Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 12:05
Static task
static1
Behavioral task
behavioral1
Sample
91b88acbc78fe03742ef096d76be10a7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
91b88acbc78fe03742ef096d76be10a7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
91b88acbc78fe03742ef096d76be10a7_JaffaCakes118.html
-
Size
23KB
-
MD5
91b88acbc78fe03742ef096d76be10a7
-
SHA1
bdf0eba770e53fe43a2a5abbe6a63ec2a88c8815
-
SHA256
8fb86fcc8b1b2b0104b3b59b6b0f5070c11321d0752a04009bc81545da06cad1
-
SHA512
76dadab270ea6836a7f510f625b6210ef41db259a42eeaf9b03497f6f949ccc8c1ea632a49ce8c3e16de789867f0f9679c868ab04485ca744a86fffb068ae28d
-
SSDEEP
192:uwvlb5nQGnQjxn5Q/XnQie+NnvnQOkEnt9lnQTbnJnQKdjMvMBeqnYnQ7tniYgn/:IQ/e3ID
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423578191" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8E5E59B1-21A1-11EF-B1CF-5A791E92BC44} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1724 2148 iexplore.exe 28 PID 2148 wrote to memory of 1724 2148 iexplore.exe 28 PID 2148 wrote to memory of 1724 2148 iexplore.exe 28 PID 2148 wrote to memory of 1724 2148 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\91b88acbc78fe03742ef096d76be10a7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55058a66c1d9bdea1b59d93882a5f89f6
SHA1dab17e27c6614e43d7ac960d67569591be26574f
SHA2568fae4369bfa892c68b64636b8e18128efe60f80f69098dc3858d224e27bb9e06
SHA512378992de55e17a0bbb23d219d55513712ef3dea9bfdbe64918a5abab8ba988027e1d94e2d8b2b73ccc58b882c6da0c5df29399403cb0ad1b9c51edb36b91e42b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a406368103a29959b6626d726273476
SHA1b1670d7f3ae42cf122c6fc6a42bbcf841ac11131
SHA256985f6bc6e1428da37c655a59af9d5349ab8190ec32689b02b9b54fceb5166a55
SHA512b5be60da07699bedc8d8cf566fbc66d06310e148c890685b0f1c3625a50de88a298051f8e9f66faf3de45b8698a768e75dfde771943035161fca010daa5e1808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5655037b8d3f0fe2e3cc8be4df6eae49c
SHA1e67234f35fcff145b0e009679e65e1b875c0deb2
SHA256793c98fbeaa6115b592f8661b8338846edbce62350f0c15a00efd11a3a587afa
SHA51243b55da58a8f6a4cd070bdbd6e59215ed4399e585a336620b639ca4f108785155f111dafa7737ffe60d2a5aa351f7463fc58f0642fcda1bda10c3e103e77d8bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eab18b5869701b2e4d635b4bd27d3a9
SHA1bb7a9ae8202b653e109c42ada1fb143329e4800b
SHA256aafbf72f17ed39857cd1db8725d1f03683d79cae4df24737f72f330651aa25ce
SHA512bd95d3cda212b2f5a3637729176ab5abba749696887e7980c8b4b514959b2d74e730eefe0eddd4ce72dd79d59f36b08c508342f00f3a8604b2cb3d34ca7c9ec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf158a3d9818b427a9770e6de5aa5eaf
SHA173c929c293ea014fc2fea0edfac953f25c9743d3
SHA2562e70c6846aa9db5ae991ccf80ac98061b660f664a09a5f5fbcd583fe4eafc56c
SHA512bff6bc72dff3931293557d754803288da5c06e6ffbfa9aa42901dcf6b168fe1dafa8cc7c4a167eed432266440578720f14f51869d5037ba860363de41eb7356c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bad1f1aec410f2f385e6b859a84c4bc
SHA1caa03f4c7cfd8d1e7ece6ed2fd331cfd1a2819fd
SHA2566f8773765871bd76bc3525628b24c8adc1edf9c19283438a441724d04334045c
SHA512303223f2782193849e0861af6af6fcad9174dd0606c5aba43997d19e0222c16d892a302041929b9aa6f023ce666beabf71eca4f6ca00a8331083ddb0b08501b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e93a81468b8dc4dc179c0652d583e22
SHA142c0dab4dd199cc8c472b4471654cf946ec7e6dc
SHA256061a388e56565c72f45e66c57fde32f2c8f4aaf1c10ab9f7b9716c88570d2400
SHA512191af94cd4136670dd9fd72bba05e8be3ec544e8a9f5c1f50f0057cfae8a4154b58c267a0291648663d2e1f50b129480d92609309b76fa30440508286adb03e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54614169221277d7c915f0ebb0c09d4e7
SHA1dcdfbc4a3bcc915a9e0a9b443c6db6e6041dbaf7
SHA2569fa6d72170195bb55f879536e136a9c6d21fd7f09cfd7b68fd9404d251ed70d5
SHA5124723ba1fd06af36e7549c9e44ef308de30c8db6e58c96fb301e568bf5ae5fb30944c76c582c94490a111da9c6facdd12492a6b3152da9f267baef71b7f11fb00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545106cbcda16b3b7c257039fa0045011
SHA12fe963de157e80f59e68d79eea772bca71dff26e
SHA256b6d791f47bd8527e42d847a6d62bad3664b2a35662ee7f9e962fa61bdd747feb
SHA512b29ebed39d13c1733a076a011cfd03d85ff4132d7bc621d688dbc6e2cd80216837116597b8b42e368d7bd6561f2ffb8e5863aa8ee3cdae20c4b33448d27f8c86
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b