Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 16:06
Static task
static1
Behavioral task
behavioral1
Sample
7d8e47deebbedf606a34ac2f0c498a83_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7d8e47deebbedf606a34ac2f0c498a83_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7d8e47deebbedf606a34ac2f0c498a83_JaffaCakes118.html
-
Size
26KB
-
MD5
7d8e47deebbedf606a34ac2f0c498a83
-
SHA1
f00d9a551b56e54844317dd405eeebe8ecfad9e9
-
SHA256
9d100ff5c1b59d5d3b888385a7bc62f31e3ca050003bee0a96148710b0c97b6d
-
SHA512
653271f425526310df4c84180f3dc4bd4c9e0376852d542fea1e1ad5f9f55bca2341b21224abe01155099236361575db69af1a6e955e12b81284ed825b04d9c6
-
SSDEEP
192:uqKn3Ub5n62nQjxn5Q/JnQie8Nn5nQOkEntTTnQTbnBnQ2CJVevo7NtjFo+NzQ4i:nkQ/Mygc4e25
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{31337E31-1D0C-11EF-BAF4-4AADDC6219DF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423074235" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2868 iexplore.exe 2868 iexplore.exe 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2564 2868 iexplore.exe 28 PID 2868 wrote to memory of 2564 2868 iexplore.exe 28 PID 2868 wrote to memory of 2564 2868 iexplore.exe 28 PID 2868 wrote to memory of 2564 2868 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7d8e47deebbedf606a34ac2f0c498a83_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6210ab10c4b67db03487e08579b69c9
SHA1f8db60a770ac6da0fe63a867eae6c0cbeef74d10
SHA2562b22c68425d2a9580bd632a0cb19eafd3ee001e57fdb1b276e1308b87c2cf13b
SHA512dcae5d0f0917374b3f0d37b1af45520e4548cd3eaf969c7bb052da754f28961a655584bd50428629f385cd3b0985a4135ffc7965a4fbcd1ebc4f774b0c2e0e37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ecffc0023addf1bc0e47335edf16ef2
SHA16f3730b39351d9bee55696bd81bc2444038b65ca
SHA256eb9ee1806755897aacb13b493cced68f3ef71ca65ea6f241c618baea64553515
SHA5121b6bfe44976ce86cee0a5a6627d85e76c07f91d866fcf477fa0260c0ded2ec108804810c44de724c0b51e0d2f0ee938659a7c6c5b4116e12c968fb6cd25d31cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549d2e1e096f0a9ade934e2a1de016c4b
SHA1d62ac9bc6aa05a9eff08e2bd3325a8a299894e36
SHA25628022ba15f0001a2616f238addd232c056b5999505a5214d1cdc8be796acb460
SHA512b4ce1e98685e614fe66246bbb4d5844d35daa2cf6012f685d196a2b0305acf87362d2fafef69f0ac65fb5865f45efc9cb85a0a466e3251f2307b15e76c7ffb59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e723a96e2579a4d85f68ccba04db20f7
SHA1c1f43bc17bf8033ad5823125fdb0a51b0f16986b
SHA2567ab90adfd9c19d195c6eccd05ecc1f295f2add5046176783cec7631b6009f029
SHA512da5ea477edbf68db73e8b1013a9cf050b6bd765b47a4b2db384f11e80349c1a3cee339200d9107746a2aefd0e47104ce8b98c11ba1691545f421c1d8e73a3089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e0367f9a3314527ee702c0c8351be2c
SHA17ee90cf546971867b04a4dba31b563d732628411
SHA25600cd004f95d3bab56bd14e87683ad2da4b60f41e89ab41f1a7ed69bf8e2a3721
SHA51214dd860110e8c65cb71698ac38961d125a7f13264e91a4241107ae6b4eafcf2f7a0066b9a00e8f91f6048e869073763a8e1df97bbfc409ae5cc6ec38770c2953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5add4719f4c796511e1819ba06014a520
SHA1c4f940c8aad519722cdc239f2057309a902eae8a
SHA2567872082a662e34df038abc9c99b02e8d096faaf3ec198a83a1cff9955b82cf90
SHA5121ef024e43dea872e353eb4197145b9f53f868c81afe8de7c7f54e2c4b7fdaeeefca08b43ce3055fe0bec15af3391838387b119a900474158d1e30d1e405ba0a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed28019558ac68939e5548ace739acde
SHA1163e91f997d0e1e435a313069a65c967d880396a
SHA2564791cf648e5625c631ed5e465833a035886e12ce371333ad4635ea31872d723c
SHA512000e15322856e1a9bf130a8b44f2db13ff827a9f580da54c9e343f385e374f857a40f10e4269fc15e2b739fc4b76ef43be1945beeb1c2c8ed69faf5a4a7d57e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ee49bcf855fcf1bb814f98676389ead
SHA11364ea3d6d6c35c2f5df2c0b6d565ed92aa60df1
SHA2563d03e2ebb2f337c11af4a6d2a45df0c6bcd06c12dd5c76f645f037213e7d6d77
SHA5123c344a4df70576e42cccf03f47f591a98af7195160df69854185e9b84e3eaffaef3a23a723100187564b12fbd34a4cef4e4de9413282fc25bd1f3948079b8f10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529ccb3e56b6051686187919fbd935123
SHA1c68358c24bd2ac49a20a7794217a813086ef61f9
SHA25650c22af1a6af59ef8bba20d7b977d185ee8b95943061a4c323f8972141aadd06
SHA5120f0d940a979c7bf78c57bdd8cdf76e24ba896fa65e8cc5abe5b0422ee5b62d732605b53e2fe918712e38502f329aa0d01e9ef17e82e4c7d77abe6e52b462e17a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a