Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 20:44
Static task
static1
Behavioral task
behavioral1
Sample
8bb9a13f7a00e6fa40b9b04a6df1441a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8bb9a13f7a00e6fa40b9b04a6df1441a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8bb9a13f7a00e6fa40b9b04a6df1441a_JaffaCakes118.html
-
Size
214KB
-
MD5
8bb9a13f7a00e6fa40b9b04a6df1441a
-
SHA1
88c39bc55e15380bd5d30772bf7ed81fdb05d963
-
SHA256
4eda357d073cdc16d4381b90a0dfc1490a6c4069d0ee0c0594365e104d9d8d2a
-
SHA512
8796f90b48265c7a773ee02c7d8be7a2c71a616eb81aa994b79556ef4f5ec63f7aea4ac68191d194855a11156bbc3e9b7159c05aca407e27317bd361d1368867
-
SSDEEP
3072:LrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJy:/z9VxLY7iAVLTBQJly
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C3F2C6B1-2057-11EF-BB1B-4658C477BD5D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423436547" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2052 1728 iexplore.exe 28 PID 1728 wrote to memory of 2052 1728 iexplore.exe 28 PID 1728 wrote to memory of 2052 1728 iexplore.exe 28 PID 1728 wrote to memory of 2052 1728 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8bb9a13f7a00e6fa40b9b04a6df1441a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d71eb680ad738e43655c985b5a8b5c81
SHA139c528a50bbe17d7c66425175a32c2f6b1801402
SHA25643e9984a0368a40740d073de8f280c82fcde7e2d2863901a9c2991604c4d5f99
SHA512e2d6d90e7f0a58192bb894e52b670126953d77008c767801ff501c7f967a0ef4ca03ea922c9b85d2de57acee2eb96cc9c8db3a4fdaa1375c06a3610367f57516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597f89a0c0ae10f018e809430f81289ce
SHA1c64acead8b2366562e2402d5f4c5fa7af5ed52d5
SHA2560ad5cff6db9e38297d16c125209581e0452c5dc6152fdffa7a0f370495dc22b3
SHA5121e4cb02b96ecccfb10edfcb6494497d4666741fb8bc0b3dd8d0908129558bac78ecf0038d805358449f64ccbf4f448aaffba9d656a4ac72a40ba20c3e9ecfe40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54008ba4c1201745211661f62a9cffe55
SHA16be2fe20c53776bce0da22c00a0a3bdd3afe1eae
SHA2566d1ac51d7929dba2c55e5b9413c8c88d16eab73e7d9d25d1c0c0008cd8e7160f
SHA5121c9ef39f030f49e8926166fcd7ca254d86736ebd823de1cc0022de5d68bc2343b759d9be9c6a7a95553d200135a9d2aa22470fa19d238492cc1d426dd47c995f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507a7a66e70cb6d05fbb9d67e2b6efc89
SHA126ef1a2180f3cdefbaa44a2052347d43ab9d1e09
SHA25623096ebc3c38a7f55343451e95d2d62248fe2b3079f6664294bf18cb268d739c
SHA5128fc33e813fb3a780c5e163f21445552a0b5c5a5a0c966214630101f3f19bac3ee519003871ebc522c078865356aeb794f1eca4091485a57986a9ec9d95bd4341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54542d5e11cc7d9883644d04f1abf1732
SHA1292447a033c32a0dd725bf9b19ba27c0e88ab510
SHA25643be3c6fcdaa67569914b5d33f08c9351ceac37abf117839114eb39164aba9bf
SHA512cc4862eb24082248f0562f763cb33d59855ebb6d27427e9f497e780f126b8db4eeaa5cde2c425d93ec5227e49d7dcccfe799e6f836d5af47d1b23f530361529a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a17396e5361ab60112482b4f3de36a7
SHA1b62a1085fe20180dbf17ca20bc494a3fda18b32e
SHA256656076ae493ff66fb4d913765a3f862b0f81985fd24615cd8e7ad23d607aea9b
SHA512d2f677989f70072fd50e5acbe22835834d02430797b866f89cec403c5fe87ffb2faba97885590b1274c09f8a96b395c797246bb445f0652886a555464eb7c7d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5102231e9e8431d89ec6dc4f8d05e71cf
SHA184e4b60e202cc0c832a0c3ff0fb66d0242328bb4
SHA256b6a52d7af4fb088bfa0350253faede3d1815663c4ad863ae86c928c0de80bb38
SHA51299a1b0088ab42bb953563b8923b735a749d70a573f61d65ae14d5f1a9e863e686992516c4419b8e6cfda23d09f4aaa94d50db1db37ce2f9702c1c109812d0ad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582f5ad70584944a5dd834153c8dfcef7
SHA16aeae2a08d5f43510e21ea5ccae827792c76b156
SHA25648331f46d612a30f60e69a832d7a7f48d688b5bc98a455471c67899f1f585960
SHA512a6b0b83239c34e80ce3afdf393ad45ce659a845b2c46d271f1a08e937f39baffb141af6df414b49e7e1808ec7458aa8ce6c84e3c6354810037d09d30cce3df17
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b