Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 15:07
Static task
static1
Behavioral task
behavioral1
Sample
8e7e22055752c235e633e7c4e7c9e3c9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8e7e22055752c235e633e7c4e7c9e3c9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8e7e22055752c235e633e7c4e7c9e3c9_JaffaCakes118.html
-
Size
159KB
-
MD5
8e7e22055752c235e633e7c4e7c9e3c9
-
SHA1
cacea4a2a80e7223c54328705660cc5212f9bbb3
-
SHA256
9949c9a6a9e5855d0f137a1e224ccaf0f59dac61af46066c5c5e6623dfb6ee8f
-
SHA512
ae284a65595df1a35fa1dc96ebe1f82ae3ffa38d9ea44fe7117e23fe13090ff7429310f5d863584b7a7ea4d2eb845987ffa6bc94b7f5eeb17b9903a3e5ea7d5b
-
SSDEEP
1536:NHaX64bdL0lyD9/FlNPN/Fy/FK/F4/F//Fh/F1mcVa0q6050b3C+UJjdw5owpLWY:NodL0lyDHq51UBdw5owN24P
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D8992101-20F1-11EF-8C27-FA5112F1BCBF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423502726" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1548 iexplore.exe 1548 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1548 wrote to memory of 2528 1548 iexplore.exe 28 PID 1548 wrote to memory of 2528 1548 iexplore.exe 28 PID 1548 wrote to memory of 2528 1548 iexplore.exe 28 PID 1548 wrote to memory of 2528 1548 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8e7e22055752c235e633e7c4e7c9e3c9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1548 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b891a8d55f0fa46eecd84c9ac951907b
SHA107431ee4e37361ca17fa07bc68c9301d6eedfaa4
SHA256102a94fde37aec3a3cf70f7c6f3810104c35ffba3b775c37e6252a6e9ab0d8c9
SHA512e88d7402d617676b6606e5f72467b5b67ce83c290fd757ad17084586c7ab4066669a95dcec5549f93e9db46c99b8d944677762ce32a1ba63cf63d10a1ba42828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fd09410ff9d3de2691767028bb5957b
SHA1b5d831ccaa4a021ddd4a5977558a72db159f061c
SHA25680597c71afd9dd5560222c5071b4562fa2827997e1c4820de668b84c7393b840
SHA5127b0f52fe42ced748b4fa082977fbc0278d580b4778e60a201696e5d522f7fe841ea09a1c45d48bc67c8e748ef3df8ff36da39bb571623d58f2528de86a669173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577d825d76d1ec27fb2fac3427c491af5
SHA1270931ea5238fc57eec11e5e7fa50e2b82c370c8
SHA256a7cd816c3e1bbe9df94df3316667246162702d2fcb5bac4692dc2bf2cea91374
SHA5120d8cbc1c01c3905dc85f67a3d2a190f3a874b5be97eb2d191885c421aae8bf1bb46708e3b5aaf70cc335c4a65fced7fe21be74298a7273ef96c7f8daced8418f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5452a9e54e6c11cb6b6e87ece05999d7d
SHA183a66a67d6fef25598f35dcdeaa75befcffe42f5
SHA2564ad90a38d3d694ece72e949faff380d70b32739aca93ca9349e766078b4d5f09
SHA5129fca2d85953ca608291496b7e2a99a16a7f9e46afe89cc160e22ce69b9b83a6359378a62b5a0d6e04f8597a12b20af67d34195ea3da32cc9dffd4c9e272e9591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3b27acc5b7456467a0acd813910a7bd
SHA1b1fafa1074b6973df99f5fa7e2ac1f0cae540de7
SHA2567015827c6ac2803ff79b168fd40c27a109c11d3cf960d9ef1ad7644ce85589af
SHA512b2c0a6f7e5dc43e0eb468270888246789af9efd9bc400c90b4385d5760b5ced9929bafa7687805bef8c4be62e5d1571f8bedd85e05ed1b04f7b7f2994a959c24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5522302a1f84253b7b8995063f8fae090
SHA1d06f8577f86358e0a21d94aae56f0d37ebfa9ced
SHA2569c20e164dced8941f7ec01e51a439e3f204c7e205e7cefc632d9191ea1a12446
SHA512deed7220a7c400b47db0ea271e92db440cbdfe048d5720a78e8b83f6efd5df752de2ddcbc2782b2d36745be93940fd471f16937a9d47647b69827782f66c87fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f92edeb0924c01c27cb0101c678cbf3
SHA117eefdaf4a2911e09d7698c3853a291efab18337
SHA2567b4d8b0e90333abad02f58bda1a3c7c94d85dfbda4c1bb564a94b5e6c1049bef
SHA512c5f7569c30f7cc46e64fe840439cd2b80208198624f21840c4a128a32b51e1e3b059bc41435bca0713288c4538996c33be6523c69d4a28057b9706d055bb222a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc1eaa255a1c40ac49a0db3512e49c3f
SHA12a6762fe604241e03e4fd8917720bf2e10290738
SHA256ba8df895e48355996dae470ee713b152b125a10f53a01596f08b0c3ae8c520a7
SHA512077da1f6a5eb5bb36e8b5de2f7a61549fda947971ccb10606e62f1cb603538036d22f69b591c723ed8ce3ad449e8eb1de1bdaf624b8ee854e215b55016c3b010
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b