Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 10:57
Static task
static1
Behavioral task
behavioral1
Sample
7cb73b2702df5a5de454e77d9dbc3cc8_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7cb73b2702df5a5de454e77d9dbc3cc8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7cb73b2702df5a5de454e77d9dbc3cc8_JaffaCakes118.html
-
Size
27KB
-
MD5
7cb73b2702df5a5de454e77d9dbc3cc8
-
SHA1
4a573e7b85645654f4e6c32fc663269660eef173
-
SHA256
962457cb07ac4d422d40a32b230cd3b9fcc313741d6726f7c0a3c25cc7ecb9e6
-
SHA512
18c9a14e703f6ee7489aed5372110f30514a8f843e813b8b67f525f31a4269e79439674e3a530b3c68ced32861c233a39d415ab100ae6cf2037e171709307546
-
SSDEEP
192:uwf4b5nO+nQjxn5Q/9nQieoNn2nQOkEntLjnQTbnRnQ9e6Im6up42Ql7MBIqnYns:nQ/arwo4BSyq
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{24D28B21-1CE1-11EF-AF55-CE46FB5C4681} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423055746" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1772 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1772 iexplore.exe 1772 iexplore.exe 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1772 wrote to memory of 2656 1772 iexplore.exe 28 PID 1772 wrote to memory of 2656 1772 iexplore.exe 28 PID 1772 wrote to memory of 2656 1772 iexplore.exe 28 PID 1772 wrote to memory of 2656 1772 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7cb73b2702df5a5de454e77d9dbc3cc8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1772 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5584dd84a5ed8bfb83275cac6842a78b2
SHA141e22c69c8f2b5df0067b619ccf5a2ea8afc783a
SHA256e83d67e972b863c60c5b005b8761a00b892bce2cf9ad2039938be5864ea2c4d2
SHA5123cd2f5dcd38f6efcae0640a2f1fa0c92c45507304891308343cde19558ffd38a6143713a146e6cc022945754e09599ce3cd2d175177634b73cb7be0945a6f02f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf4c4f08873c2bf30b4824061d5e481f
SHA1af4e3c2ca190e7a80c555ffd2c0cdb25fbe6135f
SHA256abc71630863ead12139e6f22b91bb61140495a05d5c4d4871e8d3fdf73c16714
SHA5128b2afa82133424635ea5d62d531adec488b34a2abbf559998526ad31e6e0301af75b845ed12e5a66bd2f85093eee495718a80849ca1938f9c05ba6ce65da09f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aee4209cb5eda921f2b723dd5f70bc16
SHA1c2ff5af25850e1b36199333fc7713d4bf4256ab0
SHA2563a0ea54dfc9f0ad85a3e26c790544bb322ff4c70327b1c2437fa4ad87a29f9de
SHA512dad86bc9fbfe97bed6e7a628470fc1d91b546386709b9ab7daeca73bf09e18b418bb235aef374a06dbdc2a76852fb0a4f19623d2f46c8e6977dd81f2be1947c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c11286190c77e8e26be7e399cd5cfcc
SHA176c685611ca3c1510eda125a0267f8fcbb3712c0
SHA25662601d187c8671e60867e2a19e24820d4fb95aa71406d93ee985a741b4daf8c4
SHA512014ece7be51bdfb8dc0964c6d9b753d9ed64ed147f7885817cbd00772b34f7e3a5dc0f17e8405c597e9a4978e158ab29bbee6e0bafa0fd29eb242668a9db7e3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be92824d3e942c14e4d9299f8cd7a763
SHA145339c34c979cb5a2c9589b80e56b6250428bfb3
SHA256865b7ac9058605f142d8bc5a0855cc694c22e39c17c364ce4f161f7acdd99961
SHA512825b9edc2229997c023fd111ce4de20ac268bf4070b9992ebac07407b491f2ea44edf5b2cf214b4e16c5c70ea7bddbf1fa2ac7476a02803ce11a43d85ec06062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5845c7f606d96c299a5f824d153956cfe
SHA1402f6c75d140c6d06d400ce66137e6dbe489602d
SHA2568014edf178d965a0e10004309fd8a2a0282c07e98ce2e36619e161b09a5dd128
SHA5129fc730491a3b95026f65e7028ecbc18bcc3213fa37f1063cbf3024227ad663b36e44f017532af1300ba4bfd5589fd0532752479c5efeb20bda523834a7ef1b69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7654b71f725b3800519979cf379d902
SHA141dd86100c321fb861c151510948ca126881a6a3
SHA256ef6d10a1a3288f63f0de6ed1d7b590901d5057081c5ecd278138edef912b0202
SHA512b9ce8cf47850d58e8195bb666902e79ea84d380fa671338896b4cc999c642e655bcd9feb1ff19e056365b205aa56e7b8e37a8bbf905263c385b857c61e80ea09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503ee8abcf8ca2d3554e2f708f7aa1ac3
SHA1c1d4fda5ac36de99f95d9c0b91789a1b0f30273b
SHA256c4db8de6fab2cff010c442e33fcf6175f34a23b2010ee6720db143d672db0b8c
SHA5123dc295dcaa23c698803cb5e8bc0968ab83a4d83f609fca893314b2d5482b83d6f68525947d0f58edc285494731e6c0bb9ef83acc95e96409d0d9706ce2b770e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590d9a0d8556361113a94e61717775a5e
SHA1dd2121bc529c2134b3bb4de38e083c9ebc507764
SHA256dd3ba8d2256241486a1ff2f7acfc11efd155d6c507fc93fab4ad084def18631d
SHA5120e63975174c6e2fa990ffc5efd74dc7afa09bee6f5d78d2736f55a8f863fafd67922bcfdc631bd5062ab986bd740327b5022edc536ca65ea728c1190b0e0b220
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a