Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 06:01
Static task
static1
Behavioral task
behavioral1
Sample
7bf395c8b65e3c620ad8dd0e839c7d26_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7bf395c8b65e3c620ad8dd0e839c7d26_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7bf395c8b65e3c620ad8dd0e839c7d26_JaffaCakes118.html
-
Size
28KB
-
MD5
7bf395c8b65e3c620ad8dd0e839c7d26
-
SHA1
dc36ea10dd1239ae2c649b835aa0ef239b02189a
-
SHA256
62eeb3dea60ed0c35b92c4747aca1109a686486d58c19181be521bc686a894c9
-
SHA512
b5089dd69f447034079ca36b6880a0bb7b9340fb979758992f4c7dfb6d293638946d48134d6b38630d9a888f6fad8d35177aa1ccbff8d73783e5aca6e96bf29d
-
SSDEEP
192:uwnYb5nQre2nQjxn5Q/OnQielNnGnQOkEnt+8nQTbnxnQ9eJJm6srVmyxQl7MBF6:MQ/E0DSVmzSxLRE
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C482DC31-1CB7-11EF-B33C-C2439ED6A8FF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423037975" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 384 iexplore.exe 384 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 384 wrote to memory of 2368 384 iexplore.exe 28 PID 384 wrote to memory of 2368 384 iexplore.exe 28 PID 384 wrote to memory of 2368 384 iexplore.exe 28 PID 384 wrote to memory of 2368 384 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7bf395c8b65e3c620ad8dd0e839c7d26_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:384 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bda31ca3d1d0c020ba3680d0840e4de2
SHA1fd9976dbb47f51e8795a02863d759331fb29e3fa
SHA256a52b00917b4914f1b805c02102e185ccc28f8bba763e60c50c505477d0bd9bdc
SHA512d0ad65c2ad1a94138cf59fba07bb7370820aa359648b4d7c414a013cfdb129532ad1990d4bf2fcacf6f7e1f735b07d4f77fee0502f87840fe6746deaa84968aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f3737688172bd0afe4695e93e51481e
SHA180364b4772e6b7841a59af65eb20a60b859d32fa
SHA256918644b963d4d534f7e6c81cbac0dfc71a8ea3ec6a8403fef33762a00e3d76be
SHA5124ccbd9527e56ac6d687b55c570609349936fdfc908249a38b4eaaf9f62a776a96777fe8a04f46f6fd52fef2662ad8adcfde6142983a1a639ed3fc0c29de77b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0a2a382efd8de2112cf9378df1ed8c0
SHA13795823c23550bffc13997a910cc95687aac0358
SHA256780d4db6dec7dcb6943978b52b12d5556461423a875de422410fbe588c043347
SHA512771111ff73b0fe3308387a3611af632f86f543b7b1e26e1d04e081bb19219b801bc18fdb8bd8610a47967e55c63b4927f476cae39fabad978ee5338d97bf9729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53003a8e8171dd2290768674ca57fc59f
SHA129c7873444b53931487e87dbf452e5c273161087
SHA256077f759e175d74108e7560823bdd2a0ab36031e81b60183d5d20714b439a7af3
SHA512405a03ad25e0fa95475797150c5e190058a5afc5b13d791b1eb195f44e80943265ab75431404d833453a6f500cd4bb0adc6e48861c54254e4b8345d42fed5b7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539315b33965eff712c1c7e37698fe1a3
SHA1d0f37579b0acbe89e51fd196bc3da1585dd045dd
SHA2561cce11f882d9c013efc7d6b8deea8f9f634d316d613d43ad32dfe33a4bc0c1dc
SHA5120cfcd050f39a5aa9d3dc4e1ae4cdece5824ebd424fe6b72c528a9c1840499f0cb09d0d374b344dbef7ab923208c5adeea127f0e59545a8b73f213b1105a5eaa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b523e56211f5c28125a11df98dc1894
SHA1bb6ef6c928e6871f7bb055d8f6218518088faf1a
SHA2562486dada42f7e55520ec7c44336d9e3dac5b721298842eb7756e7ed60d5df877
SHA512134aea8ef231dbc7027fbd16c24bb729f60fc5fc0ee88d75401eb59a318af6b0f54c3032d3c19f634beee62252695ba4967e652378f59a694b9c06bd5f462f28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58addce8884cb64615d4bbc6a157fd86a
SHA1f52c38612688455d1f2272cf223f01f8e0f5b7fb
SHA256d809fa8fc70dabf7c120785340b3a7a24ad97e5458d7bb1412e6f6110aa845a4
SHA512149306b7c57e6621a5018da891120efe56486aa21d7ce1ebbc3abe7fe1841ca8c0169ca5a10a905ea5d0d0e40cbda0c1c926f2591ce89bff12a8c50ee4b6333b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b339eeaad6f81f5ee6fb05fc1ce1c719
SHA105f206e4677d3856ce5aec358cc5584bed16389a
SHA2561d410637e5f61c7474ccfa9898fde33784ba11064e7cd96a483c0e96eceeb8bb
SHA51271fb1eda768e523acf29e82129542952ae7acdf52980d7b5b85581e99d84c7b59e9f07dd1bd42a830b281bdd8e80c2717cfbea286a088fd05357b9e77322f8cb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a