Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 11:53
Static task
static1
Behavioral task
behavioral1
Sample
8a655018447e8e86772ed377d3708dc6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8a655018447e8e86772ed377d3708dc6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8a655018447e8e86772ed377d3708dc6_JaffaCakes118.html
-
Size
36KB
-
MD5
8a655018447e8e86772ed377d3708dc6
-
SHA1
dd69cab87da1f00ca03e86ce61ea8a5c57ea4554
-
SHA256
1d81815dbd7f4626c75748d97f8f585cb48d6d85c703b7865fed9c88d5806aa2
-
SHA512
e6c5c50fea2530a775a81bf2059409be485e7f1f42c712c4722c5d41b686b96e29854e3afcf889d07b44ccf5bfa240f55cac71af1fea2dbf93c1d954738335d4
-
SSDEEP
384:HCQ/hLcE+Iuy89ZNnauV6SB7gqgEs17tPwvBWzOdZVv:HZ1Y5F5s17t4pWz6Zt
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423404678" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{90894691-200D-11EF-8DE7-EEF45767FDFF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2184 iexplore.exe 2184 iexplore.exe 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2116 2184 iexplore.exe 28 PID 2184 wrote to memory of 2116 2184 iexplore.exe 28 PID 2184 wrote to memory of 2116 2184 iexplore.exe 28 PID 2184 wrote to memory of 2116 2184 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8a655018447e8e86772ed377d3708dc6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5004fceefe7c7f91b3d0aab82a957be05
SHA18b48782b16e9464945de3d15140305823c4bfe4b
SHA2562591f58c550f5e15fa36c2ba328a05d4b0ea6766eecbd2812a2fef56a9707057
SHA512cc6e6e38411cac4c186f2866e0fcc8f4919be535f953ddb2319c939dcdc26ffeda73a1e4d5215a44a84ea7d649b98206db936d71f730aa27b9d9742dcce216a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f18043c217212ce020bb0158af1b3561
SHA130797c8f6a8671ebbbde3901cc71e7a426998d79
SHA2567acfe3f440d5fa97a0b7aec67c1ecd1ffe477b13ea5765086cc6ce9f56f5b458
SHA512747c37e8995be44499139f1ddecd4b4032b928a41c32e982945eb9e46cdb9a28693c99f354a8ec63ad352b5d0ea032c67fb82e81ab585fa5c462a952526fefed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8f395042ffe569d7ad6f4d8014af37e
SHA13f97b1618ec888c40ac5fb726ebe951b1ad6fad5
SHA256cfbabaa2aa4c2e59ca6ff8c4d6b7504e9f10d0f972cf672d5c44b970b7f4eef1
SHA512d08df77e3f3ef8d54aa0541aa70482d3c48eca858e38f41ea59d924f19608755e463635f7576e2a8964f8a4cbd72b81d2bcd28ef147c704731a018d28b5207a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddf588a17d3dd2070865d03654de84b6
SHA1e0ff25904b16ec631fd4d2cc67a6522ea30ab48d
SHA256e330b02301a5dd8b100ccead5c18833099f6e1d5e8037247213516d8d3c1caf4
SHA5122c9e1f3c9e211680b314864c2faa74a93bcaff6ecdfb45ebc9ab34beeee6b2a556dce988d4c85cc5e66fffcc46699f0e707cfc52dc65cae78f31d3b3fac52513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5653b9ed03bd0c4dd00bcc2a2999fe194
SHA106e0a6111deef4cb4690921b6b910c6155f126c3
SHA256aa3510e3bf0a7ab165b50fcb666eb87501eb7192ad6239e27a626a3c4fd36640
SHA512c62a75b03a0313260f797686d2cd0560a87e2819000c3a9937bda3d68f7a446efb3f784b0735ea90aaf979414ecb1024a7a2cef07e7022a2c97436e2bb1117b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afeafe1446624ecda6798b2ec7cb7291
SHA1daa2e4f62c5b6bc1566461feaf233bdc61d648ef
SHA256dcbdd86b5bfdaab54a3288471384ff8169f12186db033ca763d6ca6c554f0251
SHA5126886f2a33519811ec699178e1e895d9976a3526d29e6eda459fb0085955bf495c07abfa2d58ee272216dce3d14a63f8886be581ee0c31e88b4ff193f32a352ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564abe17e263fecec62b83e1a98e3a21f
SHA1ccdf3353e1ca7f26efc47283f55e93c4dd7e9854
SHA2567ebae6f14b33663b9f876edca30d2e9099511a20bfca37f71689b10506417ace
SHA512e7eec6f38121c43e1e9b7399631b6e79581cb7233818d884accb36a70e2b4f5dc7fcafcd2b6d9d8a3019aa89d0551f73c1ffa077c2ab8e0a3c506afeac4244ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de65bfa6317a9b6c29cbc9c7038f2fad
SHA1e64ce1c34a9540f25271b44daca9f83bc781ca47
SHA256b26a35c49af955ce2783c74266bd7a4781edfe44396ccbd1269a8b75cfd19ab2
SHA5127945bbfb8e724e7f043ee9ff55e882482f9e8c50bae0eccc012c28fabaa8db07494e0f10731fd1522d52123441d1f89e9772d02b4eab9472b9d3125b7d64e1c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e079eee43ef980e33473d4ca7e08113
SHA1bb7bb4fd6e3c58130363904122fe0905f1f7ab5e
SHA2561ea35d85dbd910114c98b368e67b837c3fac8f739630f3d8e92df9568110b135
SHA5127c2627804b904d06456102af94ce52ddef3683b44caa9a8331894f6d018cba0f297f5d264c91470980873b3660d5303153e3b3cdad7caffc80660700cc48a5b1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b