Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 21:15
Static task
static1
Behavioral task
behavioral1
Sample
6b158a8a32292c25ae4b51aa1c3683f4_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6b158a8a32292c25ae4b51aa1c3683f4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6b158a8a32292c25ae4b51aa1c3683f4_JaffaCakes118.html
-
Size
29KB
-
MD5
6b158a8a32292c25ae4b51aa1c3683f4
-
SHA1
d388931ac0ad9a5faf95533b05bbc017a4d9d08e
-
SHA256
58c6753a952726c9e30edb83d5ab66fa1667db5513506a4c78f7b3253aded15b
-
SHA512
068c061110d40db72fc51c1d5e4df0c364f328cd0ca60546d887e73a53c7125a7920ffe69eff0e40aa452701aeeafe1b7538647d34f44b56da1dc1375f311050
-
SSDEEP
192:uWn7b5n/nnQjxn5Q/unQie1NnfnQOkEntOMnQTbnhnQAMCuAMH+OhgamdMZR9BLQ:KQ/O0P1xZ7BLP9QjfkisciOLF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422747209" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C6828A01-1A12-11EF-AB95-422D877631E1} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2100 2248 iexplore.exe 28 PID 2248 wrote to memory of 2100 2248 iexplore.exe 28 PID 2248 wrote to memory of 2100 2248 iexplore.exe 28 PID 2248 wrote to memory of 2100 2248 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6b158a8a32292c25ae4b51aa1c3683f4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b74461d6cea4f438f6dff82c0d852e89
SHA1e0778c2ab54f0fd12017c38ee9e0cc555d810403
SHA2566d322332e6c9440e7cc6dc0dab62444f31971cb9f2afc90d9cbf435bb978ce91
SHA512402325da10521aadbf64f14ab2492f8a0218846cd892686df26ed79ff1bacc51b12775c09713127d4ece7400ac498ce741df7bd262b57c677a2c447fcf89f2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cae77645bb16aa2b8b31ab78e24b997
SHA1fec7e5a87a369a62888f078fb3f5cccc27fe0700
SHA25675e4a9fda7e0f28e361138e4f8d7f9854ac520e70fa0f68ca47ff1d197a1dc76
SHA512cd261eec4a5ffb44cd595c22d9008c78a2133e88c21a7a0f5ec22ab5757a090ad7850b138a0d6d51d911618300925692bdc719be68875d65e789dbc17b1498ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f4d0df5967ff5b1b4047e20e3f4fbb0
SHA11bd0e8e3422887009343712fdf4d29ea06f63e33
SHA256ebdcb82c973831004458845101b03ce1992e3b88831da90c15ea4a11af899360
SHA512a5b469c60c0d8187283f8fe01f87dc98acce028117c15bac6c9ea9ebe7177783c1231b02e8f825b8783fe308d64d231db87b29eb16c3aed0282ec83826f647ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8d5feece7b575c2a65877451942e8e5
SHA1d0a459f3a7125c41f0fecf4f194afcd2324aec26
SHA256afbba7d573e6868ec0d8854966c96124c3d2caa7572b65745f905d6df1808ccb
SHA512692d5e54db25aad809a5d962302160d66ce25fb06afc0c4fafe6dc5795f7fe96004889788902ddfe4edbafba11342bbd2969e3f37ecbf6ef1bc7b1623933318a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a175f3297759d945691299ec91830408
SHA10686febe53dc7c08abb803623d31247f5c4c1b0f
SHA256fefe61c026476534867876b1cd0e5d13f3288048eff204ff65f1bf2b40c50105
SHA512b583f6906ad0df2d19a3bddadb0b1b0938e860d88643633fab2d8172174d014a44b85ec06f0fe37907c05005fe3202f00bce74bbc8b60032dc45692788541084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508223337cc105548d9fee1231ea58228
SHA1a22c989578711cdf4bb94f9cb54afb1ae5e9f214
SHA256ebfed56002531f9a7cebfc7e2d2920e12e6a8c6909c2cef9820ea86e15443a4f
SHA5129cc8db0616b4a1b4cd646edf2c691333b83c99abd1af90c5f1d0b9d644802b109dadd2b39c9145b816ed82678674793603e81610e838dbcd8d69c1bcf175c438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb555c80fdc212b31be50dc7ebd1e604
SHA11ac34d92df794a34ada0181a668c9b0bb5151d7e
SHA256d0e0b687a25e092619c5c86ac8adc3adedc4af460c3723f44871729567baa12d
SHA5120421fbc07980c39f7436bf11538242143096efab61e59abe087c2c2a2df8f8249e57ebf8419ae8a82aca1c107a4c93b9563817812f6bf0830d799bb80e66928c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558c2558fbe236080ca82660e121eadae
SHA16bcb702330f8b241136a1e5ec094090f26615e6f
SHA2564336814b573a66634e7ff7dda01a9bbead4f00baad20f4ad9f082025ed123232
SHA51213e5bc94fa04bc91cc9dfd622de8474c27ece91764a300b1ae020b15cec775f793ce1c8829c5b79de0af0d915e7a6664f21da06718f19fbed258847f7afa4c23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc280ed453b68aedf28832f6f21f7864
SHA160df69bc62ba9be23badd4ea443ff119dbc6ecca
SHA2562db97ba319b175ed4eec31709d401f131f0b74bc7dc31680e0be5a6659351a88
SHA512a52dd98fbcff483839eb0aa995489cb10a10659a22f74e46722e3df2c0a50c76cf77ba733719df6d914c6c09557336752302f3e3035d4dd1a99a395539a1e13e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a