Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 17:06
Static task
static1
Behavioral task
behavioral1
Sample
6f38f7adbe9e5fe0c7553d9178e19ae1_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6f38f7adbe9e5fe0c7553d9178e19ae1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6f38f7adbe9e5fe0c7553d9178e19ae1_JaffaCakes118.html
-
Size
28KB
-
MD5
6f38f7adbe9e5fe0c7553d9178e19ae1
-
SHA1
a3de8105fdd36a68e7556f0a960eace1465d767e
-
SHA256
4b11765ea515e07be30e16bea056a459d9baa38b203fc94015fdd9c2d18d2409
-
SHA512
9d992db0b546a2c2e8e2658754848b279e34685c4dfd17a30ecadb665bd07fe14f8e762307556982a99ab1b813b2ddf578080e11353b6fcd26fe771ffc89fc5a
-
SSDEEP
192:uWXSb5ny+nQjxn5Q/2nQieVNnVnQOkEnt+8nQTbnBnQkMCXAgKV0C9LTV5ZBeER8:vQ/sFmfB1BQOs9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422732257" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F65C58A1-19EF-11EF-8456-F62A48C4CCA6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 836 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 836 iexplore.exe 836 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 836 wrote to memory of 2388 836 iexplore.exe 28 PID 836 wrote to memory of 2388 836 iexplore.exe 28 PID 836 wrote to memory of 2388 836 iexplore.exe 28 PID 836 wrote to memory of 2388 836 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6f38f7adbe9e5fe0c7553d9178e19ae1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:836 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5304fd2b900b1f197b38f7390d5b0390d
SHA1acc93558a062714d22dca1e38d47be4daea8607c
SHA2564cc7a08b1bae03fd675677e91e15a9394a05e848cb1b908a18d7633791b4274c
SHA51297fddcb7bb04fb60f7ffaf90765a888dcd6b9dc580631d09140b60675a3b857b30b181a9edaf7a559b1fa9ce01baab3b73ef0f2f7fb72cc48e15b2fa02bad96a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD537be90f92ff9b1ba401c89199f173780
SHA13d737a2a142261ed3186753f0267245c90a4dca9
SHA256e13feb43e569e89ada91c9d4bd2f4f4839c0cb289483bc7f3e74767b6fd723c6
SHA5129d0a486ac9e7a135f04ce1bce5fd6dc3a7965ef04c7d38f95ea998e7cc68d7989ad5238ea0c19ecfd46987b94382a6fa3f5b4f15cf73169e2ed5ec9c3ae41ea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD534553652dd95cc627bafa0e5a5c9ec12
SHA152faf24a0ce7cdb8e576991fed98d7a41f555599
SHA2568a65c0cdcd80b95924bf5d4a997e634078a6daf3d0d9f170b770133f637264d7
SHA5122a02c04d06ed6da08c8125c79089cc45b9625d7bc41b7e13b25d09526c26cd2ca96d14cc146108560b589a3a4afc7489d4c27befa53a195654e192bc1b99257f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5523c8c16d4baeb32b9058800b514a56c
SHA19e442a307034f97ed4be3034953d219d598ca5b4
SHA25659d2c9c8f06fbf6bf588674d92ca5dcf2732e3578f00264156d60ffa0cc7e749
SHA51239e90b0cc59c7681c7d56f131c21e022ce2b1e8bee4ca6364eae4dece5e7fe1a872e7b0b93b6fa322edb514f12f02f1574b330a77e8fa019ee0943f038518c1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56a264acf9b448dfa6dd516890a905af7
SHA1c7e9f67d45a48c4417883a5bf770aeb4165dc636
SHA2560d4f739ed7c2f2010ee2d059998b14aca7d6794c808c5dc7241632c41c86edc7
SHA512c37f8fec9e61778ff3607025321d53a111c0e7e54284ad41ffccd7c79cbe84a0fede8c7e27c07053cf5a2442c99e2a114f7c383be9844578c51cf3c31887ebfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fd6af2a57ee006c1e17ceb64f1b476fa
SHA158f7a1ad6103d4f006106e2eba10d8764f463479
SHA25628df18f799537d271cf16d723501666076fb1c4d0e9c5bbf01a5744e9684517e
SHA5126394322b7fdf789f13988f774412b1525172174cd69411991fb2819e9ebe54bb1b79b9fbbfb46b9ea6d6774086fe74fb4b401031864a108e5c24f30dc9fa3ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b96e06710105b9c6f94004c7bdf61791
SHA1c64191d403c4f35011d4cb2c26197450e23e4cea
SHA256c2a24a9fc9ac466b3cc0e0a7317bb7e5f62ffbdf4fbd02ce3208ae0b1fa914ae
SHA5124981271d11c50107600780ddb8fabe2eaf3881c1e80225934546a3038cd5464398b44d307a43bed2390d22a745dae3d12affb01760f4075ce0edce31c1860657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD534a2fe0dff27402c5daae5b19a0caec3
SHA1609d32cafd9644f71172e882c35dd5bd3ca682c3
SHA2568459d4bac0772b75826522743bb77cc39328ca9aa2ae26c207ecfd09b862c5b5
SHA512ef8c1e5ff4a4dac698e5152ad71e24f2ac50de83576f2464d696ca75649bd23c048f45490307804d7056416775db36ae9fd10d0697e7cf567b337db00dc4243e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a334d6ba532e3e9386646932a47f1d7e
SHA17056aebe4f2eead56b50188b6549acb811e269b6
SHA256cf165becf3067bf16e4d2013d5581cd7a497cb01775aa7288dcc293bcd78849b
SHA512e23976e2f95f7e14bc793a06b0f05a6d029840a8a61d0cfeb43ee836d1560ffdd567c22bdf084b3caa676ae7a525bd25fd92636b2501a1b0e1a221b272a380d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f70631ab5625a5efcafb4f54fe5b9262
SHA1b2dfe07565b3c95bc4b9c70e7ae76c5133d8401b
SHA2567989dde75c58c36836de5c28aadd0f2fedece9d601a974a010a93c063b14bfd6
SHA512550da2c7ca716ad12c049a393e977d4bf92a2b32badc7c6939a9ea72760a63fc67062dab82116cf56a5f23851f3363b10f09a65e391897b866c7f9991e7f6a90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5786b718faa5bdd98e97acf9b7e2f3415
SHA145ab6f88dd8cba3b4c38d763a0ec155933a0fd13
SHA256a206bac1c97e3152101013200c7cfa638830020ef786b782307f69f9f1a3fbfc
SHA512e2b64617d1402899de399fd998df68f5735f031df5f3211fc336350b92daa70ecba246f84ce606dbab0692d510472208b53b13bab7437c67e7d8cbde0bf10e67
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a