Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 14:34
Static task
static1
Behavioral task
behavioral1
Sample
75cd5fa6c2defc6448fe3e432ffad9e8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
75cd5fa6c2defc6448fe3e432ffad9e8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
75cd5fa6c2defc6448fe3e432ffad9e8_JaffaCakes118.html
-
Size
34KB
-
MD5
75cd5fa6c2defc6448fe3e432ffad9e8
-
SHA1
7a460681b0a8589fa640ebfbcd8d3afc1b6f26aa
-
SHA256
adb6dd761a6649285d8ef6bc46e2f97c4fe75f087443e1ac9f384ab511ef5938
-
SHA512
99872a63b922ee5699b2db8677d7374fece0ad5a6476dce55c26638697d9ee9f2c540ddfd54a2c0dcc6358a6a30c4ca0f168af26bc0fa2336c62b26cb7ac05af
-
SSDEEP
192:uwv0b5nropknQjxn5Q//nQieuNnKtInQOkEntNlnQTbnpnQOglcwqYccwqYzcwq7:HQ/43jkp56nSikkpt3pmHZ
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1E28DB51-1B6D-11EF-BB1E-6A387CD8C53E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422895968" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 348 iexplore.exe 348 iexplore.exe 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 348 wrote to memory of 2584 348 iexplore.exe 28 PID 348 wrote to memory of 2584 348 iexplore.exe 28 PID 348 wrote to memory of 2584 348 iexplore.exe 28 PID 348 wrote to memory of 2584 348 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\75cd5fa6c2defc6448fe3e432ffad9e8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:348 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f3af98ad08a24f5bad8ae722e867512
SHA1d1e0b20351b49ca6a16cf22b32547006ff12992b
SHA2567c25d318856ab2f8e415356b06a29d9084eb8c8fc3adba905839276af22b79b6
SHA5125509dd57f40b73392faf07f0859c45ee83bc574773d4a0210570d20198368a70179a047b954050e21ed7ff6477227e7cc32002bb5bab12206385f45f97653698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ff9d077b34340ad6c0a79a3c66c8432
SHA1b32671104d524889479f15882bd28cddd52b8ee3
SHA25638c5b4c181c132a0c56bae279ea18277b4d5e42c4ca65371cf0638392b8869a8
SHA512672d8d7af8f9c66cc3299b1470fb99f3b006c8102975fcf02f1f8e05cb0f6dd582fe0a2078048615dd59ae4110e586449bf955da3831c044cd880c0bfdc40d88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a90f7c971f14e4b51371101acfdc1e1
SHA118460c07bdf5a663d2fcaa75003f0f82c95c6304
SHA2569eea29798e1dc195233a68876435279915987352e9ed91465950ab940c6dffd8
SHA51286e626f482a61e2c13b57c2232405496a94a977e3cf2c78ebf23ecc49a352f5a08ee82cc333fa371199017d990f0fd674bd63cbbc3e12f17df37218cfdb145ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1d2d5c4ebd802dd165b5d4eb5665891
SHA19090a941f1bbd8e9171445b29de9c42a855ade4f
SHA25677c5495bf3ce131f408e9313666d799ed54dde7cd16e61b55d4beb6101dd446d
SHA512b08baef768f58bcdd38b964dedc653d73c3bd9392a37cd88a5e6aabfa413ba69224e8b26ce230d55cd667a803d3c2e0bf0b242df7c92290f1beb301c0f6844ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c571677c0754cecde571901bbfbe486
SHA1e7529411a926df708bfb8e75dbb84123f683bb6c
SHA2560f46da9e85dcd848d4ee7277c40cf56d4b92ba772100279fddaf2c6a68f9321e
SHA5125f4ff220d1458e4bc39783db7988e3eb110b9c254d1f33b757b0b01c56c22c2b43514b0e799be21ab09b36320fb91aa7772fd7f7125b233c10b7527409982fbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575e75173171fc792bcccf8157abff2a7
SHA130b1fc6e46fa5d58a527c02ef47eb840ee653175
SHA2567692193b6127789cfdc3ae9f8faae7e0b6ca31268c3e0d127613fe4c71380ee7
SHA512ec192ef6541667c8d86dcfabc140e68469e87d7b738bb238fecc0ad6a3aa7d6edee0146fe5d3fe5ac11830f67aed19d4f85bffd61157b9f6f9a5590df99c800d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa726c91fc955e4f6e72f57707853a4a
SHA1c034245bc7a5e17cfdb99eb74524f958aed878fb
SHA25603f10de35b1b40073f47000c2669580a6bbecd7b6c41b95e688b54eec5cee4c3
SHA5128a37458474578891c67024b340f1bbbbc19e34577311e53db44380102ed0cc1d5e88879252e28ef4d85b53c0b4079dc07ef517c04e53c225258b69d4c6283427
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a