Analysis
-
max time kernel
117s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:35
Static task
static1
Behavioral task
behavioral1
Sample
688aade8cb22f9a0edbc6168c94a82ae_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
688aade8cb22f9a0edbc6168c94a82ae_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
688aade8cb22f9a0edbc6168c94a82ae_JaffaCakes118.html
-
Size
357KB
-
MD5
688aade8cb22f9a0edbc6168c94a82ae
-
SHA1
97707be2ef9f4a46ed6214a3c0acc170a44f3417
-
SHA256
a6b5d3dc96a35a87dbc7ba740f00f19accf910e5f2d180d6ffcc265dce23fc8f
-
SHA512
fc9c9041cb25abaea7a45b79292f9c27a77407d4af92e74326ddf800d535c1eab728bb0ca7e2f654d755fa38a0e790daac9b0fdaeeb05dd30aa257a6f1a94218
-
SSDEEP
1536:sFlM9CAEV8ZE/PwRIfeFqtOk9KCkcSdccttUVNiLtBErW3Etddd7NLdt9cltdBF1:mlM9CAEV8ZE/PwRIfeGoQgOQeMt
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000060421fb79245a74b8537c92d8945fb53000000000200000000001066000000010000200000002e6d3a831164f28e873b6dde1bda888a2ceab6976514ebbd099767173972090f000000000e80000000020000200000009d1d0b9e9a5b132a4b090a70c6b47a360e0ee9abfbcc8312b88ceea6390319ec20000000cbd8f7e6153001470478fd1a0236789c0f0e80cebbf05721869ec09a82c7574c40000000479164fc5a95e1cf2db1bc4ef5e5b52ecd343d4fd10c3c99d039ae1772eb46299f1661ce0e92858ba2f2b70337dc690ae57278f209d4e17108c13c80f6292532 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20cf25c687acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E9527A21-187A-11EF-8C27-FA5112F1BCBF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422572039" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1760 iexplore.exe 1760 iexplore.exe 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1760 wrote to memory of 1296 1760 iexplore.exe IEXPLORE.EXE PID 1760 wrote to memory of 1296 1760 iexplore.exe IEXPLORE.EXE PID 1760 wrote to memory of 1296 1760 iexplore.exe IEXPLORE.EXE PID 1760 wrote to memory of 1296 1760 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\688aade8cb22f9a0edbc6168c94a82ae_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5b422dcde7d50c7999a993813b2dd002b
SHA1c357cc606df87fa2433e5b5d7f5aee18fdf26e29
SHA256fcbc0af300d782d5e38cffd0fa7bd694aad13cf3eb7ef01d8c6a3c62ad3b5a18
SHA5126ad17341d36d59d65d889777cbf5ff189337550e09d4a87c97d24577103b26647472aa7ec0715070543ead4efb5c4f6d456513bcfa980cf3b327d89201e5469d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1d02d9ea75d684318c8c920cf9a930b
SHA156ab07af0fb8df0238259f01e4b41d4ac50105af
SHA2561244888e0413b3b22738ce7ae8973842954817e5b9e698ca707ffc37304d371c
SHA51244d074940081618bbff5065338be4016f084e64b867c27b195cccfe48895d12490aed20b1c6d7ad84125013646f5eab47245448ae61c67098e74ceb6f230873e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560b336669cea5cfc1a1641eae8494c4d
SHA1d5d8ae71a40c0bf2d5db639835ffc57133ed34b8
SHA256f8ab0f2712df4c05a6049bb88ba66c75370c17d9ef765f0f21a935064a4669b3
SHA51254abb5acac3498dc5fd39ca6438d4eaaf1c490d67038a2697ea2ba21c126721f5f1fffef051da1b11820bdd8d388e23b872776ceb6c80d31e1c5f2d9b1d08231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b9e4f3e1d7b8d2f0c42e983a6660ec67
SHA13cadb2d3858afb7285ca075a8b531c3606fed574
SHA2569debcfd02b622c71ed01e81a0460baf9629d3944386fb710a3bb6b9b914fa2fc
SHA5121a3e4cb7e98dad54784ad04342d1be30bb7743425a656911b234b8f19e9d5d40895eaeba15ea3bb11dddffef68625920fcb1efdf5a8e46cc71a99aa4947f14da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bb985555765276f6e4c2c8b0bf9045e8
SHA186266487efe065fe6e28da08b7bc23e69733e3d3
SHA256c54081569d4846bfdaeb299ef981c6fa62c47a59206d40ca012792edd4f7fa97
SHA5122026abe60a406dba6be7a8618d9863f5226294691747c7bcfc8d22f2e4bd1e6a36f97de684228b6db24d21a98b59d65ceb7b9b436a312dbb7dd72c2857f8d9f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD547b442f2df4b7920c1f8662909a4638b
SHA1bf93476678513acd6e7ce962f0d7208b4d00b2ed
SHA256fe1c9417bf04705e13ebb8c00d21ce59ca7e132c3ab78bfbfd52b5abc65c8af4
SHA5121b0748246b53235523ff856dae4946559cff9c7d2b6ed63a41e076983e05859e29b39eac735ac919b8e4223da4880b0f156e7226dad3562e1bf22a9abc63b665
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a