Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 10:45
Static task
static1
Behavioral task
behavioral1
Sample
78e506e46d4d48c36b846e94eba9bf7a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
78e506e46d4d48c36b846e94eba9bf7a_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
78e506e46d4d48c36b846e94eba9bf7a_JaffaCakes118.html
-
Size
24KB
-
MD5
78e506e46d4d48c36b846e94eba9bf7a
-
SHA1
a1c3c891fddc66b4ac74df76fb0d693e878bfe0d
-
SHA256
ae3fd86eb9bee7c78bd737065f14921734bb7cf9b6b3b55fd159b7d03704958b
-
SHA512
5a02270fa8cb559862e33cd6f9767c66e6659c77d7c1a74d5a34e1a123f0b4560d280ce9758d7152257cb5d7c1cf783f1dcd453c2730da02b6b5ed08874fa59c
-
SSDEEP
192:uqN7HRb5nW7unQjxn5Q/fnQieZNninQOkEntFYnQTbn75nQeCJVevo7NtIFo+Nzb:nIQ/zygcnnBE
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B801471-1C16-11EF-9969-66DD11CD6629} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422968623" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2612 2980 iexplore.exe 28 PID 2980 wrote to memory of 2612 2980 iexplore.exe 28 PID 2980 wrote to memory of 2612 2980 iexplore.exe 28 PID 2980 wrote to memory of 2612 2980 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\78e506e46d4d48c36b846e94eba9bf7a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cac61fb464a96bea79cdfea08e3a0d01
SHA12ed4562ea75723e94dd989e3c86bef656b2b929e
SHA2569b001c85bea79e362ba80d645db76cc578264325a5646bd192603b21b02efaf9
SHA512e7cf0a55f1eff541814c13fb35ccba7196e3bc0f5c6a968dcd5c12f4a257d063077448e5d2034580ba90fc97a51405421713bf73a120e7e3574dae4284901996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e29e4c7c21cafe3802ab5c7c694cd1d
SHA1bb0bc164cb5d5bcd05cdcdc28adb550b218332a1
SHA256a9a32239349a1ee5a13d4d48bef791af6fc2e55dfb4cf38f3b700d62634488c4
SHA51231863374158a15be18ddc6db6f3db5084e37b65bed49381edbdde2e444b330c90a830349e24934904a4b3a1bf566204384c8bf90b739db911620a7d3a5e5683d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a9af4a8a11e457610d683aab0e4b612
SHA1a71e4e63ac1ae19a3dc33d2c28168e550852a2c2
SHA2568df47690fc826bdea725ffbd95bff372f9c7a2dbdf4bb80673ecccb286a35c42
SHA5120074108a19ea0be6135e0274af711028a94049dd8a058c783290c87920425459d516182ce66ceb00c572f81b9222abf7b5dbded363eaf766daa15e9b2ba7a4fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5656bb05708e97ee173d1e9761dae1048
SHA18fa801574e7f6e30256933d25a744cf61ca3b424
SHA2564d1518c4ea83b52027fbe60cd73b1fcaa63bb3a5e491f7031f6e04b71d5ecd7e
SHA512df023a451154f989058a2988ca49843d57fa780e27bc665cf56c965eebb27b06add428384b421f27cb455041866e8cf7d2a678561f27a44967b89d39b15da1c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9bf20e1fee5630369c112a8d3aad85d
SHA1f44c62c15cb6f69bd7d48eabdc72c3985cd7e7ab
SHA256212bf8c1b237af1b42aa1a34f2bd107cdd96c2ea1e4ad0d33561720432db4614
SHA512506f248922aa6dfcc98b1e5c7c645bdbcaf7f14abaf82862041a7ebaf19728b0a4975bb72cd65830d7f6f23cd2958de1af41f7a63554e79af5e5e39ae6ab7bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511206a9de9a93306c6e520adf7d063ca
SHA1651ff27d72cc30f30cf8daa2f3bcc92648924ede
SHA256bda74e0905b52de016d6e9245303bc0b9612974c27452308074ff9d6664e4cf9
SHA512517de78893562a9deb071c5c3cfb854ac662aa0a5f865f5209afea946b5d2aa6900ef770fc48a71af72ccf533ad1495798aea3ad169b803001c5479ca428c208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6faea1464f4b157c772e16f70275093
SHA1ebd523e5d2dfec2f5dd89a0031d907aa8ba4b073
SHA256482d1b5a0df1052704de25f61d0ef1389e32f0cec8669cbdf9ec2fdf9cf1ae84
SHA512873ceb00393208d6d29b1076507dbabde3faf81bcb81567865c8437148f281f3273a177e949fdc3b98710defbe92b5fc48f6cfcc1e436e99016b235b7bcbf958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b9ac02252df46c2a37462fdb411511e
SHA179f0843205c48da8168efd3ffacd9d486b22ed29
SHA256a8b7194d8402a8a68c16cb95a84dff1c6579550b46cf1815a86a28f606d4f933
SHA5127ffd66e708085e7a46e5fc639094317f3d925eb543f563897d43fd97fbd55153741f21c508a38ad4c2c3c540d6e649f1f74b639779232e081606904f7a540141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7de87860745ffb92c13648187272b68
SHA109237090fe5899c0c6f4e8b099317bf09168c260
SHA2563b1cfea806837cdd9b2a0929ac4e604d4e2e83e799266380a0e07bbac0324dfa
SHA512dcaa6c1e1c61c4a9da495a2399359ec8ae44c3303246881fc464570f1139b6fc8537fb6452e1eb4c70a71a83e310abcc2db7c337127ea7567c4b1282eef95b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4269378bae4afe5c4a5a91c2ee6af75
SHA1c5c4322858d2ad754582140fba29df90e8c6df51
SHA2560b495d84ab784328af9e7ef199f131a1c52494ad55a5076df9bed4f832a6dcae
SHA5127739b79af96847210a9713197476ad8fcd27009a14af0f7f8a2675509e2558734f56e4eeb5267da065097dc0b1cefb259b74244c155da9113cf47de6dcb3bcfe
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a