Analysis
-
max time kernel
130s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 06:52
Static task
static1
Behavioral task
behavioral1
Sample
712cde79b88c4f5490ed3559cb01ec5d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
712cde79b88c4f5490ed3559cb01ec5d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
712cde79b88c4f5490ed3559cb01ec5d_JaffaCakes118.html
-
Size
23KB
-
MD5
712cde79b88c4f5490ed3559cb01ec5d
-
SHA1
4976144fee4f21489a1c4385cb6a3f1df1e5b06b
-
SHA256
f263d6870e22b8b0dadcbb764ca7915a8fc6fb8c819c998dd768fc725436f4a2
-
SHA512
64227faa50bfb1d3afef76e8825ab48684bf4e6b7170b7ade52c809c0af5a39f1b7b547610c3912cf320b62f88fe34c91b3d7f4ddbaa9c232c350cbaded1b841
-
SSDEEP
384:CZyl6HBM6BM6BM6BMoBMrBMRBMnBMIBM5BM5BMdBMBxmAM8:CZtHC6C6C6CoCrCRCnCIC5C5CdC3+8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4FA2CAC1-1A63-11EF-8698-5E73522EB9B5} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422781800" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2812 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2812 iexplore.exe 2812 iexplore.exe 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2812 wrote to memory of 2204 2812 iexplore.exe 28 PID 2812 wrote to memory of 2204 2812 iexplore.exe 28 PID 2812 wrote to memory of 2204 2812 iexplore.exe 28 PID 2812 wrote to memory of 2204 2812 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\712cde79b88c4f5490ed3559cb01ec5d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2812 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5697f4905d7beb026b8310e578890809d
SHA1fcd448f4b679871cfe00893da2fe0f97b5a79d67
SHA25678f1bf43837e69bb07c87356eb26020f090d4f2ec4d263dddb5158c74f42d6f8
SHA512091936a8e6e2552ec23f4f6d96675bac2ce5885f22f701f7d759a125bb9519aa3d118e88b3ffd31cc8337ac6d42878b4e28e5447160c0cecb280ac92ba1dab45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573e4d98cde82d67fba0bfa5bca6c28b6
SHA1d4f164c7b4ef545eb9a9efa562440eb9e0d3641f
SHA256310c6cc5e6ac0b4b1b7f2313f1714c8daf2eb27c9952a68a31a89e92504f0e55
SHA5124401ad03bdc6db31337f56fbb828e5218fee74b65eb93a066b908ab6f4c6fc7b4de69f9bda5152b0326da3d9d492916c753a7f3654fdb4896624897bc909cfbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5458bf4be2d13fdebf9932eb12dc1e1ca
SHA1b7a7bbcb502b48973963e45ba263a07c12db9f9d
SHA2569fa2a329dfd36d8089102029e3634a540fa3db7aa7103277731897a378849e64
SHA5123755373135c79c74f3ea68f36a7967521d3fd5356e5b05ef5f2421a24ba6b982595f363a6f1e1603482a03e7c0ddf32e0f376be396e1fd093a4ae8908cc8f8a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cdbf51ecfbaa2ebf9317f71da2cdd8b
SHA13e62139ea3fec5bd1d0f9904f70d3d7bc9823825
SHA2568a3aa0d1e019df35884952f65a6839d52383fc73745c04d8899bc252c794faf0
SHA512b93883b09d0cb9196515029a743f16ab0f089af5da3fd7c7e846e807cc7d92e792cab287cba85b8514d030707a01f9cac39129413c4cfb910634179658754f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513fc3c5417fa8984bb2c8912cbe61182
SHA1aa8f418276c687613220e2f409c7edc1342c2b3c
SHA256dfce30318c0b68868e77a6ca115f04205e64d7e7ccbfc4be7567a0cb725f9e71
SHA512fca0126bd2512556e2ed829261f5f59e3b7ffa40d6ff98359235dcb725800928fdb6d85810fdc4d2cf71c62234231a3a8566ba75a946e94702d9f871b8c2412c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57728e4bc756c2c4d4069b79894fd3b11
SHA19cc7ff2bea7e7d6216a012b7b5eef3fe346181bc
SHA2561d7edd67e787f12b190a9cee48875007b12df5c4ab4630dd5d6a0f185a60095e
SHA51226e56e11fb4eeeec5145ed7eee3c00106d4b8d9fc73a06751f067d725c88524b27078d9cb884c4aa97775fcee06f0a289837242e9481062d67421356151d41ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5378646417a7ccb4162de21b44e074c71
SHA10311357509dff566fa18562ee0730aa7be1a745a
SHA2565f77eb0dc8cc988337cbe7daff8b08ab0c5144ce52f9d1927b08b316e369acff
SHA5124e706ee2d83a4aec15a5afd82b43c7f4b57a65688a8dd1bb0c174f8c51469a44012a133db3ffe60e34765cd303baa7bd45d5b513fca72ad76d9b83160edb0390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdeb388ad8d7385fb1bb7d75e14e73aa
SHA10547548b610575c8405a5673031c5a24288c375b
SHA2562b461c3f1174d8b7726610e1f2a5cac11de33bc8fdf8c39cba6c9d56b573a769
SHA5121dc38b004b7fec7bbfc1cdb057cfdce1a8d150c809fefc28b6b790637be26adb39ac07f4402a3f57252e79ac6621281b5d008cc7dbb258a810b6a496fcaa72f3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a