Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02-06-2024 21:54
Static task
static1
Behavioral task
behavioral1
Sample
8f8f87991bb1ebfc198ef6fd2e8f48db_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8f8f87991bb1ebfc198ef6fd2e8f48db_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8f8f87991bb1ebfc198ef6fd2e8f48db_JaffaCakes118.html
-
Size
27KB
-
MD5
8f8f87991bb1ebfc198ef6fd2e8f48db
-
SHA1
3ac8cdea15b5e83e736ff41435a0537b4ba6a5b4
-
SHA256
b5740c9a830bf009731b207e09a786f1d06ab30a04478e6157d4d9f40fe7ec75
-
SHA512
7b33be6d05a81a54e27c0e9301b60e5d342223919e25b02ed2e2048011713e9bb23c8c614728685b7d69ca600a8469e73f3e4f390ce2994447a6478793f28398
-
SSDEEP
192:uwHEb5nsCnQjxn5Q/3nQieuNnanQOkEntxRnQTbnlnQ9ewem6MBmQQl7MBOqnYnk:NQ/eBWimzSE3u
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ADFEE181-212A-11EF-B6D8-6A387CD8C53E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423527137" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1332 2204 iexplore.exe 28 PID 2204 wrote to memory of 1332 2204 iexplore.exe 28 PID 2204 wrote to memory of 1332 2204 iexplore.exe 28 PID 2204 wrote to memory of 1332 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8f8f87991bb1ebfc198ef6fd2e8f48db_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fda73a290149ea98177615fe1f0fe01
SHA16a5e111854c5ee5a80d6631a080f88d340442a3d
SHA256eb9951db12ae2034f1727991fb7108b7bb8be561b5c95d0d54a0f5921e8fb2c8
SHA5121c87814beac4c48fd054b6f4f13d1920c31e368ec91d2eca2872408681a07f6133460e6650ebf29389aa5e0e0eb546ee13a6ae9590fbf41cfd049ac636a0e0b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509a94da5dc79a4848b8d13ef779dabdf
SHA1d779215ef6871a34e9288e0a5947dc23921ef98d
SHA256488de497db98d70e26bceece3a53518bbfe49951238b71e5f707fc6dc6d0441f
SHA5122fb0b6cd767c89f82eb104c7acc48bcd72fc1af71b334dd038845a3a8f1854c71da4a0794e1f54de2a6e6ed97d75ac9662abf849022490268126aa2b7317c4bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54911f254b225b41b5457d8bfa8b5e520
SHA1dee50e632c78cb785c77da11273061749286408c
SHA256c774e550c3ffd80ef443681b0ca23371aa9a49b830042ee3ed45b8289b752182
SHA51279568ea8b4e768813570f7f8dd248e368d2e8475de4a920b4e5cbc64a81341bb4136ea744b3353acf0e871cf97616904313aadb3aefdf5b94e493586d3786b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b242a1bc8b09417a86f7a097b4be0512
SHA160f1fbe2c8e236a937a632fbdaf2ac49b7875d2a
SHA2560ca59162d66045a85f0f3a64afd12c3444f1221784f836ea06c98753922a906f
SHA5122e308875c2e22167d301c566d291817fd643d62bdf5de4356556f93d14ba953c489c5228ba9b0a595fc44a68b0d28c90b29d43400f7b774f39e55a3a96d5b718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf2047b33832f2d94985ab83fc2e6d2b
SHA1a1c641b9b0b510460e291c4dd4e6a74574e1f71c
SHA256dfdee152d8bf07f8f5b2bd06e5c32eca6caa1590915eac6806e4f5514bd50f37
SHA5126665e2c5a315ed20d780f9af14b73d4b4f6baf64cc1a147383587649a5def1b9e69e5bbcbdec24527b8b6d84c6b65b7a4ae3b37f92845cc6b60614179b645103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558a053495d88a80703cf7f4e8c8e484f
SHA1a1fa3bd6de91ed2923a065d7d84f0fe80f5b7eb8
SHA2560f47176cc9a4406da84bbd35debdc30979b64a4a7e1b7ec889df42ba3f5b7360
SHA51262a8dd781ba2fe52de487c9cacb353858fdf9646dc1d27a0dc6af4af5d417e77ef4a5e4bc310db22ac4c18637fae193b291047655509bd1d33db35be2a395730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3cad26c2984954a1b18dd1830bbc5b5
SHA1c8ab7992a106a04b0fa2f44d6fa6e1db20c3d7b0
SHA256975155b8a17b6fcd47d92110d7417bb410003dae6f77665a201d656b36cb0211
SHA512231ab75f18097870c615b2741f5392807ed67f7cf25acf6cc3d418ef120bc960fa365da80d31d091b958fcf7709baf9c5c6c1ad1d0ead3873180b49e57632029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526fe9e6b04bbda9751a39a3771e21c87
SHA1d88895fb0950c35df7f42bf536d096833c3dcd25
SHA256628fad368b89cf2ff833bbb6879c38a9402d5ccd2e06b1223bcf4a3f58ea58ab
SHA5121eb31aa482ca91cd5f1266dcbc67e04fdfb495ac858ad6b0528bda3cd5ee95bc0c1e99fd4c8cf96a6aca883caf933938d14d83e340e85d2e666bff937b06204b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca26ad66e4f0ab3dab136a095350afed
SHA1ac3582c07de7a1bbffd3dbd44d36c01d8932aba0
SHA256afac3c67d23f280dc52d6c6db399e4c1765ce955da2450bc49a84b6eb771e2dd
SHA512dcfb0b361369a47c6285d9a7846e18a06f2da20174e193235e6aabc1908aa1d43c21206627cfc77816b8417a1002f8ce6a22cdb003de37bbf8f8d06f6c65bce5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b