Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 01:06
Static task
static1
Behavioral task
behavioral1
Sample
7f05309f576353bb7cf6a95820f48888_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7f05309f576353bb7cf6a95820f48888_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7f05309f576353bb7cf6a95820f48888_JaffaCakes118.html
-
Size
460KB
-
MD5
7f05309f576353bb7cf6a95820f48888
-
SHA1
7218f05b49efb983a08a450eb7a1584a4ec2e7be
-
SHA256
5335a54ecb27a63d21cdb78a1131037debbb134b7c0cc5cd264eb5b1a2bc8a47
-
SHA512
e59a72880c464249685f10bc033e329deb36521c49aa8d360a6acb1f3c5f409409fe7ec001086d19d6b987e674ffc7957c414aacb315f68551b7aef3cbaeeb9e
-
SSDEEP
6144:S5sMYod+X3oI+YVsMYod+X3oI+YOsMYod+X3oI+YLsMYod+X3oI+YQ:65d+X335d+X3i5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423106629" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9D7F61D1-1D57-11EF-B5B3-EE05037B2B23} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000a89b608ea7329b0f073c3823022c7d8d98c4c59072b667ad17781ee6b9d5d039000000000e80000000020000200000004455251409593d29506666e254804263721dcd4ae4630837e270878a0838650120000000dd0c4aeda6d4c1722e893fba545ba35f02d095f547b13c093bfc1b243cc5ea3f400000008ce1677ec10872102d67868c6c36c7cc238205906414ff03fc4cf9eb45626965f095a2f36f41355f3624f0aef63fd4627c350cfc072f8979690983ef4042d374 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0960f7664b1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2076 iexplore.exe 2076 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2720 2076 iexplore.exe 28 PID 2076 wrote to memory of 2720 2076 iexplore.exe 28 PID 2076 wrote to memory of 2720 2076 iexplore.exe 28 PID 2076 wrote to memory of 2720 2076 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7f05309f576353bb7cf6a95820f48888_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f47ed8d08258f48d1dfb0cacc2149da0
SHA1153630777808ecf1ee44485072f56c73c0613696
SHA256627caa000fe503a764823427a152bdddd2434b5bb4237bf9238e974795e91189
SHA512653d516959eb4b4be7771cef1a37923721fda4c56dfdaea2940fee1f3bc2bbcc63f19301a6c4c6192a17a4d7f9da051c3cfcb5c3300493bea8dc88640f0bb1f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58b07f275fb770e167b7cb6886c1168c7
SHA1a874ab172deca240c058cbf27027c95af4a178b8
SHA256a74cd3a91cda07620b5c6a477dc60e99faf57c25943866051b02215571282195
SHA51279671f4492b46308ac16391ff9b6a5363913595624e36d13b759de3a0572a4ba941823f7846493d28a945efc25d41c571e1617a5e45877afef7e53e0b932fefe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58e28d011f7e77a33c75e8c249c0bf908
SHA1c30916798b53e51399ad1bb4c5eee5a37bf658f0
SHA256c92a1f9d9eb85282ee6dd5a20a244d9c191266f7c187f41f84a68f07a7325514
SHA51299fea86e8c41c4ada880c09875180a0bb7b5f5a94dc3752d7f350f450b96e4731d925c4cc4b9b274d2270d1a6e9c5d92c13211e92e308408f3876cfddfb23b6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5487d7d9075090f1c339f301c09e8089f
SHA18d67cd9500874c8a2f0033e6130d16ab850c2f23
SHA256aada2f1861e22020c56d4ee92864b92d830e658ba74db58ced0d0dab5d1c7e52
SHA5124d0ef1dc0834e22eb96ea1377533ff20456e061e6e404fc36861ce21a7d2d4f22f6262bffb2da351460784ba3a80016f5470cf1a6740779e8e7daa37d958a4fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55bc492ddd3592f138b7525261d59f6af
SHA129f87c0605c252cb92bf45a7383fc3b770292322
SHA2562d33a7df18307f81d003e5a6ee2a610ae4f52dcbd9b0fedfa2713765004d049e
SHA512bc3e81c81f083f441edaac536f17358c6b9ed93a717e1363795e3420aaeb1d4786df76b743e14f0cf4ac600077be26a271b4d750510ff69fe845d28d349fd8b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57535b797f786c24cac3a85042ef14554
SHA11ad68d5db92de47d1f2e4829cbd39da98decc8ec
SHA256a693f99cb2ee6954c1de660c17d32e491a5152d86e35ce4c1f43c3b41470739b
SHA5121da5ae7935d61aeeee8af5bcbc191c198ecf4aebbe0613a881ea15170b353c7be17ed9837350c50f53d34f977828d307a5986b0f8890345c1645520206ec4d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d5e499a38ac1ee287a1bcdacf01bb1e1
SHA15879c21f39e53175dbd8df51b18c748c9bbf747d
SHA2569e321977b17600c29466f355d547b28914b27e6bcd3a2f8b0fabc28c3d3ad3b1
SHA51205fe0062bfb6b48e59707c292b9b054cf14fb3dcdf8954fa070de6d04e91519a30c4200ab171466f8d40e7b2819e84b0662e57d338e4f1f3a4b798f4c0c9c9cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD557ce1a087f2a430e7c544690fa4203ff
SHA18b0c8402eb5dc7944d37ebd5d3354bc18442fa56
SHA256c35869d4c6bec34bc31ac601695da0a47946fd579a260eef16f8f703d6d80de5
SHA512d576d00b448eb11b8b68d37cbda27741458b79dbaf643ab70631f8b4d16f0e6fe9017bcee54efc9086d1f8cf6f56b3197c475f3cf66715d635cac53fcc94ca60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5385e84b875e49ba0dc39d344d3ebb820
SHA13b6571dd07e0b5b749020616747497c0c0d24a28
SHA25609c07f1caa76d6248ab24c8d089c60a8f7269e975aec0dadbedb5bb6eff16361
SHA51298179d7d3317e09f903cc2ec9938eddc7bafbdd3703adde37b406771e09a96b192119c05d1de6031fdf46b17e36117df2cf948d60d1aea6f801df2a0f6c042fb
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b