Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 13:44
Static task
static1
Behavioral task
behavioral1
Sample
8aa0394f98c7721285cf0a1f3c465e28_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8aa0394f98c7721285cf0a1f3c465e28_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8aa0394f98c7721285cf0a1f3c465e28_JaffaCakes118.html
-
Size
31KB
-
MD5
8aa0394f98c7721285cf0a1f3c465e28
-
SHA1
9b1c90bd01f97755fe73a64e1d45cdea8d10ee9a
-
SHA256
8a9deb050caf173f0dad513519e178348bdc108d915b1c802b51528d904941d8
-
SHA512
8645b406840e9979f19ea9b59c87a582756c8ec87e204b89448de9da273e5de1c4c8a4430ee64f0a0a3961d098ab447338d96737ca57f98f762d59af2ce2efa0
-
SSDEEP
192:uWvDob5nbnnQjxn5Q/inQie5Nn7nQOkEntmUnQTbnRnQYMCOlA2RyFLqDxcYLuj0:rHQ/2clnyFuVpLkZQiKJqCQCOmiM
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423411313" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{033F7EC1-201D-11EF-A692-6A83D32C515E} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2124 2120 iexplore.exe 28 PID 2120 wrote to memory of 2124 2120 iexplore.exe 28 PID 2120 wrote to memory of 2124 2120 iexplore.exe 28 PID 2120 wrote to memory of 2124 2120 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8aa0394f98c7721285cf0a1f3c465e28_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c66f22de694a5199a4496c288eefacb
SHA1c8b196826153a1ff5157c8a616b5e3c1047e0d5f
SHA2564d7547713bc83f27d6fd3b8b697255aedbd3fa13f777c7ef233bcfeb4d34dbd0
SHA5123b4a11504dd1c1d84e54e0816a05c45420669eb50cc8c3ab28cfc8f50cd3c98ae317fcbab6f780bc314d7eabadff5c1c493e5202ac8017fc5708c240bc31062c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575e4cd39d766ecae629dce4c301b4b86
SHA14f2f8867b40188d2584fbafe8864a6f6a8e29950
SHA256417fa1d1f865f68c830a05145a703f63cb041c629f7adf77cb03bb56545dcf61
SHA5128c1302da07ddf3ab1a436d1bd37f2014b448b116d585b2a753ba3e820f1d288f0783c9ad1af906875be57dc52f0b9c23efa60b08d6703194728e671ff090095d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deb1009f1d3b74905e0e0d5dcff319c1
SHA11adbeea9d0cc4596814a62211fba4906903b3e89
SHA2562d6f03c6c3fff4cd8b877a660641b3c5f237a72338fa1d843c1118e97497d668
SHA512c7b15856774cdd7ed3ab423f3d75418c7e51729577b135205a7fc319fd43afe492859c118993e936df2201501ad1d3119511de5c55ff29c52b741de037230176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592e1defc7cc467052ac90972186ae538
SHA1552e48da57464462a9c43c0e6e0315dec0b888cd
SHA256ce7caa536dc0377a7418c308ed1ddf63d6a7b225d43e665ed0e15a17b50766f8
SHA512f31a6c96b6bb50223c113f5dd175042f3cfd0d91ea0a7196263fd7018c53b715411d2f475230b21d05578095984cfb8788ee17715ab5301d8752c39676f4a467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5793f41b93ff3531245a88cef8c4d4dbf
SHA1b9ee1208edd4fc5a0413260b70bf052b156b2999
SHA256499c812f14f49e8ece2973898d2da0c1770ef87e6b2da4fa296dcad6fe160d77
SHA5125719559eb46256b1ae94b808b183499be02fe4ab92e5910d921e63cb23db23d4174d1cf06587f71278f95edd2cf7def4560fc3d4c71d5c8d6882b62b81bae39f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5173e93cc54cca5bcdbf0241b746dfded
SHA1824b75ddb8409c3669f0701529202ceb51bd67a9
SHA2560f0750ad50f370fd3e226b1cc53521ebe969dea1c2eeaedb7f4d1c2f7f96be24
SHA512893ccf702302dae0baf5194a22f5305782992752508a907c7564b6228c534ab88a77e15eb29ffbff3f818aafeec9f9971a6b249820f9007b48962dc037674bfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8eaafaa01e2da8981199398ee148a86
SHA1a44854b45075cbd55c46ee202a86042ff7568ee3
SHA2561a635670e1336e9ca4bab41fd5c88e31f246b911f7f43d131c26a401554bcb72
SHA512aee15efdb282525d57694a0da6ba07bcf42d6add28600bd95fbb6238603a2069984bd233d75e407a3227670a76151bf752f11bdf4ab4ab3726168b2bc6f2ef69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af7acb8efbd75458b6c43bfeda67737c
SHA16eaaac726b2ebcd4a23f9ff0327959e1a78e56b4
SHA25638119f8b5e6454c74646a98ce9b16d23616990e8ecfca6b265db04d055c775f0
SHA512b6ace34677ae9f1dc34aba2556ec90e3bc1c22cda8067875478dce69cc73eaaf497b2152ebe6ea0e40b24a9e1e8f349930318fb6aa2c6e5fbf74b8c077767e96
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b