Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 05:39
Static task
static1
Behavioral task
behavioral1
Sample
781475bfb8de728b20ce6d05da4eae40_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
781475bfb8de728b20ce6d05da4eae40_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
781475bfb8de728b20ce6d05da4eae40_JaffaCakes118.html
-
Size
18KB
-
MD5
781475bfb8de728b20ce6d05da4eae40
-
SHA1
063866b269e3a9d4df622f22d3785475f8270e9e
-
SHA256
3ad6b7acfa1bca6f63f676ce053a2682df04ea4a221a1f6d7a144eee4babbfef
-
SHA512
a768d5decd84cf85f89d3ee785053893b83212c85b26698d86adbe658dcd01c9a7ffb2ababdf18d6707e850410d50936caa79c36b453e6f144634eae908b61c1
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIZ4xzUnjBh3582qDB8:SIMd0I5nvHZsv3SxDB8
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{714376F1-1BEB-11EF-89B4-66A5A0AB388F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422950218" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2964 iexplore.exe 2964 iexplore.exe 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2184 2964 iexplore.exe 28 PID 2964 wrote to memory of 2184 2964 iexplore.exe 28 PID 2964 wrote to memory of 2184 2964 iexplore.exe 28 PID 2964 wrote to memory of 2184 2964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\781475bfb8de728b20ce6d05da4eae40_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1ffcc79a4da8a7a557c00bfcb8e9742
SHA184ec2c9fed4c75b4aa642d04eef9fe6e72326001
SHA2564bce550e97486dd5d7c7d5e42d62b799fbfa2e8b924efd778d831dfcf75980f6
SHA51290f2fc15d506a27d992014aafdf44cccd37e3e11486a1acbc644320f2ba00c6c0f484984ed599998539aacb617fb2827df662b9732abbee2030d871c6ee20324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595de8674652e8946db387035eaff0cf9
SHA1207ca8b13826f0b2b1d9c1b214ab11d389f4e767
SHA2567a4882bf6a1aed783791f0182c4ee5ffb4264e56efe67948c1e019332e1b1946
SHA512a57c158426a936c3884b8c0765c86f5c63ccf292c6ba4a05e48c462e32003c568c502be81b724a2338d2b6d4cc65dee422e185a8beec807ea2469c18f7e1cb68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa1a3acb2ed238c4f6d66b54d721c899
SHA1bbe7854e3e89a6ec79e89b27513839b0cb127caa
SHA256db9b81fc72ce0e6a09c4955b6d3be7f46fe6d1ccab1b83877724cc699c903c05
SHA5129beec655889952393b2d9961cfe785224428381a2644e809f9136a1350ee852c5a4739a9d8426fc47d6a84a10d0642e65cb7fbe70e0690889d4e8b5760b5697d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580653d6e31f7299fe66ad6bcd2a2dc76
SHA1a1f8d2d9d1729a9c76010edc5f3663d00970e3b6
SHA2565b7f9b0295c8ef85f9a4fb4cee694ac3369fdfd5ef8b06796d64b72d8ef2aaac
SHA512c098ecdd1b4c63791ad15159f1f68e0c75ae2e1185a898b315af4a17f83f9fdc19e9df5bdafd6caabef6b617abc9da9e0bbf139e74e37c17d713b3d9ef7c480a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3eda0b79ff327de7277b5131f3fc386
SHA151c68ac21028c13fdb6032e2fb41c31e07b9feb6
SHA2565fb1b659c52edadacd255f95b763b52da1ab9131fe55e6bbaeddc8856e54e634
SHA5122788160ee34735e4774cf772629ac76383ace0f51ca085b0ff0563078f2cfcca66019c55db54bd0f7d31bcb541295c20e3a38a0ba7678370d7a9d9fc6425625b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ea583a01bc0ebcde928798a76ff4720
SHA1d8b69d4a1b0dff93334c4f1717e74630ea8a40fe
SHA2561b805ac7d4d8186b7bd7619e760ca10254c7d4fa0bef3eedf67c6995fd7143e9
SHA512608998c9bdf369e1c843c31c1bf107ea5db9734b2d608b12f75ba26616555f21a5493edede8ba63953b0256c6a4a3014051beecdb0d94d7b329da234bb0f037f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9813be4edd6af2021f4e9b391d30c5c
SHA19a31f311200165539b40c518290414908f933aac
SHA25611ecc25ca080a976d0332e9b072ed1370936b659aa03c6f086323c76fbe4add5
SHA51277ab0bf70694df01f30ac4a02d54b6f74562743e493367170bc67493826aeda4fd1a5dead5a3d9956c955b5b0bffd9e7a55405fe3364e19e0c628f6bc1c033e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55604d853c93b0098c38a8bcd876fb8ae
SHA117a0e3f1834a3d7d125dce186752adf80e0072a4
SHA256425b883166bb4a153f87be8293a6641ea840bce34643b6f0e505bebc66414ff5
SHA5126f6ef5f91d7bd367c16c669457b0dd48cb55ab98244ec62afe8e270fbaa099e59b9f66578ac5de956f39f98eda99b415ef681fb360a16991f9cdba2be7c0e76a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5808352c9a4cdd268cd28764ba9cf99ab
SHA1790adcffba3ddefdc17bc5a4773e3ed1bd73d1f7
SHA256d2aab75caa1a1de5fbb9d1840523616a0232ed4349dabdbbfe3d3e21f8225a0d
SHA5128fa8d8f6db816b12525e3505fe62ba7f5179a0c0241bb4196e458f18d07498b131ab7ee8a4dc319163f35e5032063039c8d1f40d8194947ab53c71031a728195
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a