Analysis
-
max time kernel
119s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:21
Static task
static1
Behavioral task
behavioral1
Sample
688009b501b4fe91e6691ea1479cf933_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
688009b501b4fe91e6691ea1479cf933_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
688009b501b4fe91e6691ea1479cf933_JaffaCakes118.html
-
Size
2KB
-
MD5
688009b501b4fe91e6691ea1479cf933
-
SHA1
4e808f0d355df1798cf6cda0cb14bfe8031e61ce
-
SHA256
98f1b08799588a79efc801bf7d9fb823bba6a6e3d98e9f8133e359281ad866cc
-
SHA512
15d477dd78bda0147844c26588fc6658492b3734d42061eaa6cb479337ab841f514b7f59967a12bed2421ed6c68b858a445c7072e453e63c3a6f8f882974d514
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000436b1e8ac1b39b1170ba11ca16bb66ef9b63fffed09b2021e075ef0327b2865d000000000e8000000002000020000000dee8b4e95a90139ee1d88d9c4c6b1d250eabbe86cfe8960ab0f70f7044998cef20000000192b171dd1288c6fc44bc667a782bdf7438cba686498594f7835b6bd3a2dee0c4000000041157f6b242081cbc78ee8bbb8b7c143c466d5f61c2e6587f3fae6df55f320b4892be00f8586de55e820723c9567610162a002b5fcda340b3346c304e6447e7d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0fa20c285acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D48FC221-1878-11EF-A0CE-F6A29408B575} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422571143" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2944 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2944 iexplore.exe 2944 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2944 wrote to memory of 2824 2944 iexplore.exe IEXPLORE.EXE PID 2944 wrote to memory of 2824 2944 iexplore.exe IEXPLORE.EXE PID 2944 wrote to memory of 2824 2944 iexplore.exe IEXPLORE.EXE PID 2944 wrote to memory of 2824 2944 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\688009b501b4fe91e6691ea1479cf933_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2944 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50573ce8b350395d19c9aeda074ae9a8c
SHA1f0813ca9c514682b03d4a346658496dbbb1166f2
SHA2569e82c8f055db9247fa1e91dfff68616d8a0baf1ff7fd2df87e0c753188f9dfb1
SHA51260b5aa08db2369cb96fc5b0ad8f7636b6193a11968f21db246efee20e8662966dccae6610a7eea10743429fc3ba12e95302771bba566dd573721fbd70ab50f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1ad1acabb39ec48fe4c042ff7f72c0e
SHA1935f132986162b847398e282e24eaef83554294d
SHA25690265789a6fb3b37370a432661ffd555fdf8189b3fdf1cf8c58b9bb991dede3b
SHA51268d8b8c63c28c2690ef2a208c8ae6e019ba959e12fd55068ceeb6f93a4f40fd853bd73e2bc5bb3d59f26a039bd415d4475c6362a52ac7365f7d8f8067abc3c9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579b38e0fef771db47d4e69af64c95256
SHA1bb153a0bc868a81e3519271a8921fe651633734d
SHA25627ae17ecc438e84ed604c0cb3af0f5ccee7981c42cf67e511bd9c749d50b8f31
SHA51296b1cd1ecc6754b96b9b8a48f9832105c11b1acf0ccedef6f7a8d2ba7903b7c21d1406d5fac45055f69ad7f5b52fbd67a33fe1b6c93c8537c54b16de7eed20f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efa8c2545d1ddd41eeff805ac4536a3a
SHA1ed71a622165a258e61259298fde82d13d3a2c0cc
SHA2569ca54036b316dc63533f7ba666c0404e850a2e87316e30f2bb76487463a5fe27
SHA5121f8a01062677f749c8bd5798b4ff9f13c197a473ec44dd83f8f9f62c484f0ef791ba4281755c5a15ddb01b23c83684f4ccc714b2b06df48e327c116771fddac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518492d0e7d5f6db00a2292039f22cf3f
SHA14e86d7db7ffc0356ef81818bcbb742a6de14e863
SHA256eae017fed94c6424ad4121d20bcc34b20eea526dc3d769acecc699dcb36e0bd3
SHA5123088099e0acbbf88a2b7d43557a75a17be25abc498705bcd82e4a65acd0d9b9705b2a70acb07ee6539e4330e223a59a566b152106e8a78974d596acbbcc8b640
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a