Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 06:11
Static task
static1
Behavioral task
behavioral1
Sample
8341fdd7806d9ba222aea6b7bc6042b1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8341fdd7806d9ba222aea6b7bc6042b1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8341fdd7806d9ba222aea6b7bc6042b1_JaffaCakes118.html
-
Size
18KB
-
MD5
8341fdd7806d9ba222aea6b7bc6042b1
-
SHA1
7e1d2d5133d7d820af8f6faf663c5d102c49a7c7
-
SHA256
787b9ccc3c2887244b70acd8df69272f384bddefff915060f185f66664212049
-
SHA512
f226ed142a74b7766f098be4c4ec09b614acb9e48bedac636c5a8f5bce5cef1459683541559f1027b1045877a7d2d1511c8d5938be5845464bc5276c963234e2
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAI/QEUyO4Am22Mutk7/zUnjBh4/w582qDB8:SIMd0I5nO9H3svclxDB8
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423211332" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{654F6811-1E4B-11EF-8E23-7EEA931DE775} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2796 2872 iexplore.exe 28 PID 2872 wrote to memory of 2796 2872 iexplore.exe 28 PID 2872 wrote to memory of 2796 2872 iexplore.exe 28 PID 2872 wrote to memory of 2796 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8341fdd7806d9ba222aea6b7bc6042b1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b48252878ac0e9e721aa2d73f3bdc6cd
SHA116da55fba2bdaca95896467820f0555922d490fb
SHA25611088ad2e4be75d802eb7886c79a76a78f2c1c8d4ab4dd071790d0a60b131df5
SHA5127bc2093326607fd71efdc22da3eb75d8e62c3a2005e56c878a735575185ffa38ee94d70ada7cb3d1bd0d00923ab0e572e88984b8e29ede79a271486e99c81983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2972cf88aa2d2474b4eaa837e934f8b
SHA1d6961c6ce6d88499ca60318179e641ac45502aa4
SHA25672d231563276200558f1f22dfe1321c606ab8a90c38a135920ef7689bac22a8b
SHA512f0023840e0b67813ec6517adff844fb55bc489a1ea2d3d7c9961e6dd10bcb91dddeb779c319dbc5682bbb2ce2187c0fa1338cf6c766893268507f11ed6f20a97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcab936de0aae59b77495dab7d16bd25
SHA1572e9f71ba5fedd1e8e3c30bc2b5ee812468aa63
SHA25679cd4490f07a29c9e71e27013a7e4c6d611c5c729fd8ccc27d5e40b16bd6c393
SHA512c1c91f551a786839a7b2abea11630aa9e3c6033859d28ae45e78926bf63e4f3dee2db5d91a4d3bd1aec5dde2f8ceab143e655b3f7d183c7d5819bb018ffeb9cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae9746d4760a37e77da0adcd97fafab8
SHA10112a9604e456d32915a9464c5e83065e8f02763
SHA256d5b05d36c883cfc394ba029bc639146501d98f6af15b0b662c6405787f08bf25
SHA512cfb8a1f1623ed8fa2247ff22ab10b5362b73a704cfadfa17f4e89e485001a70b8fe7411f7a112b1a5fca67801e300e768da4a06369250b082d61e8851bf090d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd6c435c375570c45011f59dbc87c623
SHA1d1aa8a6cd9c9558ab2170de993448c874debd407
SHA2561c94da5a1eea752e0fad84c55abdc19b3e2a4b791ae9f6ac58ea862f7db4ac88
SHA512f8683c7ca96c92d5aab8c7e6b2009ce12b9e2fcc71ccce26b3b90e1dd2224cec915a2a2a23940a5977128ea4b7f568819336060c10c46ab8a21c1b85aebfdc4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5042fe08f465b798a54e0fc9b848a4903
SHA174d47c3dcc690402ee65beaf27184fa41f27113f
SHA256e1a91fe99395a0f016caa0e800ff4ded2fa1d5174ad189b174ed19a794c6e745
SHA51235538360734dc1e84ad1b0b3f5cd2b303bd050292bcfc6bb72c8b9bfbdeffcffd90b5b73c7b2e362b1eadd0483c60ed37ea6b3b55f0bac103d1de7bf9d6f508e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500dd84b280678055533c00be7f416094
SHA15192b23b1d6140f8c7e6b5e1f209a0ad8d9ddada
SHA25659850a11861b12eed50ca9f46fcbf5ef02328865386e0f5249f42ffbe1a510c8
SHA51273bfc5815d7019483ca8d9f826ceead22e2db62127a1b933bb5d6a98a8955f34147bb694f88816c28b4874db221990f4e665e3aff29c23f67c62339e56bcb384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538fb57a959c743385b8d1a1f4592369d
SHA110608d03103e8f2704d0180cb7e63c18b56a1425
SHA256f04cfa2d87f52146de696a2b5fecaa8205d74446fb82075ecc3317f361e22610
SHA51280896ae4771ffed2e201cfb6bfd8276528ca70d52b7527335b8bbc00350484b2f0703c7b4f018792e9db7b0327a1146c413933d2faaa543accd96087fe972aec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c71d10ab8420c5aab6854a840a062aa2
SHA15f7fe82b70a72de3d299771dc8aada3e3c1c909b
SHA2567b70aaf3347a017921b24e7b46dd82ee4e7a5169d43bf2bba15a3333bedfef51
SHA512e7e86fbec38a28ebda68389230da889d3b0c6b496636e34fd26490aa35772ec8e91edf403155a612471bf1b9551065b73b7b6cf6f32466230c8ce30f106c2c56
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b