Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 09:09
Static task
static1
Behavioral task
behavioral1
Sample
78a20c1594092ab357b542972f4f9950_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
78a20c1594092ab357b542972f4f9950_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
78a20c1594092ab357b542972f4f9950_JaffaCakes118.html
-
Size
27KB
-
MD5
78a20c1594092ab357b542972f4f9950
-
SHA1
7d41209ee2453bafd4a26ec51c968cdf934dcfce
-
SHA256
0813b2c3d77bbaafdae408285e271750a9761b115bc52e8c5e30e0278313cfa2
-
SHA512
22202bee6c09b888b745a8ffe3105698a28d2702f2f7fe53b551711e01c68758e30c9e32b9b9647b4219622c78eb69014162bf2b8832301232731ce2469c8cde
-
SSDEEP
192:uwL4b5naS7nQjxn5Q/NnQiewNnWnQOkEnt/rnQTbnhnQ9eutam6u9seQl7MBQqnk:WwQ/a/wIs5Syb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422962832" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA712ED1-1C08-11EF-8C71-D684AC6A5058} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2132 2208 iexplore.exe 28 PID 2208 wrote to memory of 2132 2208 iexplore.exe 28 PID 2208 wrote to memory of 2132 2208 iexplore.exe 28 PID 2208 wrote to memory of 2132 2208 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\78a20c1594092ab357b542972f4f9950_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a6f1a845ffc2ab14f7be26d44a5377d
SHA197b70035148d6e0acb5d87f0ef3b732e96365d8d
SHA2562cbb0e5a2677aeec83e7aa9e15b45bc62c232018965595e7755b19abf9033a16
SHA512d2cf4493f675bb535152dbeba28d3ab37d41dcad034f5d38a6b2c3e00885792c92fe857ffcba0a92b960241409bb81c35bdb443301d32ea5b3f0b129e27ada80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567ffe4fa793053b03ff42a1beaca8750
SHA11409ce46c594829e3b46c866c3971c8937aadc3c
SHA25621eb36898c93cdd7a7606b172108cfcea86c966d73dc5d8eccd7fc3f728308ba
SHA51237e023887fdbaf7c93ff92587fd75119eaa79a72919a862326c027202fa555979efb361977585807c9825c4cbd314d78774cb7c1b2aa0987dd59623a46135f7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4bc0cb013966d7dcf525aa2a72ae276
SHA1cd9330613a6ea656b9f31312b8db967c6d6b1aef
SHA256df04b792cc8e3cf403a02d9c7611bbee94cc2294eee5db9159e30a2173d73e7b
SHA5120e8d5b1aa18efda067bfbf316362f3f632301b3f86fb6c7a2b7a1ba4665a803d46228e7db86ec9859088cf19a10af4b98ba3e7172e21d9b2f445773d8b77787f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcaf40a3884d49148d155d19b6291165
SHA1fb95a3802c2217e3728809ee5c63a12d565b00ee
SHA2568d661d1cdaffa1ce494bf2e3c4ed32f1e90d62eb1d3d143b139e4f3affc6d27e
SHA512640c0b231207a7b1a451460fc880117a085b2a2b02cd9a9de13c5b9d6cf8b20027564f9bf1f201b7e815bb6ca51ddfe7aa30034ecb12d41e98d566845aa38e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b1c9e6cf76f61f05ef0f9f1c9933d0f
SHA16116addfe10ef45a6498e3ffa83458cca005f8d3
SHA25634d5e872525c48fa6c3d52d370499577452fdfa10423cdc9ff64e339b30f6c92
SHA5127044be9c9fd4abd75f0cd81dc77a565540c69f7365f9857a70be4b953382d454f42a6d88545e32d12c1c020a3735524c62720a28bc2f51d97321c3dad13fc3d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af1fd44ef25aa68ede29389ffab414bf
SHA19a443b9dd91330fdfdc6ef8f0cd5e2ab9373eb24
SHA2566789e195b07fa65ffc9cb9c568c5318f6c330f17c1ce15c23689506256e1db6f
SHA5122d5322df90c9f94795cea254c4fa98d8487b55527d02007d5f8f64dc9ad6bd218566b042ecb3ac8f0c886ec99f5b28bc44a0330063f39470e13a671466fc181a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5981fb2e32fe2e3e24c489507a35dece4
SHA129aad01db86eeac97eb93af6544ce71b142815b2
SHA256f9481c163af2de5649bd71d082f35df383de67972967d0a39c80b9e0bf6682a9
SHA512aaa402e9d40ca126496bec494810825e32c0163fc41634099e8be2892405992f578a22f61b37bff6bf7df346924b0d21de2a07c23eb32b36dce40583440feb6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e0649d0a22a898f351a64008c5be118
SHA10a44c90765250bddf2510adf4aa813fe8d207cfd
SHA256888e9c5cd3796d3e14b9bd37e7f25fc4e01f357cd1ecb7d25974e03b4b76af14
SHA51282db5cd1c6191a8f4eced1579e16598e09c4e38d59691c5cf674834e56eab3c3e3e9455578e1e528bf6a904328ea3e45ac25f8bda36d3a13f10927a216f99c74
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a