Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
02-06-2024 05:01
Static task
static1
Behavioral task
behavioral1
Sample
8cf58f3106b247a65e71379ba978751a_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8cf58f3106b247a65e71379ba978751a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8cf58f3106b247a65e71379ba978751a_JaffaCakes118.html
-
Size
19KB
-
MD5
8cf58f3106b247a65e71379ba978751a
-
SHA1
a1671fea5f1624213adefe695d31ab1e7a549e82
-
SHA256
7699e5fd5bd275b55532abcaf175bc3bee4ff0b22d08548459aa74453214ba53
-
SHA512
1f1624ff9287bafc56f63388a34dc5c8298fdb7c1aeaf29b9cf5d2e99d0268b68984af24d3a033b98ef378bbf6ccbf223e5b918e59fd51ea4846b5af803388e0
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIL4ZzUnjBhbN82qDB8:SIMd0I5nvHFsvb2xDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423466341" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{228A8B51-209D-11EF-B20D-42D1C15895C4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2460 iexplore.exe 2460 iexplore.exe 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2488 2460 iexplore.exe 28 PID 2460 wrote to memory of 2488 2460 iexplore.exe 28 PID 2460 wrote to memory of 2488 2460 iexplore.exe 28 PID 2460 wrote to memory of 2488 2460 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8cf58f3106b247a65e71379ba978751a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502b90ea178727220466b8557e8030a96
SHA171310ebead6af73a412355e70c55e3d6a2e755d8
SHA256ea0c34b1c0b5a643b737312670771078603c142f5c1b71943ad7a237f6c080ba
SHA512babd1717d1950eb7d5fc8f96119f9eaafe4cc8ed470d0d3a2bec08d502a92db6b07effbdca2e30f4cbbf75f6ef18df33116ba91fe041cc3a4bffee82ffcb2035
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6fe32bc2abd37dcd0f0a9ef102412f4
SHA1cf60582ffdbaf00ee22b29d927eddad4a90fa783
SHA2564c689e926118571408656acb42599f53c356670300fbcc97b1a0e729ff222cc1
SHA512a7139a408f70b8dab540e925aac3862e24a2bdf978921c7ca01d10104069ecafaf2c505d1bf0328c9d6606dec458c4ede792184dce23eadeb7561651774b6217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e761f41e5642fe34835f648b825506b9
SHA13ee5620268483fe6293edb00c0ae837705a5085c
SHA256a2c23ace7177b649bc3880a10a142d2b2e6187e52883443dae25b84f7b792385
SHA512ccac8ed30dcda6301b255b2082a6f3d0f8ccc50b1de63091510d670d1473488074331ac3fd04de6192fd4677aed6dc499b6adf592443ff7ba80766acf3ffb1de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5caef1554cd93262a57635d5c8f6e42
SHA1042365f26f1c5629ef240cfef4f41f7562aed02b
SHA2560de05be9c1a411696c395e957d03ae709ad3378bab92c5c4b7294c167e2a65da
SHA512f71962f99d82351cb9aba9ee9da0f9590a3dd2d398f478a10ea8f7062de3cc55f5582aef05508fbf534859d06ffba4a9b59f986bcdc0955f646af1b8837b9bc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528bf519c63bf3615aa8843a2019c9c14
SHA1d4108b7ed925e2364af6c1845b3f9be77dc0b552
SHA2567e77be56d1baf2e0d226cc48b4a8415f36da53dce2792dba64c2f1c1277feb95
SHA512c3691da11296e460e9a0dd17ee451c731853020ed41b47cd114cbcdf6c9c66868476d9d0807b0891f3e5db2bff054d606b9ab8fef4f4b81db13bd74423dd2026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563252cf4d7f025ef30b307f99031982f
SHA144c40f1e3184721f3df56b8f6ef3886f85177c98
SHA256be7cd8331ce9dcfc7c8a10727bca790bf5a0ac25afc44e815f6c76248f299b83
SHA51221b2cc521742499101ffe58dee3cc0d870f0a68c4501dea0c66cdda1d940669ebafc0a9c05f7ca7461a0b8b0fc854d717667c0ffe2c5bee1092b6fa40d7b4c9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f41975b51f6629cee2b1e4710621d2d
SHA1e88ef9cbdb4b226276d273c66dd34e6b445d8e11
SHA25692dd6d0dbae0e1afb9e74c35b0b03cf36bf89e3a88ee1323dfcc255e3dd2ca45
SHA5122547de2901b8db0928b03dd99e57e834c45bfe3432c5ec094bdb78153df320c7b00ff0a241f0400eceacaad277b13cdf6652be84ea3c931a3f4e79d42229f095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb60ffafbf52fa785cd546785164927c
SHA10b87c42f84f687c232cae0f777df05f5b2399040
SHA256faa9ebb345cf5f72893d18f5e4066bf0d3169e6ed9a3f982d4f57219fd32e03c
SHA512e758876f2016113b30d357822f2816f9c5f4c86433ad2cd49944b326ff21a5ebd1e3bcbc81f2df35773ec3240dbcd72302c5164103449cb883509c58eecf0b40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588ff4b5711605de81002f369b64b6a8e
SHA1652cab3bd4da97df03db55dd7088f76628978a23
SHA2563b51078d04039e7a7a855c5d454138eb7f8454aa5c8211a3502e194fa2f0acd7
SHA512c2af0ac720f355a928b664496a40a90f1e0d85481c3e6d9b7ecb62b95de9905bd32ef69837af67a37b4012dcd84591e8eee2747abb99cb33cb674fbffac4103f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b