Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 06:35
Static task
static1
Behavioral task
behavioral1
Sample
7c07c5318ff31fb5111781a7b14a2b77_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7c07c5318ff31fb5111781a7b14a2b77_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7c07c5318ff31fb5111781a7b14a2b77_JaffaCakes118.html
-
Size
22KB
-
MD5
7c07c5318ff31fb5111781a7b14a2b77
-
SHA1
2e660b45f2fad386dd64063245d96058e8025ddc
-
SHA256
5b817d31c6b327c93e438bc56af6b8e328b9d0b77c65b27d3146aca7acff9205
-
SHA512
c99f280c5854745ec679f5828c13930a7e0c9f32acce587aec4e89eeacd542a13b63206f104f6a3c69b3fc4afd99382eecae6190189e7c9972c30c64672b33e1
-
SSDEEP
192:uwrZb5nQNSnQjxn5Q/GAnQieyNnLnQOkEntgqxnQTbnlnQ6v06J4RnQNjMBSqnYq:otQ/GHRv06kwmB
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423039982" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{70C1A131-1CBC-11EF-A5A1-E299A69EE862} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2008 iexplore.exe 2008 iexplore.exe 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2204 2008 iexplore.exe 28 PID 2008 wrote to memory of 2204 2008 iexplore.exe 28 PID 2008 wrote to memory of 2204 2008 iexplore.exe 28 PID 2008 wrote to memory of 2204 2008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7c07c5318ff31fb5111781a7b14a2b77_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501881ed6f31be37e03e2a71acc24603e
SHA152e5bcb325daf60f41c87412dd95cf73513f711f
SHA2567bd86df2bc7043672595ad76f54da7d211b4930d044d8d08fce14d9215fdbb11
SHA51240e4792c20c894b16fe4c03de6ea395b4d5c77a0727d820782190f9df5dc3823dad2d23b24e8b80c4656ec314dd465ed06ef55f93d749dc50a6409a70d889acc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5215647b7856fbc1ef1f0460159a4e557
SHA1685a6c8e95952c994784c98e363691055a3a2d14
SHA25638939b19ea64eca2e107598f82d5d2acbd0a55099b885f91dfcb5a34570a773b
SHA5128b96102ab473fc70aee98e12543bb671250c949b6ce7d164a6098b8e5b663a2c8f9d1e46c0ca0ddcfc8d5de774f29ba13a1cfb200732e7ef251a09f183f004fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5afafd3dca68b2b5320706efe8b1bce
SHA1b8585c78e69370fb8d7254b09dc6b11db9423231
SHA256ed2e6c1fabec96e904cee1392c2aa8d2717d272f0ae3c41481cdea0ec95c9e50
SHA512da71a48710e668b283e00f56e91627b2bf526cc1f04a06f3eb93b76e5099d6b47f7ceaa8dfcd0c9ab4da031dd2d7c229b2a9114149944704712254d9aca62d02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e4d36fbe10752caa9cedb3d89982e6d
SHA11a273bc37d55c8a48723386ca8ffe97062800cd6
SHA256b46a261b8c59b3fd274c943d01d9cf38dbacb5bb0dd995bd7e68534203af6bc4
SHA512af045c8e01a36ead822cc30d11cca1f68bf6e9031d24f41417981cc14a321708c4cd1140c1962bb4bac66946600d57d3c78a4fdbf560861f4afac45678f97020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cccf024a0aa5617b6e4854155417f58c
SHA1d56cef54261b55ccc00a1d0da0fda1214f1b623e
SHA256539ed350562a8674071f72a02a01c3524affdf0555c3723a9166708fe4b60251
SHA512dcf25bb42ebb6458bb105a9447d8b8a1b3a31cf30a199d1b67a57d7801ab4e1e260acb9ecf350db3e79657f9c2f5218557f731d8e5d1551bca2f650e77f8138e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533f930605e7ca408d2d87fe678ac26fa
SHA1b119e05a1db714f8f3423e25a5a9f2b4a50eba22
SHA256f2404aadd1fcb93e19d8e55a056d1a985cca960a831578a1617405e9c8040f9f
SHA51245218f00b2d21d6753b0201ab10dea3a9f7fd84533881220e286ffea5062d96329aca213b591d13243a5a268158c86428d55841dad2a692e6f89435ff4b6bb22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cab1ef720958979a5083656bb19abd49
SHA10d6b1513ff911010bee5e3606e44b5799d009262
SHA256902cb5041a1d6386674ac382260dd764b49ed5e6f47bf8dc3c92f25dfeff2762
SHA512c8a165a5756219f6d7062bc0c45730fdda6ca0aeac365d5b0529acc6b26c33d10da6e2deb810b856226b8e2f6b03612a5b76f3ba6059d5bfd7b466a2060e1ce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd344ae699cd0146a928f17ebd4b7e7d
SHA1f5af1a8ee9390de801b8c3df69cc84295a995c57
SHA25654c96def8766300ca509f6031bd89f1a620cd7c5c262e822206f729793e75ff5
SHA512ef434cb2241c462a76df3be1f0d2e3671d6cb2e8d8566a541758bb41af70828c8a20c2064fbbf5d650209e8277c9cd706071c63c853cb6874e9707254cbb4c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bb883bdfc445b81917faa38df9aa230
SHA11364a99d5ce39898a953a32696f733352226a80d
SHA2561586f5b14279e7d129ae5c51168fe2f9b41ac8cd869d5da163c6268ce4b5e450
SHA512afb50f4bdba4647f86c4218a238fcd8bd2d403907229434a357db24e02e88f339449d4a626e396692028c85288ea5527845d57b61faa0868eeca9aa6a5d66cd4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a