Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 08:20
Static task
static1
Behavioral task
behavioral1
Sample
787e7afe4be5e07cbea68f3cebee4c9b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
787e7afe4be5e07cbea68f3cebee4c9b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
787e7afe4be5e07cbea68f3cebee4c9b_JaffaCakes118.html
-
Size
73KB
-
MD5
787e7afe4be5e07cbea68f3cebee4c9b
-
SHA1
0ab2513dea3117da0673830be4ea0d064987879b
-
SHA256
0b4dc6485b5f1156c064874547340303da9afca553bdabe0960604afd0a9c913
-
SHA512
d70435cad46616dcdbdc9b07e18d1e7e902e7eed7ae935166c374d54b5c52450a5e5e42620ccff86e94fc6570be4aad03bff92ae5a1cd6df445aa2f2b9ef0b4c
-
SSDEEP
768:JiGgcMiR3sI2PDDnX0g6sn64f9IekloTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:JgxlTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ECB0CED1-1C01-11EF-AB84-52AF0AAB4D51} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000000d5f754e1450a5337dca24aa1b45001e1b5d430d04b7cab8246c1e2edae5ddc0000000000e8000000002000020000000b080c5708663d9a5ae22e62672042da102b7458660c7931252d6eebae4a1e86a20000000124d6230fb339c9d0e91c20bc6e830ef90232ef5aa0bdaf4a1ecb31b0328d85240000000e6cfa0105124ba715a072a4d393fc5af62f9252527b9c619b28eff5ce7e15f06adf8e0484409cf3236c809655a5432eedb0c309273d2934aef9dd9dec9f9adf3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e04f4bc10eb0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422959874" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2020 iexplore.exe 2020 iexplore.exe 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2600 2020 iexplore.exe 28 PID 2020 wrote to memory of 2600 2020 iexplore.exe 28 PID 2020 wrote to memory of 2600 2020 iexplore.exe 28 PID 2020 wrote to memory of 2600 2020 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\787e7afe4be5e07cbea68f3cebee4c9b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aedda21e56f061c8c43a4ab6b430bd74
SHA13feea29bf11ac48a04facff0e9bc349da23f4c9e
SHA256a58b562b7ec9cefaa9c6ac1b1991d03bd9d201c2d892dbecb73e30f47f34ffa9
SHA51273960925bcaa9c853f8d09a5f06103348a2de477fe66f1210f6edbc28a8526e61a0c4e72ae456f79b2cde5cf6a562a173c2f2b1179a919e0d799d72685e57fb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a3b5bba494ebef3e9ffcd095697d9bb
SHA1a2c9a966acc9da82ffd198449e0ecdf189393fdf
SHA256169ccc61936c76b358e35d115c3cf8c9edb89073ebf365ceedb06cd8a009fb61
SHA5127c4d9a605eacd41f52674cf30e13caadada4dd26566eb7ce400edff6a4558181860b3dd9646da1468d3deacaa9f5d9d70d657204deb35fa5b17d28c9bd2cf62c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5398c06b030ac06012ac935f978a818aa
SHA1c32ed11f3084b67e268f28735d2a4a7fd5f4bf12
SHA256e45519d9e6203e3cd3d5978c97625613bab68777c04fae6792ab24b6a2e24578
SHA512403366de3cd03e028ac14d75e8ef057d7e1e1ae2ba21889b8ab3430f330d0b101b0672359a1a13d9cdf77683ed762022b5cecd9070f7ba37a283c9ac1c2f5491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562c9b5dd028f966567148a3922b63869
SHA1b1d0aabf61351b9cb024f181bbfaab14d0b680a3
SHA256f19f6940f6932c621d94a21492a8314d24ea61257808e7cbf517a50d495da622
SHA512407e56db10afeb315d56a0b47211b515c2f277cba637c86e3ed718c21767905cfd7837b585cf1c0e040925015bf865d72048230e196cf6da3e1c089ecbbbb7d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6a0e1c1a44ebc9cb9af033d4fe8ec9d
SHA1eeaeaf97515f2db0ad148901b7ce08d7e576774e
SHA256945e56f3904a2d2a801fd08893255dc764f18daa2ff5235495fe7fa5e0927801
SHA5127705a1e2d7623eabee0136b754efa594d15fe12bb7c6326686a881b545b03306d60114a894aa5d9b6aea9c573d5ceeba002b80d27f388a1be82d471fb2009c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57282b4b7a420f363989700511c21deff
SHA1def2e1f52fe073bc4217b7e9350c0c8c92ea566c
SHA25603828d62274e4de3684118272df80a70a77f230cadd425acc39b0511efd04dc8
SHA51249ba4b25191e1a861f8f5827e7e8c4dd7d5aada066f959727e703d53a10e3c8cd5c16d0ef0e8e9b275f8340ba09a99382f90fc846f3a6e87ec2e057ac01f40bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50966311051d3e125fbabcb11aee34e55
SHA1730fe2ca6afb0ac8da68512963f2dd02f422897a
SHA256939af2a66274f12e58bb400db0b51abcb170175c264ad708dff1888916fbe4d1
SHA5123fcb86c2933269874fd76f0102b6f6300e4553e0d5289d128435176a851fef8934f1b85dc2f6411c235d9e88167281cc65a32594da2c4c0f65bb708dcf5a3633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5749cb198d9462d0553a47d2b8491d41f
SHA1f70bc79015d5a67139fbe40d6e09ac0df8c026cc
SHA256a514834110750f2cc4f90cb73652340855ce0159d0c198bbc69502f20fe94840
SHA51222d84f1ece197e25e7fc0ff4c6b5b85cb17677da857d0acd21ad48c64b463ac9307f2317404c7fc659fbbad19baf57831b87e2646602bb383bec00eb034d8a68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2f52a439199d888d15a722363bcf317
SHA199eea76e3d425a23f6fd73590e3afb46c7ca62e6
SHA256ff6237669000cb3b07dfadb06d3c7b5a389a816fc8d8867d51c6528f1ce85a32
SHA512090337047986028d6620648f25ed30a0d6cd5ea91d154c93d9afcb409f4ad99e38332c9ef032760e082102292c323666923aaaace249dab50a984c8850482569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a925b14e4bf3473e01dcebedcd642abf
SHA16df31d008ae2f24e8f16e8a6d6ac75ccffd61aed
SHA2565a8cfac89448598948a8061db14f43636037cedff71e4cfc8c833ab2f3e1466c
SHA51299bb75c1760d133c17c2483239449ed76620b21c6b4ca305712a32874c830b8c7e43070dc76bf3034ed4ff42fa5e8157b0cbd8fd50163f245dbb6d1a1bab8339
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a