Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 18:09
Static task
static1
Behavioral task
behavioral1
Sample
8b4f4c31edbcb977227bd840a0daa6cc_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8b4f4c31edbcb977227bd840a0daa6cc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8b4f4c31edbcb977227bd840a0daa6cc_JaffaCakes118.html
-
Size
22KB
-
MD5
8b4f4c31edbcb977227bd840a0daa6cc
-
SHA1
a7b7f3e964342588643f476583dea6358a3bda85
-
SHA256
fddac42352520cb634c340f6deb58f9fd13d093f4f26441fe0fc99e17729d4a3
-
SHA512
9ff3ba47e1ba254c961e3cc0e9469b3af8df85239fc9c885523e29a4bef73b9bd61d5f4a0f75719612b2f4370d5a6eb9e615a3243a8052a3ff7c2c42b5dff7b9
-
SSDEEP
192:uwHpb5nmlnQjxn5Q/dnQieoNnjnQOkEnt77nQTbnRnQmSLxEGrYH5xHMBIqnYnQr:lQ/6kx3Ro10sI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14EE0401-2042-11EF-ACEB-F6A72C301AFE} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423427234" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2760 iexplore.exe 2760 iexplore.exe 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2248 2760 iexplore.exe 28 PID 2760 wrote to memory of 2248 2760 iexplore.exe 28 PID 2760 wrote to memory of 2248 2760 iexplore.exe 28 PID 2760 wrote to memory of 2248 2760 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8b4f4c31edbcb977227bd840a0daa6cc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2760 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592705296c1bdf10ccb7e704d284bf5f9
SHA1b0e340b4db39b15b7a2dbd31f577fdf8980d08d0
SHA2560cf3fdbe69a41d9c4be01e69924cd312ed90808f3fbba3947f85d4538ecd4d06
SHA51253610fc9e3bbfae7eb4f701d80bb1e41b2f127731658082b2fc0e507f83c179c825c70d12dac6f2cc19ec49870471954681f119b907a343f9cab29a4da292d09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5560a39e9e3f677c4cb700a78f36937e0
SHA1b22b9e2e6816d32c0dec1c48d26fec228a029809
SHA2560fd6efd7b5fe5bc871ba8489e4987ccb069da2f0868a67ec8934eac238218f3c
SHA512129dea5736e5295526358cfa2291aedf5acce1d340a725e75656109907ac7210e4a8cfd7c4c17bb0c004c7cd2c652a54d86660c9931ee73df9bbb6a95e4a9b7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f496372cc289b60916a4278aa7dbd48e
SHA14f04a3b402fa51116a5edb6db8a164c45281de1b
SHA256ea063a58be0ea86b0dd1f4590475c9de7bacabc5be67e6d3364d869110d61112
SHA5128df1821f86653bf2b8c6b51e81db853fed9715fa4522330abfb701a2aeb7a794caaf7f461a50ba1633e5fb06923a7aede65080db32323091c13423a1cee65403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52623e6dd6b10fcbaf848ecc7c091f32b
SHA16ae3ebea66bbee3b1128da8582443a047ac10c01
SHA256824c69a976796cf62e32cde98432416e48f6369bfed09bd7baa5ee3b0909b53e
SHA512ab3c89090b206c768e112bee28f2c06bf6f56eb2badbbc416be14d28f0723c175881a00e499b66c571f8c514ba7f95a64e29f41971fbc649651bd16e9a0686b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529e5fb75a2c0310190893a3e15aff5fd
SHA1f0f2d92d9440af1c595006032d6a95ee02c429a4
SHA256727552d2f9c2668e581ad2c69c37cfe2cdaf94df1d540834200b6f27b5e13375
SHA512aa437c635bc6c6af05d4b1c5cb940863bb923f57e6011e004062c0a015f68f209d71e7f667a6c0694e60b64b292303a5c051ee7fca3fe949522dffd9d261330d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53717c6be8f03039d6181046db709dca6
SHA10dcbde2712a927dbd78378188482426398acada6
SHA256dc82705a505611d4d33fc17a47cfacc5a6efbe28e193d5c4dc770de5a44ba3a1
SHA51236f5441ed50aea1489aefeba79c001526e1e349debb09b1160a5f68476e3289e4b04395c98b01eb2c45ca0c2b0d1812d18565867aa4f749366b889fdba1edc72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5093722b6c29ed7b9de65d11ebee52c8c
SHA1f84efe970e2e923bd85e26d545fe6710abc177a4
SHA256ed0d5346ebb5696e3a2c8402fc45408999538982b68acad3963e0528d48c5fc8
SHA51233fce2a0edf534f0cc1867e00453c85d44906e869c1c83c6fb7f3ae4a95a6a4607766a379c67ca8039219d97c043a00383374e8bf9add878cf9c2959200d602b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb66d5e4059e9181911080816a06b36a
SHA1b74db009733bd279bbf8fb87ed2e86a421968c71
SHA256264077b2a85c90d055ff0df2c44de0dc5038145dd751c46b55222e646716486c
SHA512c08567e764197338a6633fcc462c79e31d8a4bbb82cd41c0edb66770c68f6297390f26d52f5c9ce56bd354f09702123c42cc16c5078767cdb71282c0ad282ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5056e4465733dc3b4038b73adb26c1393
SHA15f5deca763539d396e17f1623795cbbcb71eff49
SHA256ee223df3081b36208c7997679348d54313a71f9b3919c11aa94661184e964e52
SHA5123e8447489b46593f47e8a47ef6619fa467c90b50caa13b88319a9d0f3abb8e3142194d48235ef2c5d7c13e42fbf4b104facbe7be72522d757e026b4025898d8d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b