Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 01:08
Static task
static1
Behavioral task
behavioral1
Sample
88efc3f1b3e2f01af82ba7c48a042e45_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
88efc3f1b3e2f01af82ba7c48a042e45_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
88efc3f1b3e2f01af82ba7c48a042e45_JaffaCakes118.html
-
Size
39KB
-
MD5
88efc3f1b3e2f01af82ba7c48a042e45
-
SHA1
2b0a5abaf228ba784824f6d5fda9b878d7f99fcd
-
SHA256
06b83468d553ae71c7ecfeed7ecc639b5e923e1d4a5dd6185e8cef587f49af52
-
SHA512
8158e656ea4ac71f51a777b794cc6e14f8c255e3d6f0c9b1d2b2cbfc9bc1a33f1d1f24445613ffbe8eab2d71dab69287a8745568f5218c75d37d8f94fa3a6185
-
SSDEEP
768:nuzHzWVdcHAh3MXhtHvoZovfM8vLjxW7oAeLFyqPAQ+KW+yE/fmhfOl3:nuPFadnGLc+yE/fm5c3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{820ACE41-1FB3-11EF-9E38-E60682B688C9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423366002" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2256 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2256 iexplore.exe 2256 iexplore.exe 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2544 2256 iexplore.exe 28 PID 2256 wrote to memory of 2544 2256 iexplore.exe 28 PID 2256 wrote to memory of 2544 2256 iexplore.exe 28 PID 2256 wrote to memory of 2544 2256 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\88efc3f1b3e2f01af82ba7c48a042e45_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bda2203e5d95797152ee6b47ea9a56a4
SHA1d4abde6a87e2ee23142d4f15fcd399cc00af4023
SHA2566a44a995d97223f1b45b7b155465f52fd40c24ff5ce40604c94925fdfc58a7f0
SHA512f2296468431fa214818d33cafd2a6460836953bbcbaaddaaa212c12ae878d9c5862f01403edcb8bd0a91d5ff45357774bde8b4391665b7b5df4284a53fda81da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cce05208da81c950f25554bd7219850d
SHA1bc3a9b4e4789390ec54057cb99478132efb6555d
SHA2569a53839554cc24f097fbee3bee6156a18c82845c3cc1f6e60138d6ceac155e80
SHA512f65e253434dcd9eb3ffca1773c134766057f93aa7cae115428b061624f31cc9c4a899dd40e5b2b9c0f71b6ffce82eb2e1a2e90d4e1549c44f3938a0937be2304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef920f31041d8c4a53833a085b3ff967
SHA17786bf5d390d6e812acbc0973a9cad39c824b913
SHA2567db6e4542c9d5623f51b5aa4e4ae8eac0607594aa4a156bcf2d4c1097d884d00
SHA51291b020e7fb8f8f78256bf72750e671785711195b18d4e6d4a4a5471ad5088ca1fbed0d27c4a38c4973faf6e61eb69bbb7992002f1de5356e55c378254875e5d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1a88aa605ee1feefda76fee868d352b
SHA1f34a92edba9f4b6c6a80f86ea9e24a4beb7c1890
SHA2565ac1c7460e6162e5fa12c296a3b0f74a290149398952c46631baf18f5c6ebf58
SHA512789a4e826b37ff0b3bb5e888f91e7740f76610cf76571f3f93d2ae5632b1955ef2a737a6b3c3556f8136c3f58b849683f787dd5865dba99a897c27dd1d30062a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542e568cfaaa93bb312833689d1aa2901
SHA1d4f3c4a5da44800bb85c312226455f9b90003f56
SHA25667d06e6eca7ae85de2d69671f78e9024a5184a3055e95a5fd91d4a71bc922279
SHA5121cb72a8553842c74d19ec5adebaceb72f48cbe6fdc3842a130077e0ff9407628b280c7786d7f98775e709863f718a7b2790de9db6a84ab7efedfb23995626062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e60b33a0e9c80fff97650165d0ace2d6
SHA14930977fd9a962244c98cb8d1e2063aea8963fd1
SHA25665056119df985ad8e3810b8458a0f7c87a077842938876cc3c27c656cd9e33bf
SHA512b6bdfbf3dd59b3fcea4f17ea44a46bc5a9e825dc89e2656651e83a32cf75b47b3cbdcdb8d70f251440b8e596917bab384764a3b59a035a8e62f65aa0dfed0ee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5128814b0dc2d78ea623aebae9f415dda
SHA170678d4fd34df88d3d339bd8a900607d8e82d251
SHA2564feeab311bd6901b68cb55fe6ec0831e86639bdfe861de4979e8ce9fec95b840
SHA512ef799a4a73b121ac221650226f42e94576f2f6227b56154a9a5c14a0c38bbefb8ddfc08349dce4930d8092044441a67ddc3f76c6a2c698cf32ecb6678fab059c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b