Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
02-06-2024 05:59
Static task
static1
Behavioral task
behavioral1
Sample
8d1a44b8d61ac421251ecff77fc20477_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8d1a44b8d61ac421251ecff77fc20477_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
8d1a44b8d61ac421251ecff77fc20477_JaffaCakes118.html
-
Size
18KB
-
MD5
8d1a44b8d61ac421251ecff77fc20477
-
SHA1
18c441e1e692343015ceb3e5445510736539c746
-
SHA256
ac7ee9c45e41e52715a2fa4c3f6666ea430d7be8170269d0a736354443327895
-
SHA512
bbca9645dfc90ab226bb0b8f4bba0499a9c593c9cfaf48c9dac0bd4fed6bd01da9ef373b7a0d53f8a1132da828ab36a06b0a6ff2ff8cbc76d329f0c925b71a3f
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIN4PzUnjBhhb82qDB8:SIMd0I5nO9HlsvhAxDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{50760821-20A5-11EF-BC03-E626464F593A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423469854" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1876 iexplore.exe 1876 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2924 1876 iexplore.exe 28 PID 1876 wrote to memory of 2924 1876 iexplore.exe 28 PID 1876 wrote to memory of 2924 1876 iexplore.exe 28 PID 1876 wrote to memory of 2924 1876 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8d1a44b8d61ac421251ecff77fc20477_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1876 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523748a72027132d317396f99e41bc21f
SHA12e1691dc75a45df410cbe19de5b0efe2e9d6e25a
SHA256b8ff64f2d10f05488611e307b326d7b84c531568b7e3601da443baef021d4726
SHA51206f6f81b1b05b2868eaf7618b88c2f49a1f7d8526a54dfd9bcb10605b3b9671d1ef7b8c38a7dfc032207bad656aae155e1b32fbcb1fb9058503678443ac446dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535dc71169a4689b9f816c4c4eb8c1ee6
SHA1542c038d96ff3cde37d1c01a946872cdb128102f
SHA2565fc87af8fb2cd676769ca0eae87e8aeec3bb01236dc1356a94beb6d73b31e918
SHA512d80739140819f73498b4cd336d772a3efd0ceec06d6cd0faac61ee6c18893afee8dd7b59c70a94689618fb51dd88e1e94a7cf0af02a4b8d3c734100a5f96fd14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50903ee6789101f7707d0d726e13a5ad8
SHA1c9efeeea6bc0f158c87f23c2ff139632d09c83ab
SHA256e842421e67721662c2d5bb3e9ea489f8b51a93d0888e9e2b2f0e012a455a36d3
SHA512a4ed6721983bf91975f5b55268030332c3f3fc02b5c1190829e4749e53373a3a12226dfeaea210aa5d944ccec7742044c6e4f21053805b7bb06721f55f4a6d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0453b54dca6c43264a330c5a26276d0
SHA16f8531bebe8f3f06ec623adc4924f27709ca94ba
SHA256a134bbcf3ae0c01b22c7cd2b957672201bd25c985ee420cac89ad48d02d7e267
SHA5125e41e01b76d1d9fd7ca22bdbb56cceeaf5725eae45f78f2b96b5d9147ef932dbb464886fc9f40ab98b35989bbcabf12652ee41d1bac075692ffd944f018bca0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5149363b2daff571cd81c17b6a62eac1c
SHA14389f88a026acb888c4a34ab8f151c0748f39013
SHA2564842b080a1d4d082934aa904917486612c42ea6e7992e2da39cd611bac7fd50a
SHA512ad6cf2371e6d4ef6066e352988b6ccaaae8cf2c2a55c2105e3b8fdf0a0a81fa8e1b3ca876778b514cd48433019f807ad4438a09981c3be8e725a28a95d461b52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc1341a84b073396798648ce99c27f7e
SHA1e323933964291568878ae67de37f25fbbe377562
SHA256bd5df575d397bbb825099b50de1b6e47b70a1f692c5911e385fa0d1690691b7f
SHA51250af2a46d96fb2b6f655c07630b4747a8470ced6fc724b73473d72b02bbfa153d919f81a319b45c96ed8307c639a11dd2a2e00a9dbe47b67d49e44d4939ba8fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53545fc980a319d07043ad02e237ed254
SHA1472df4630568354432defa257b42dd275e723b04
SHA25605ebcfd5d2f5f5f10ee2bf97dafe25dbbc25400e1656801531148342e60c364b
SHA51277a0caed0fd83ee9afc701d32f78b1315b45a50c2a5717e8b6b89423d8329107388e268dbb00ff0af5d3e60c4c300b3c3faa49faddffbf58f418eb884b11f7af
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b