Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 10:52
Static task
static1
Behavioral task
behavioral1
Sample
7cb297a18dc70cbf4c7dfd1fcc02ebf1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7cb297a18dc70cbf4c7dfd1fcc02ebf1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7cb297a18dc70cbf4c7dfd1fcc02ebf1_JaffaCakes118.html
-
Size
19KB
-
MD5
7cb297a18dc70cbf4c7dfd1fcc02ebf1
-
SHA1
e1f786a5211632ce9130917876c5301ad170a7c6
-
SHA256
a84b7b04256e5e73f65370b9b30bda645dcc6e3087e3602af1da1e6d0cf41ace
-
SHA512
1915145ec778f55690bc010ff51739c6acc08be22de58672718c3b5a2ada40071509ed74bedfef6c2e152cdbc4a317df4116aaa03ec6edb4da453c35d6a48ab6
-
SSDEEP
192:uw7Wb5nOhnQjxn5Q/BnQieENn4nQOkEntbnnQTbnpnQmSgHMBkqnYnQ5VNnlnQVR:MQ/9qyLl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{63230451-1CE0-11EF-AB07-4AE872E97954} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423055421" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2056 iexplore.exe 2056 iexplore.exe 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 1836 2056 iexplore.exe 28 PID 2056 wrote to memory of 1836 2056 iexplore.exe 28 PID 2056 wrote to memory of 1836 2056 iexplore.exe 28 PID 2056 wrote to memory of 1836 2056 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7cb297a18dc70cbf4c7dfd1fcc02ebf1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f68e09885325614dfb1b3958db337fc
SHA1825b9a6da244a7eee0b7e10f38291ee449a52d08
SHA256a02256c0ead9ae439f5d0ce80fc4a434980d97474870cf3613825e552cbd80de
SHA512ef21653adf0a3b154b6d2adafcbcbb3510b9684c40db9581c8bdb8d491ec511908598bde73cf5cb289fdf136dd27440f5ed2f8145f3720cf792d56dcc784c8e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500a3d508bed7a64eef40e7182f500c46
SHA145608ac7fd3fb5ec40638711a50328cb63ecce8e
SHA2569f12f0512b59e2df387b58b9bad344ff111a502e3a62accb3a992991e880b67c
SHA512b2312438788982cbb0c69b64e9a2a317e4942d514215a318da20cf7fa4153cb935862270ff09028d7f93a6533423df926f857292d15bc80519ccbb47a2663fe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546afab38b1e51777e5231690045bfb91
SHA1688bd9bb958f38376afa49bb11f81d655524c80f
SHA25682d1964170defc740c867944dc38fdc0342b57ba782558f048f5cd9db2e3cabb
SHA512b54a42786ae100af1aeb138f7f619fae628eb24bc865fa859626faf4f7b3b6a2f6946cc1ccf8b761c7fc20185d2ae4bdb736e27186a430f3de258260e1df7cfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575ec0c95a7da733a9197425005f5cd0f
SHA1cbe3e618b2ad465f4b96b3daf10e5462152dfd83
SHA256fbd686087dd769e7de93dd2bfff9982a227b0d025f1e1a8da7e8f06c13d9bf0e
SHA512b8559dad5df3425c530bde19987bbb65c7bb3838c1b8d5e62b6ec6743fde2fe78c169ad9348ccb7bbdba568bf5a418f3eb26d5d104672ca485f2b51ef8c79ffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c1b8e85682261a9d661869881d013fe
SHA12a99a2faa682a7ff2af138a593a57f24bf82aa7a
SHA256956c8361af842648b28cf59b9913ca6542c61b27195560970184f89ac0648c47
SHA5123b2aeaff7a9be901ded15de5458e82e3f7fba605ae78ce1c1ffbf184c2efd92795442973c15db300160300d1c50f48476b00ec85e61c143b19775503f045cd62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fc95ec0d42e4316fe8d4aff0899575d
SHA1c81b3ef3f67246410e11f8775ea9bc48186e71ae
SHA2569a7a393e3ee63f92a7ae19da622b07f389eb9ff73b08f2d642f96d5600bcfb2d
SHA512fa3d7782a647117fc3e5a3a5ff6acafe19a7ff1c5ab1cbf62e0b47e78f3c09a506eea9482245aae7985e1a4eb916e6327c1ab029cb59b012143164e94bfdd4d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5760e5e15477c7f8ccfc56203b24a91c8
SHA14aa24225c0675cf2eaa15ed643bd59346805b195
SHA25669e6fb0eaab2520c22871802627e7e3ee80a377b624cec5a0f92c9a7932644f5
SHA5127c6bfcd0d552615de7f7fb8e95de01e255f772cc3afc180422c0019ac5413e26c616d620f796a2acba82b7e9f5107024049dda27d08bb4a54b340718f26878bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5c4f45f78ad204395a4e727b877036d
SHA12b91ddca3b30545560c9bf639efd16171c20d87f
SHA256fb8b45aecb12f7b8a9c5bb77121a052a8d4fc2d7f2b1c18d5320babc56cb6883
SHA5120b8b7f57b49369df68c04d36f80761b83abf047f630d549b2053be308bdcae2576fa2883044e0705984f26ea67c327230c0b893b747eddf3bfceb9b13376dfd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe6aeaadabc30a55cf3580961577fc1c
SHA14da109c61efae47ae6f7ff834ecde25f6077a806
SHA25654daf8999f33330b7d5dc8d9cf9ce7d2dbe65b519f2835573fa813833f13e4e0
SHA512becc8b65175a1a78238b425995979140578eb4a40ef147dbc188d1feb3fe02ef61361fe035bca26db69844d90064807059c838293d8f03dea136f31e095ce0bf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a