Analysis
-
max time kernel
132s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 09:14
Static task
static1
Behavioral task
behavioral1
Sample
9449516feaba350783d7f3f2b844f4fc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9449516feaba350783d7f3f2b844f4fc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9449516feaba350783d7f3f2b844f4fc_JaffaCakes118.html
-
Size
22KB
-
MD5
9449516feaba350783d7f3f2b844f4fc
-
SHA1
8aa10496177f770cec167c1a3b539157e0116ce5
-
SHA256
32373a456eba3eb6d61af1e0d8de08e93b5e1941e251ee9918ce07b62ddcacc8
-
SHA512
7e4f5aebc6c1ab21ecc3808e5661a9dc4a926f6e18d37c8f5d386c03e9b14e13f88a7a73cb1f831bb97a727abf52b360592fb01bd8511e6a57b08c061b1e1da3
-
SSDEEP
192:uwDGb5nnqnQjxn5Q/OnQie9NnCnQOkEnt+AnQTbndnQ6v06J4RnQNjMBdqnYnQ7e:0Q/bv06kbl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CEC38731-2252-11EF-9511-66DD11CD6629} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423654321" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2252 2188 iexplore.exe 28 PID 2188 wrote to memory of 2252 2188 iexplore.exe 28 PID 2188 wrote to memory of 2252 2188 iexplore.exe 28 PID 2188 wrote to memory of 2252 2188 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9449516feaba350783d7f3f2b844f4fc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcffb4fb339a7d36e9dde36c9161bd1e
SHA106fc01a0d09336b215ccf2643de43f8a65d519fe
SHA256c08c3ee9ee0e68127634f401a22772e2c53a42da5e1ec72a603c0b9e1b088803
SHA51257b79bc8a015de2954d49957577aced8edbc0b4c3290c9ad99fcaffb5f6b2a3cadcbd4bb2420006db49158a887acb6726da8707db848e56103a26da22a93af6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e9b5b71fed02b6db3b884d020a366d4
SHA16592f585cb1731a9274d60a91700cfc55a4ad5d2
SHA2563756d258cfb6ca82aaed07ff3dee45a6ecc069ad428096001d0725d7e41349d3
SHA512b69611d93a3218c27c1b06b60adb4e4593f901413e735ccd55f06420fe01674447fa18ecf03b5886fbdc0345d44e3c9f161374e478b3bc3544027e422b157af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54168090e03a33487f63ea1387bb3a0dd
SHA17723cb83ed5e8bae87665cc1f5f2f922fd0d72cf
SHA2563a3bf3dc20874bf556156d8123e3c6e27c11c26f07fb69ad00cabc9705fd1068
SHA512a3151c3e1ca5d2b51397eaff374c93efea276938329bd76c624e1cc9198a21c1a95e9eb41963b12738a662a0e8862b79050cbda3d1928302802538fd7eb55efd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5351d0624db7aea130a4ef65995523aad
SHA17ceb301eae8315d1fa26a763a70274fbcb34e1ef
SHA2563f720c95f1fc2b300fee4e4f70d5d243db0e321b4403199b603872233477c831
SHA5121b321d775f10738573499d244cad31ca29510a4281d8bca93285d0d690d44337d6567224bebf4ef62d92becb8aeebb7eb4e5187656d3189ddf9eff77299876d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebb998b60a067f713214d0c2432efa5c
SHA136a051cb7a0b9e4250a950523c1488a7671b19ff
SHA256f005cd2edebc0dda24f2eec2ff0ad964747e0ea7a57ce2bf35006679d1bb5d5d
SHA512a6e0f3e25da37b08711d8355309109fcfcebbd1cc32c043e9a21b91923711f0d0c3fdff99ba8f62e3aca1b996b2d5de6e095627289321d12d5980167c2beb24a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556ff2524cedcfb6cc2a3200c5b621a53
SHA1925755b838f68ba1335cab97708aa8ffea4a80d4
SHA2561dd5925a5d82ffc0222b165e4464da96817931c2f51c18da59ec9ca1c9dfcc54
SHA51278061896a6183e3aa7480a7718c7880156bd179d82acb435cfa04f34a85b46d4e373a17c3f194ed464b538ae0fe0aac9b6ea9e7a8ae4593aaa1d4f9a7c8795ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d4b1f836267603bb26e50bbf674c88a
SHA10139d8ce569d9212aa44fb5a28bf9bdcc6862fa0
SHA256e99ea8b642369c4d13b3553e2d5c70c58a79885872fc40b0b8836384e756ad22
SHA51256a6e188878d09ff5778860a0d7a5283dc2ae21cfa37fec92990ebee6df162199b5eb92502190dfa4174484270920922237d2e420c11277a19f3cb47625554a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554037c8e4eed144c567210d89dc30366
SHA1fee498e3e6d7195390e5a704df23a07e550b709e
SHA2564253da6bf4805068a892857b4ebaee3bb489cca290b21a4e8b49ee4d02bd84a6
SHA512f178461534edde645738ab744bb0146e6d09075f9d2d6dbd7cadbf415c2c55e257164cc7597bcaddfbee80c9358a05143c1f088d4681b7d15530a3bfe91e3d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566b5a94c8a9f76f58b0f208449a99e91
SHA1c59be6ff974dde75159539f2c5e231d3ea4eecdf
SHA2563866c9d2e7c2f1e582e8fb90acb6eb90460c88e3fdb08557e70768499fa7bbf2
SHA512ecd6398c45303a2a29d2fa05644dd8b1bdaf262cfe00621ef1ba232005c334f5c1dc6f464b0ae1730ede891f2fc404e9f9f847925c09a2b82571d42d122a0bdf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b