Analysis
-
max time kernel
49s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 19:49
Static task
static1
Behavioral task
behavioral1
Sample
6868710033d687ca732fe48d507058ac_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6868710033d687ca732fe48d507058ac_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6868710033d687ca732fe48d507058ac_JaffaCakes118.html
-
Size
974B
-
MD5
6868710033d687ca732fe48d507058ac
-
SHA1
48397e1ee7c1380428461497f19f666da949cda7
-
SHA256
41ec59b9a87587888d98239753e1209627996d335d601fb242e5b118ba77f4fc
-
SHA512
82c00ff92e0386ca42a6d22b3cc04c8cca2bfd20270202baf4d79d12595c0b6f620becd75e5ec382a559b210cf25b3fad2a934f62332725c951db770c03ee933
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7235CC41-1874-11EF-92E0-EA483E0BCDAF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2216 iexplore.exe 2216 iexplore.exe 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2216 wrote to memory of 2576 2216 iexplore.exe IEXPLORE.EXE PID 2216 wrote to memory of 2576 2216 iexplore.exe IEXPLORE.EXE PID 2216 wrote to memory of 2576 2216 iexplore.exe IEXPLORE.EXE PID 2216 wrote to memory of 2576 2216 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6868710033d687ca732fe48d507058ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5376b8ff8306f7a525f00226e9e830d6f
SHA1217e550e3b3b24e1ee63b72ae74f29f38d7477b2
SHA2569ea53cd2ea0398c071f1efdad216a606f77cc9f1745d6ba731ee3f3f6f24ba73
SHA51235355b7ddaa549d5933c7ba6dffaffa0c475469b49a94c4125e957a43b039bc81c18e93366df836c2b9f3e9cd95f711383fa3eee5bb7de1825873766f84245cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592916d4e2f43bbde7115e0d26c3037bb
SHA12e8fab92ac2c75d6c81d2f8d7499ee53e0b963b5
SHA2565d3b32b2a8dd4d1feaee8d40a072536ad938211d6ece2a21a9ad2922d4a9e22f
SHA512c53d948737db8d67eb0996ded4838897b55f9254b5e6556ecdd6d19f9cb0625cf40152c156a2f8eb7064171f00c8ee97046a5b0d1755d00e15301a847510c957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b8ecf6e8b16cada2e9ac2c35b5d6b5d
SHA1abef89438efb7bff92ca1d99061d003582e44c47
SHA256ae286ce0e7e48e0b9aafb5b3ab0a05057e89fac061a3438edd70f7a05f7c2702
SHA512ee21ef1c0f3267856a7f59997a8a705ea57494f6a216d26845e1fc1fdd5c6af62be5ef86a8d8932a1212db0fdff0859e3c73cb26e84e360f7a5e641c3d508271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e854c43be53e7adfe35bebba61b1f9e
SHA158dce7b9b11a2e774e1ab7b114e6d296ad296b73
SHA2568a3ff47ca8eaef6fe99b9ef12ba1b18e514e98079c22e5ef2d203010d342e8c3
SHA5125c2ea6d2f30ccb0fbfd248bbc0b1bc0ee25e7442f45d91f680201113b07d72d40fe6af134bf49725aeee45b23576e2ee34f3978ac2b32d789c25d7ede35efe0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56966376e84b33fd25b8a15aa11240f47
SHA1f80bea8b0dba91faa2123174269fe47961e454df
SHA25630bcfd0692f7ce43eed9d1ee138624b1791addc7f13129503e45e416fc6669a0
SHA51269617f6ec3358197d36655923e06079d911c11936bcae8cd46172de791a7297893ede7a207274aad86412524d55509791d318214ea9a9280ee76615510e10e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531298af63cbc8bfcdc3c9592410cb63b
SHA1ecb2e7bcdfa2980e009d8dae669544aec359133f
SHA2562bbaf0ef1e3b60b011b48c01d9b9dd46aa1191e5ac928912c8715a6af714cd7a
SHA5121cb7746056f05d04dbe174b1fdf6ef69515c5b185c931e386d287522ec6084fb57148218ce95b6bb553f43466527e0023c10b673bff72cda207aa2beb7765487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7e0edbb0deca942feef578e9ebd48e9
SHA1beb8a52d12850ad87deedfa3d36e879297e20bd2
SHA256aaeba1222c3bdd8f3a379056cd9a5ffa8dd74734d2e52fe14ab486852584ca64
SHA5125596b320460eebb8ecb917aa907e269ebd5d903f475092d3865463fc7251bf940c02ee97583222d05045cfa18242fcd580692b62e3b25de91c6f346cc26b0021
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599e1d5f42323e1065db411221debfd80
SHA1bf883cd4e010597916305f7d1d4edb8b5ee1e1c9
SHA2564fbc361c465b58359e72c1c37a27dc19f7772fd43f5b341340fca98df48aea76
SHA512fb524af229bf3bcbea22f418b3a192311aee768ce9022be462d74df34286a2f76d3d139fa3a11178366964c66f5c00b194e8608e164384c9b1de2220edabf6f2
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a