Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 18:57
Static task
static1
Behavioral task
behavioral1
Sample
7e071063c7cdb993eb54dc24ffa54d73_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7e071063c7cdb993eb54dc24ffa54d73_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7e071063c7cdb993eb54dc24ffa54d73_JaffaCakes118.html
-
Size
40KB
-
MD5
7e071063c7cdb993eb54dc24ffa54d73
-
SHA1
4a44b7cdf068589692f8de14a836eaeb8e10377f
-
SHA256
f0bb600ea466e2561ff16294392052d9f068444a71849a6cbfd15975c903abb1
-
SHA512
01fcdc45ee024885b19a02bbe5f41aa743e15f28916b8943c2c678e14a5c4f94ecc7cbb2eba07ee871f69933fb7e72a134a1886c9c4e73f1dff4233be83f8c80
-
SSDEEP
768:V21oHPFWmTJq4jIjVpnUuJAgcWBGbleEtNudimk5lrD1iPPepSLIdL:VwoHPFWmTJq4jIppnUuJAgcWBG8EtNu8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423084500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{13F95C01-1D24-11EF-9E38-E60682B688C9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2160 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2160 iexplore.exe 2160 iexplore.exe 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2068 2160 iexplore.exe 28 PID 2160 wrote to memory of 2068 2160 iexplore.exe 28 PID 2160 wrote to memory of 2068 2160 iexplore.exe 28 PID 2160 wrote to memory of 2068 2160 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7e071063c7cdb993eb54dc24ffa54d73_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2160 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD58f7e48b63a87a984144610e192ed4433
SHA113bdd36224830b0f6af6f34a8aab299abc1e79a8
SHA2569c7f0d51605fb3c1ca1972b8197ff44ac5c231e37bb440c66ea0a36f7d8a1e7a
SHA51217a1fb0470ceae491b1749007f42c3751a421296031f71811c04138eda13a008f6df5901d283001a55fa5448c4da85a002cdfe45e70ba96c1c83e754f5b4c2a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb6c24286d779615d46ceae34dc0fde0
SHA102e94cc577244adb4ac821e5a00e136a8855493c
SHA25679af6bcadec06339007d90c9c51d29062c34853961a0554706453529a79edf9c
SHA512647996c0ce1841afa4c37cfc1c77e1d41c5c887312cac0b975f20a6e63acf30a8e13245f1bef13da7a564cfed4563a8ad0d245372a4909f516bd47e194104f74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533b33eb27cbd9c971baa4721e0fd6d1f
SHA1a311f5d66758b080da888bdee2590bd8060af8f3
SHA25634d13dcf82ab215851dc89335a6e395a86c2eff2cb4378449267a3a519d7d92b
SHA512a67ca1e65bfa4d0d0e6b3b39a898de3b271d3d582cd49bc5c04660c2a6f06a2952c437b4f74855d57f48329e736d05095ecd3b634b4598d9c7c46246b142a2ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cccf4ce9968b3a9c96c34e38e51b65c9
SHA1898c61e56a6791706c75a9f01b8b3623a64b8a8c
SHA256eb07e9f256978b554dbad6d76485957fee4ef49344aa1bcd7d01ff706b0895bf
SHA512776ee08a2e4e451bd2783cba2c8bd23a625bd141c78af6006a27be8f2c7048810f04a5167e8d2ffcb3b23ce487c938eda7c573a8790ab9f91de4474167348fa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bf788af315337da4c6e7b8490cc1b55
SHA1f224d33e85d9f741a12dd25cc34fdeb1f31cdfe6
SHA256344629841f8872a626eb978b9a17bb455bfc76d80d8f9cd28a968184aa76ccf2
SHA512f4e9fdad0590cce1f6895cf2bb9ad474461cca95168ff1283e88a92bbb9c17dabccf2d148bd1575db9f9644ef87441bc78418e1ffccc3f8f9bb00bfd50403ac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5551a7d74c7684d54ef8a725fd62419bb
SHA1894050adbd9a3b1a8276fb5f090994950625cf50
SHA2562ed81d02d4455b7a234632c749348f5866d2d7d9f371b1b74e203a73ce3c9f9d
SHA5121c35ab02e7958adb1ea6fb4f7761c268cf037124cbab38ddbe639952ef8c1e9e9bd11b6546f69c586adf3ebe5501c1dae393b9468775b5f2d64fad74dd4d5481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff99166dce3824fa519fd6b705e1c458
SHA1d4438667d2b6c8071b89257469c1bde79b4a5a7c
SHA256dc32cd2f2d27e89551aa8476ed8f68ba5417a924811066f6bb4feebedc06be87
SHA5125c2e2d802a37a99671c3ec793940c64f57caa07aa9e2e1be2d9593ff0ae19425ab1b7df7ce09f3d43d32f0854831c61529bfc95714d3228c5e81a5a824da8ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD57a0099044aa0f63f74e01839f1a888ae
SHA10a016d9b721f2f0390c761474dc72e88b972e0db
SHA256e7284f61d588d079b1ddebc5497eba316a5ab96225c1bba910132ce1c34ca76c
SHA512fbf7cfecea408c30be17f106b83368cabb139d92129ad6b9dd00a8e610449f9c4837b4be7d7fcd779cb78e19193ecd01c8553b98ba802cdf7cc8dab7738051f2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a