Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 16:28
Static task
static1
Behavioral task
behavioral1
Sample
6b8d5a72aa1b87239beb91faf050bcd8_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6b8d5a72aa1b87239beb91faf050bcd8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6b8d5a72aa1b87239beb91faf050bcd8_JaffaCakes118.html
-
Size
27KB
-
MD5
6b8d5a72aa1b87239beb91faf050bcd8
-
SHA1
70a240432ac5c183401d80e541b75bbc68b3bc48
-
SHA256
ef2b72a43b36e66ea2d5726b2c08b505b282609c08129b635b773ab479397637
-
SHA512
7d79211d5f9acc033b03af367226367cef6a5789c4b6880fb342722b881787db05109308e9e6fdaa93b4431f2184c6ec466ff12ea87728274c42e4eb360abd7b
-
SSDEEP
192:uwfIb5nMn1mnQjxn5Q/FnQieANnGnQOkEntzbnQTbnxnQ9e6Qm60xY2Ql7MBgqnJ:/Q/CDI2YBSq1m
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7A096551-1921-11EF-B781-461900256DFE} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422643572" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2080 3000 iexplore.exe 28 PID 3000 wrote to memory of 2080 3000 iexplore.exe 28 PID 3000 wrote to memory of 2080 3000 iexplore.exe 28 PID 3000 wrote to memory of 2080 3000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6b8d5a72aa1b87239beb91faf050bcd8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51587bea9969c61750e5c4c3b9548a544
SHA10923a5fe38bdd923a9cf5d5190664f26dd1f554d
SHA2568be858af2fad8ba4e34e1e79b17d75167e2dbccbcbaa61ee59d6261f48cad4c3
SHA512fec63e0deb799e148259fba3bc22621bf2ededdd0465c299848497bc6469262aff271e5efe75ec4f4d984f216f7e902428702656012c39e60eddc219ff0d2a05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a185666e1837339824dfbc9f5c2c27e
SHA1907d4a313b6df6f3f39ab50e137f900eb8f22ced
SHA25686cadc155ca4a82b2ede73df30c89c0491321ac6f0088fcb33a9f8b77f7431f3
SHA512dfdf723be77fbcdfa1a5fa71888ef74b5a9b35354cafd7e294362ed32f69dae7dbb1a24ba43fef4d3ceb30279bba866cad41948c03b069b300e2051c376b0c83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5163f4e4cc3bf185f73cc51002ca9b603
SHA17a84c5f92135681bae7a4cd456e645abc013024a
SHA2561e7d5c7daed022bd4f3fe7d96e80779316a6b6accbd0d4f30990bee75c422051
SHA5129e0e46f963477649774ca1d070c3c96ebc79de3a01dd0b8e8e210347ed7b73ce05779ac61c5a37730f489672f508a500cbbd7fea1a9cf96428822bab37fe4699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54316a91f2bcafa2286691ffc3af95841
SHA1ede2f8324a537741d9d62c93655bbef0ad4506f3
SHA256af05df1c664cdd8491eaec1a430584f1186b9efa3cf16f2bde02925c7f58b847
SHA512ce22b302f911dcc0f6728e782e70285b880508cf66949c4d3e12cd82a8078f90a64252ba8a869df7faa412158a16718ed60af393693a7e743dc832fcc5c96ffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b353d1959ea2fbdb8c9e845b47a6fa0e
SHA10053ac367b103e921112b4334f026943d664185d
SHA2561f25645de013976430b412b154f9e3c526133e9d982277f2050a471cdb79d913
SHA512f52a8b3e161aaf4a62b86d96350e208136155004ce907dfe6bb01833a7f831cd1a327f94ed96ac658a31226cfaa1c0a081d50af65db4538d876805292115d422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a66614d9ea36b5d875c214d03495e807
SHA1ac239d66f537a6d6e0919714677417477e072218
SHA256dd76273832c9371a99e85297f3d941d336f1df9d64b634527bfa2b55dac26b77
SHA512bb8526755efaa8f38bd45abb08569ac0fe15ec29e38c5808b9cd8178065744e17068f57876001a11820a83deb657a2a8629edaec690dd5afd963f7d96de15e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e17fe1ec47d95a4ae60da8171a243fe
SHA16534fc4b2f6a3c71a2a638de451f6a31f3b37ad7
SHA256297a3fe457e0688572add90c51eecfe1052c3e661cd209de24ffa42fbd9dc4f0
SHA51292c72bd43dedd049a3da5bebda5f6c43a6c963b2f0ed4fe91ccc9163da81324c05d8f1de102e603ee182772af9f4a9f94121986b7efdda722ff3f22bfd0e69d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d2c27f3e927b8b1ebbb18406127a102
SHA13c5eaa2a3b3f2f344653bb9a26d0272593490cbe
SHA2565d24ab683dfa6e2eb92d94b099fb92dd0f03437dd7f0b795b609b50b9b0d9792
SHA5122b2f13357285fda83908e9467f49603fb2533f1908e85ac1576443226c97ac5b1abcd2acb33162a6cbbe1116b65dc8acd53f2a855614529821f3645aa4c34ecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514f33f93d31099aff9e45a40d2f55e62
SHA10d778b64dadffc1eaf31d8f13a49208e28c6de32
SHA256bbe7f2b8a30113c3a57d645cb15d9f99c6ec00811261ba7f722fd401768dc413
SHA512cdaccfcfad4548c6a175a63d7a64555cc62edd794d6adf92b2df6a17b114d167b23532dcdc0fe3f0eae4be8d84b04ada59da960cebb1fee285d1f440f8a27016
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a