Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 12:09
Static task
static1
Behavioral task
behavioral1
Sample
8a70e8e24776fe1641dc4b1da174416c_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8a70e8e24776fe1641dc4b1da174416c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8a70e8e24776fe1641dc4b1da174416c_JaffaCakes118.html
-
Size
105KB
-
MD5
8a70e8e24776fe1641dc4b1da174416c
-
SHA1
f6e953fa71ee7a263c5b4f3dd8619027e464e8cb
-
SHA256
4837c4d2cef8e4cdaa0a89740359411d391daad2e96ad49bed6f021ad4f3045a
-
SHA512
a06e8a1e152a36cd6fed91f307a18a9900afd84982c1045dfc1b49820ac2db8938b2d4611afb686c2efb886b52d9934367ac970405c11c9a871d24e3db5fb4de
-
SSDEEP
3072:HbxWw66L9PiijuEEiMQwJxOWokSfle6VgIsaaFFR8r:Hj73
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D189F3E1-200F-11EF-AB95-422D877631E1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423405646" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 3024 2188 iexplore.exe 28 PID 2188 wrote to memory of 3024 2188 iexplore.exe 28 PID 2188 wrote to memory of 3024 2188 iexplore.exe 28 PID 2188 wrote to memory of 3024 2188 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8a70e8e24776fe1641dc4b1da174416c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523b140889ea449d5e5ec358c91e95f55
SHA19be00edbdcd06ac85919769d7d7e2041b4765a36
SHA256c506a282c506443e5ad7df6089e4f84bdb0b1167aa30cb6e2bed910f0d64d089
SHA512605af49f2cb76e11db51f128af07c9f1fee394c134b2fd7114deed6f98c649925a54f11246d7f2065787303d6d576c51250877f78290a55d5e92eae0d5df2e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b9daf0733768d271076c1029d415e58
SHA1340391fefd443ceb736c169bce8a5add0a36bd17
SHA25691104aad8516be8cb983b489b79fe54c9516097f46f5d7ae25de95f9be97af37
SHA512b191b413e3a717de6016c4cf181e016f0a39bfbcbb9a49294764de467656340c3dad80d5fb225f530f7da288a60ee74a86ce5a9986c307ef6ab6eed2a00a8f6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55541e33b85b629ea619eefa1d2f1711a
SHA10ec40067e14fd4e042aa77582cd1e6c5045c717f
SHA2568774630afd28b96bdf0782296b2bc12ca5fe86124a21d5f2376991dd0ddb2c0e
SHA5121fc210d95ad9d6d734272ddb55039f2e030b101e802627c09b0da6cd5a853730e6cf12618e0bd08c21aa1cd71479b78e7f3e33d6b7d09dafe90d552fce47eec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2aabac6d9609de0bc34d218c6de7623
SHA132620a17d38b35b40dee6d31c40d4be1d62827f4
SHA256e3db5db97d9097b623b3f30f2b1c5ae0c724cbea3343607345d5ee9e28fea6ff
SHA512b31983179ad096047e6bd45d3dbed7506a600d42cd07a535b7adcde36404e906b6e298c2e28996210d5c7561e1ec0981de49c86441dc341ffff586145ee81561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de6bb6673ed00f014a35f16ca677354c
SHA16a7c398b0951ae9905e1388470a2ffa79d5c23a2
SHA256206c810b7ae35936e484e3103f97ae782d85305cbc296cd94d5a31abd5736a62
SHA512888646ec9fd2e3994ea1a518df5459984221a7b44c0066c5548a763a215166226f33d08013dfe532ccecb7ba712f00192450b9e46d7826f46639ded715b42059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb95eee4f633747902cb5aa2503b44fb
SHA1a0a39edfeb1da938faebe784ecc5e79834769c57
SHA25629a08e231087bbe6a1c7665192bf102f0f08e7449599abd6ffc79ab1b1044e3f
SHA5129053cdacb8446003725d23b03304aeca939921bf4d644baba548a032bccf37a9497aedba8fcd4fb97a3526954471c617063a3cb00298e661d7e792f85de0b331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588eea70075c8a6099241fb5cb79c10ed
SHA19d9724e4f896dc5adbb58bc56d79e4b5e6232496
SHA2562ead56991a734b546373fad0e47876934afbd97e8d6d9dc4783a476a6c3aa34c
SHA5123359c2c421fcfb24857f32a486c3ff05704048a4d23afb67d6f527e0c6a382781084bb1a8f12d9456ba2abd3dcfdc54b97a6b8c9acbb7ff02078f27c5483b182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fab47721620b4e13039a76938d49b47a
SHA15f1ce60180e1f306f2bf4dcddf84f52790a2a275
SHA2565fc0572f615a1c4d6cd9f95a5d23a1370dcdeb0c34b95af5720adba2955c34d1
SHA5122f603a701cdbf28126bf250bd4dabe4fdd56f24545a295cddacf0348f6823344546a8beb14c484f4e7feb5516cf636a0302d7e694c4a66eca317d33bb08d9626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564b1237026d73862d81b53e3864de829
SHA191d7150a47e80ac07ad978199b746bf5a319f05f
SHA25603e95490688554fe9f3908c6ae103e3210c9a9a1e9990575098e112370568deb
SHA512b3d51b7114a3044ecc40dbc09ba62e997cdd1b30bd12793d200caec01b75ee5f073cb911c2bfe9b5063ecc508ef668b48d6cdb19adc3a8bc485041ea0c4a6029
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b