Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:15
Static task
static1
Behavioral task
behavioral1
Sample
65d1b876c9e1879e484ad3c0671ccf45_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65d1b876c9e1879e484ad3c0671ccf45_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65d1b876c9e1879e484ad3c0671ccf45_JaffaCakes118.html
-
Size
242KB
-
MD5
65d1b876c9e1879e484ad3c0671ccf45
-
SHA1
a1e2cd108f1e33b0487bbd1b65b0251e7c6bea6c
-
SHA256
abefa589d72cbf05d31d4d770c5d26cfa175d0026c430dd5b171b0300dba7aa7
-
SHA512
3966258a9a1672fe9d308363a3386a87e578ac026853d99a14ba9b3701b7f880c8df227a8705ab657344def6a6c033640b976f35b5d7c2ea49aaf12a7782ee6b
-
SSDEEP
3072:S5zcGbICbISTcYB4GrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJY:SJz9VxLY7iAVLTBQJlY
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422509587" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{84B4D8B1-17E9-11EF-B1CF-5A791E92BC44} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2156 iexplore.exe 2156 iexplore.exe 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2156 wrote to memory of 2128 2156 iexplore.exe IEXPLORE.EXE PID 2156 wrote to memory of 2128 2156 iexplore.exe IEXPLORE.EXE PID 2156 wrote to memory of 2128 2156 iexplore.exe IEXPLORE.EXE PID 2156 wrote to memory of 2128 2156 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65d1b876c9e1879e484ad3c0671ccf45_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a9a13833bea0d4fbfa30ad7b4ccfe0f
SHA1c71880ba867989aa33c5136fa72becd95630f765
SHA256d5245ba8115bf06443371b628903d9422dadfeb31689b7dddec2856a9f60815f
SHA51233946d7d96256506fc07eb963dc34d2b469426d95e31c4b3aa0c7f09d890939fdb0d391ccd5e6e3a037b08dfcc30704dd16923ada6a8acc9b8b67648d08b6bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e59b10554bf5934353f82bd384251643
SHA118dce46330a9be1289366d805a1494bd02f7d06c
SHA25672e7585e80c6bbdb533d42b9bcf3b17c122e25437deb40384f49a00d276a9a3d
SHA512c85e341b8bb320d656b00451477956cd346b3017a1bc3576bf5e36e3bc91451ce08ab42e44d35982bd06f348c80090d971c0f4aeebb07d723fad1ed29bfe375a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2fddd61f3abc59ec44133ee995361c7
SHA120d0bfed6b0222b18b2bd251416027e34dd81e33
SHA25670508b8f304de40ff807cc8c5d5593461bcf5ff22d7ae142924891808485e862
SHA5126652ac9658c6523461fff325803f2784c20bdb27db8b456e6f93a9093e0fb2603e52ac0f603d6ed4c157512983462b9c44c1be9139c28ae9c8e2414db67826b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57876086e9751f404b08317b1b91893a7
SHA1fbf17b1ceb6206ba57fce7bfa5b2ab00c9e44975
SHA256f984d45b3884bda757228093de5ffcca77695574366e37412bf46abf9fa08091
SHA512a4b34765a8c2a45fa9268f59adc7af7a6296c7a1d07a56f4802a5cd3b9ef3058df6aef2a0493d3fdba08b0619e109b393c1e1d4279d24582d21fc005962dfcdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fe2b778796143fc9eb749beec419d97
SHA11073eb051b6d259d9e9c4d3b7ad9abc20b85be05
SHA256df6c4cb9238aaae1c77b5ee6f2189399364352ad1571dbca2724a160057a2c4d
SHA512126024a7aa0ba32a93c0b282977253290abcd580b7b4adf601ca8407e8ac9687b9a0fe8edc96b36452f616581ea5b116a1d4d9790c65b6a6ce3e13819864dbb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fd49ee6c934b3a875ed32fde49bdf6d
SHA1cd833002ba69a7d889e380fa4fd593f62d73d6de
SHA2566d21008e8384d5acc84e33474a68d76ba1b457962c6c5e2b34137307518f93c9
SHA512fbfc6dea1e297adb9d4ffead9b259f8bf64d2bb29526d171addc26e08fc72f3a53502dbce5aba9a39241c782421a7a99d10c28214136831b87b6673ed7cd6be9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57495cf3623fa01ee639d94eb7127bd55
SHA1303c85dddd316d00bcd25c42da0d2356d7377ece
SHA2562432f0ace70634c611443dba449968e733b659e08c69060727fd00f148dc68df
SHA5129364960b6deeedea07e379dc17a90dd1fa2ec352e27f1cbfb8cd62981c144a102950a97d20ef7f6d29a42ee5f5979300abcfc13cd513f4bb51e7d4509462ddd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e75b688ea4e76fbd68d6891f48b08c9d
SHA17a26bc557afef385acf07384692c907fb50e070e
SHA25619b81cc39abaaddbdbf77d8af464d633639b9334b424f16283359a1be46e9872
SHA5127527ea46e96fa2f84800f7dd2ec464b9844eb2ee517a1f95ac282b1378f5395a5fc1f6c00f21eb78c053cec17550f96273a2ed21904fb7a0d8e3bf97db269c0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d2a17ffcb40fa567545aabbad986889
SHA17d2673dbc4f96fa4ac7e221f9ea9f0ba44fdf7b6
SHA2562cf315828b0513f84b9c7d14629420dd32461588402731b8ded3630ea76789cb
SHA512daa0def4a5352dbca36420a3ae0570aae1ff4346cb88141590654ad16fea19d60363bac9ac2472d86ae037505561c3c8e370d9ecb333e04bf1c24de01ad85052
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\c[1].js
Filesize46KB
MD5c88d219b745a0a50d0059022638b027d
SHA12dcebc14d9c4d81049d3de5269688846cceb3c44
SHA2561f8480f8def1083ed6ece9ae35b61015e265363797e21687571f88287124a7c0
SHA512ccf6a3cc8a2bdd6d8b9fe4e4dc325fbe5fd46f10508630f125b3bd679b19f71c460ae51ff8336e84700743dc832ce6e521d17d4c0c6db58b7da42bea74f0f9e9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a