Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 18:00
Static task
static1
Behavioral task
behavioral1
Sample
7ddd97e800e9d1b2dc86e6d347b01cd5_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7ddd97e800e9d1b2dc86e6d347b01cd5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7ddd97e800e9d1b2dc86e6d347b01cd5_JaffaCakes118.html
-
Size
27KB
-
MD5
7ddd97e800e9d1b2dc86e6d347b01cd5
-
SHA1
c81f83e42726aad214828b3aca5f228fc3b57a93
-
SHA256
376365a936f58d42c2059cabcf802b0b27833d4c87c66d3ee386ed4f26745aba
-
SHA512
4fa7c34d7601c68995cd24242813ba28a7e6bc22da82dfb0e3bd0a8a5935dd3651f3b14c06021d1f551a4cbe5ae537ca33f47bb58f35c0f20c4eb402f7605156
-
SSDEEP
768:douJ90dTe9gOkUb6XHIhtmb3f8dfQ4xxkkydtKy9L9d06UVIJijhpz1yUl5rxUJc:douJ90dTe9gOkUb6XHIhtmb3f8dfQ4x/
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3D18FBC1-1D1C-11EF-AD44-52AF0AAB4D51} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423081126" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2740 2400 iexplore.exe 28 PID 2400 wrote to memory of 2740 2400 iexplore.exe 28 PID 2400 wrote to memory of 2740 2400 iexplore.exe 28 PID 2400 wrote to memory of 2740 2400 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7ddd97e800e9d1b2dc86e6d347b01cd5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d873bc7997d4c1dc1fbf05217da762d7
SHA17c287e1920db3b24fae550472aef848fb828a531
SHA2564526e8f48e1a0a1c6915012b777cdd60ecd7b638476e3ca29077e39d60b3776c
SHA512cac6e9831c1980c2fdabf6c6d826a5ad797b1a5495ad1dcf7f7831cb00ce52eb961a1771cb9ceeb7deb9d2fc6255aa6337d54bdf4d9101bb7149ec3c9feea235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4d7bf1fe69751f343a1c665920f92c5
SHA1e8dd87c08ce641c90994a27aee41c499af7f517a
SHA256c9d0c0b4e14f810c19f22b96fc22c62cd79cfa29e7e436023864400c844dcebb
SHA512778ca39d655e7a6db69ef3ac099d13cd5d01af92d8bb26b706cfd82d4927b3f52fb73805d9873c1d09825c9ab5fb28900a611336f2c97cdb57b72b5b535e80ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c382bc91c978986e4e4dcfb28c44fd1
SHA1e54055c92435a6be1b7b65daa100359e335aa377
SHA25628e78ebf60e7d4ba9665b06f0487857e4180f88983d4ef37aa05111e09da546d
SHA512507874109a67a6f0982dc605bcdaa2e4024414e1970d780fc380e174731f5674da162e77702b5ac61f5c143c0373bdb2a9a1a8f37b92e8731cc3fcbdbdf2a309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca3f7732e59fce351469b92443c1315b
SHA16d45a95a1085fd399ecc3406fde40806112276b3
SHA256ac926e4b8b001bee9b9ba8a822b5af057faa4651fe103b43bca092c96941534d
SHA512f67aad3719d54a3c37aef91a7836397c8ac47a57755b4ee356485c90b15a784630a11c537f05884e2e529787e8ec84831ebdcc02b6a2f02df154707ac6e91328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3d1833e8ad56ee185e7aa7b29f78b11
SHA175141b26a08c4c19a06197388e9fb0356e120304
SHA25603a2c75bc880bef81412eb304512e294c6e4fcf075eb21fa4f0f6a11b1f2a721
SHA5123a44527785eba40227680ba4baafbe9ccdd921b18e3db0733395b3da07763e08518473d4813b2ea82d81cee77d6c4d7a82c5129a60977028b5680b57a770fd43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5862a8ca8fab9e09ce2f680768a53b51d
SHA11820897063352b7a225f65d69e74ff7e5f8c1676
SHA2561ed0e42db7e2e4b4fb4d32068ccda0b1dfdf3e4de06a63f472f636724a15d48b
SHA512b5c5d788904e0393e54f22299f79424b6ca680d20d10871d36fb874e479a3da5a1627b8bd85a32f242247771f9ac8a1f8da50989b8cee874875e45f087a17384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57be4fb60e34e6c3efde4219fcf857b8d
SHA15a4f84ead7b30bd158d3b2c574433bb453430a7c
SHA256b7150d7c4db18cec7d86bde24d7eb0e802a713bf90272d48ac0fcb55fcb4151b
SHA5129e4cc37f7cb8fd840ebc3fd4a0549438b75764036a06d586965d53635a68a6556faec4ee434165848a97727a08b4be34059805b479ef673b40c03f9402f5e72a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5067b636d7375b7ec4b6fe573c4acefb8
SHA1bff0f3d0bd28bd5114949a755c6f6aa4f2364117
SHA256ec64d600bee7f35ea610435bc52ac8dfd5c33212b8b6abb14c8453ca0f9f92b8
SHA512a93b7a7d697ba55e86cf40d44021f404f16f9fb11561249632ab8a27c134f87c11fc5a9da70c6144e2786f3be8fc2b0d32ea46fc2318815d404837e1781befb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a072573063ca5d53542fced6c75c1581
SHA10fa3810f8df5c04c084fb43112e85d1255b7b248
SHA2566dd5671be7b2f9a0bfe7f783cd5ca86fa56e2c5f9e7487f79a6d42c7fd753bcc
SHA512fdd1a7b4e551cdf29d362dc6dac06dd57fe3a482a9c7a08db4122a46b9f952753c6d1503f11175a855f8ae7ef821a3926f7dff575b67214873f2c2219b2d3701
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a