Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
7e7fa798c9e380f94e4d34e0d7859ca8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7e7fa798c9e380f94e4d34e0d7859ca8_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
7e7fa798c9e380f94e4d34e0d7859ca8_JaffaCakes118.html
-
Size
18KB
-
MD5
7e7fa798c9e380f94e4d34e0d7859ca8
-
SHA1
d2a932f22439eb3515bca531cb861149f192c5e8
-
SHA256
59a02b9c8a239de8d2504765bc12a4e008b4ccfab4ea105ece2d1edc77ff5101
-
SHA512
2e3ebf74ee4dd442119f59916223072865a6af09cda7175bcd187652ccf971f1587da87efd2001b50b5f68ee3c96efee8407101eee09bd851be493c9a091f9e5
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIp4ZzUnjBhPB82qDB8:SIMd0I5nvHJsvPKxDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4CA7B531-1D3B-11EF-9667-569FD5A164C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423094470" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2776 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2776 iexplore.exe 2776 iexplore.exe 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2776 wrote to memory of 1636 2776 iexplore.exe 28 PID 2776 wrote to memory of 1636 2776 iexplore.exe 28 PID 2776 wrote to memory of 1636 2776 iexplore.exe 28 PID 2776 wrote to memory of 1636 2776 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7e7fa798c9e380f94e4d34e0d7859ca8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2776 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57773716ee9dd75cf27e331f1e5cdc5da
SHA1fb9a2b199959323ebc208ed34afa496a1799e84f
SHA2566bde8f46e4469c5d166ffd58008c859c26917b68ef84e9f0546c193e86d75df8
SHA512c57c9c4b027ff278b4c170fb8e13dc3608db10eca34edc8071cafda177c8061310500644e8aede8f777047b852e9535319d10cf9cb03b1364f6e4d4aaf36bf7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58831f6f50b02704b20335b431440c571
SHA1cdb34814642455980f81ca78ffb0497ec0448114
SHA2565681e146959745c2268a57c3fd8af7a5ce8c7ca7a9208edc981a5134b1b215d2
SHA512e77fd8ef115a05bf3288e38fdd5241280c4a72b7e3ecb6f96e333a9042d17a4620c18fe8b2955185f283c396f8d97282f61c93cd08ac94b8b98dd1ad57b6266f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54852761d8152aca04f96a425e44b1fc2
SHA12baf9bc738aee0857632a3ac202de64ff46236f4
SHA256c6ec8944730879ca5e9eeaa979598c65f94953a82e7b0a012166965f1231ac01
SHA512a86ca46a77e275d56be2d733b1fefbcdb739f690cf90af8ef65aaf6f6c7c77bcdd2ee6c3923f49d93a0d436397f8dad9e216d8806bbf50a57471ceffe556ebe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa905de6502eba4c8d61228d1b2d5666
SHA1638f47ffa69e9507ec33eeb9d105c4a800968f88
SHA256865923ac5880875790c669ae7603a79c9609e425b8d588a77c30383eaee10a6e
SHA512ae5f40d0892da47aed2ee526a8692641f0015c93a4ae1de83eb1f768b961982230b4a5e48e303c2e3464a778db6e2f6cd1bcce572d859bcb0fa1fe54b719d954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556fa469a8eb85ac792b48aad0b5bed7b
SHA1fb7cbc369128ef9b4dc84f5c140762cc17048d5f
SHA2568324b10bbf7a4e035e3dcfe3853ed4837ac53fcc0d2ab67e50cfc0e4ca162fcd
SHA51206bd85701c2c13b012694499428bd1b8bd79ca2281531409ffc55bfba4867fdf893095ee5c7fefedd743b9a4b5a2c7fe97e16f8661ffe7e2a3d79bea79848254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5379b6ec24272ff72ea9b63a648216e29
SHA1c6e17882dd03a28467184233b3978cab560b0867
SHA256970bfab5407b556b7fe6bf37d43464ef01d1dcb08765a8e1a1a8f7978a9d7664
SHA512afe353b4f506c07e6095179c5695751276d37160d52b701f24b45401fa62c34011ef0b5b1722b0997c59f4bf1dc40d5a29f61f96ce030e3d6950a1a9c53997e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cd9bbbe994d9945b2ecbe22a391f23f
SHA127417c90ef97585fdda1b6a2c922b9986e01afb9
SHA2565bdbb7c27b3d335edb30d155027236c278af10d8d9dcbb10fcb2e4bae8e1161a
SHA512d55522764e3dd22bae9560aabdf74c93091b70de48a586ca914e2eed9421303555fef922b222477ceab98c558cd6e6bad70fc2511e575e35f70f814b02bfff95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e57a4aab494c12a2b2888582723d0e0b
SHA1c1e5183a4925846d42db16c78ac93e76d2fe446d
SHA256cf148ed34f38100bc62254e1bf2a14ba33b1996fcae120a13265f95e27bc82c3
SHA5122d26891cf659f19573017503f12d5827581d13991e1481a8bca3aede8d6e8f5e670a87868e33b6738bcd7b45120d1d2e438b18119d246be339bc389627d542e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee10b6b68bbeed2f66975128839166e5
SHA112b621f473bb5fb35849f9d8d8cd1c43bebf5331
SHA2567c440536907c5c26b4fba218c83d24917b76e9e965dd903864dcf8f676f68888
SHA512469e10f11353f4e394ba85a1dceaf7126a59e349ae4c8f1ac8a084293d6947a76fed2e7403201496dbb64a02656ca92107ca96a1b153e6d0b37da10030d38ba9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b