Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 09:24
Static task
static1
Behavioral task
behavioral1
Sample
78ababdf4134e3dac84ba77e8d46c311_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
78ababdf4134e3dac84ba77e8d46c311_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
78ababdf4134e3dac84ba77e8d46c311_JaffaCakes118.html
-
Size
27KB
-
MD5
78ababdf4134e3dac84ba77e8d46c311
-
SHA1
c4ecf2b584470daffd2b991208782e048338d139
-
SHA256
b61fd4cf3b342b94b42a37d995c939adce7bbcbf0a65439423a38c62a6d96f26
-
SHA512
f076699fd0415cea989825dce266da7e2dffbb80e81640a3cfa0f71fbae803f73b3de46580b4b5fb629a4a263d3a30255255423b3e46801dfb5ab5a785d0fb28
-
SSDEEP
192:uwXAb5nhenQjxn5Q/4nQiebNnLnQOkEntwenQTbn5nQ9e/Tm6u3Z7Ql7MB7qnYnb:4Q/3W1mZCS1uY
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F689C751-1C0A-11EF-93CC-729E5AF85804} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422963756" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 360 iexplore.exe 360 iexplore.exe 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 360 wrote to memory of 1680 360 iexplore.exe 28 PID 360 wrote to memory of 1680 360 iexplore.exe 28 PID 360 wrote to memory of 1680 360 iexplore.exe 28 PID 360 wrote to memory of 1680 360 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\78ababdf4134e3dac84ba77e8d46c311_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:360 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573e58c7cd52c2abcfe324cdf4cba86c1
SHA1bd1000ebf1a7c305256e0a4ae147093c884d66c4
SHA25677cc72d61b1ae88b284241939f0458575db49f94c16cc8dcdbc93af23f435110
SHA512e8e434b503d65e0fae9ee936259bb6b101efb14ee4414465a3f72e19b12816d39fb4972a3b8ace5ed9d95e3dc5b1a9c462b8b02d392d6df568dc879b96a6a0eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b987c894c251099687a5fd152729ad26
SHA15a445e31c769eef0d13bfceef3c600fcfab42861
SHA2561829a2b2854366340404371976472f5df14645c87b224681e8900fe24e7b45bb
SHA512e1ea82c2414ab50a3bdee8fdd7f900100fbd3bb90a04c2f497d79834b773c9747924d628168a437d482c13ec8ea4cdd8916b37643acb590f20c7d1e85b58a491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5882895da2cd1b438b032426edb6ef8fc
SHA16dd0ec55fac4c7501a26b89039d04353bdc026f7
SHA2566855aeb3b8030dfccd982a993ed6cfda1af891303a55b63b70406ec5d698df93
SHA51277d3b4a8964dbd3623ee28c917f59d8033c21fa260c01c802b89a818cc8b14b2a8738db05c29bb6efc4f21940373c90b5e4c745429ca33649edd6594ab196217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cf5ead725bc8498a180292fc8e53438
SHA1d39049a5cfc9fe5fff9dd14f09630a79d68e40ec
SHA256bb229125b665b7389b2bcd5c6318c13f8347a1ea6ca998a4a34f3105d3ca0e66
SHA51280925b5128f39a920bfdd4fd951c6ff8bbdb4ccaf845702816a8f508ae4fee0f94eede9e8c4091b15640b5da7bdd691022b3c88916d15faf795290daa81b4d38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5988907fb6ff63f72ed2692d1b713b32b
SHA1ec260e0cfc9974369ae7f96e597a1c6983897000
SHA2560e0dac464f2873b347fd049ae8fc9050798e5abce70a86e3c05306c7d256c059
SHA512d78ba39fe9a00a56658da8ca8edb4842b48fd7fdae4d35c208f5d8a143e5ba097acab63ce2768fe94116b857510cd152219dd0e9b60fad99de4a4a5d38632552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bed17a43f1aefe0d79ca1ea56b93cc05
SHA1620b48b21902ae609064b3f1dd92ee6d93092c61
SHA256dcab9af5f422db66289f8d530ef6d20fad96c384149cfb3886b0eff74763c2a3
SHA51202a059c648044e9be3e91819d30e2c9390d9a443edcdb868e9ccbac95d936fe64405fcc2b48bbce04861a29935f778f18fac77ac7d9493cefe049e2f2532f8e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50946bd86624494120070540df739a6de
SHA1977a1944d653705b30914686f2e8b2c28cd1717e
SHA256d001a6eb64c6949487251015ceb8178238ca4e302e5b24d3d9ed27a5998fce96
SHA5122410b505c5ff72cf30a05acf7b90fe1cb49cb4b223476bd79a880df97e2a170969ac9cab542cf0ea89a9c0494b0b0532f48f24bed1b3f0886a8896a81f553542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcf88b3308d5139aa27e94f9137d5d35
SHA117cd673004faff7ebfb686a06aaf0788bbadb691
SHA256e532642dac5f58f936a8a93eaa5aff00be64f8e7f3ba2090cc3cc7cde54cb14f
SHA512993865e34df12e2e14cf3a66d32ccdadf897ad8e3c116117c7bd9ecfa563b343c1f054ec88122a7b2d2eabed0bfcbdf1ce15585d4897cab8666c64dcd5fc9a3b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a