016009a5fb39417f5cfa5e4a29487a4b
SHA5122935e479a743406a04626fd4f79e2028ac7bba6a5d11df2b01fbeeefdf57f89d5a7e5806d23d92726cea1c4675530a993974aef11cf802270a301793aae52097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546429cacf4dd81007ab9ab9dfd2cffee
SHA126978d7a46963739ca2fdd6c811390a00157b704
SHA256d8bb48afc6f18ada3b13ee0f98b46cc1fc1db84bdc52233fe0f2b6f53af428ec
SHA5123c04fd7dd09c8b3265966e768f33ae649e7160ffdb9681c4f71d19cb33eafd2efc54c5324cf83e3ade373b476e55d0112cb76d2e8223823eb7dd83683e15fe62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577a6e6f18fa1a85f0f5ef1f832a80ca9
SHA16ae46bae76d1edad4c8fc6960ea32f9abd0037d2
SHA256221d784d9429512a9d5f73dd4b408c08b6b033215afa0e5c7457ca49be002719
SHA512ca38178f51b1a4a48651ae10e6a56f5af1f439d2e20c4fdd2e0d007f93aea9437ee61264f399b670122cec46b0e7a560592db4566143e4ff42963f4b9488fee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5251f3413a7e617d4e6caeb49ffc9b1a7
SHA1dfc7d195f44f3ad78430228936211471f1d138d1
SHA256d1192373416eeff4340733501942c5939d67490258e316bc42155eb34f836afa
SHA51263cc9a2311f8b7ec7387b93872bf01505b94e0da8b119849ee89fff8fa43aed70f5f6906368702dca1b65bb2386a99712e296d31b2e4ceed93504e37c8d7f515
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a