Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 18:12
Static task
static1
Behavioral task
behavioral1
Sample
98e2158a08d60cd319d1d16595a42da2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
98e2158a08d60cd319d1d16595a42da2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
98e2158a08d60cd319d1d16595a42da2_JaffaCakes118.html
-
Size
27KB
-
MD5
98e2158a08d60cd319d1d16595a42da2
-
SHA1
39d0b30b303b1ed50975bd98a37d0b097eda78d6
-
SHA256
8b91ecbdcf898dce64205c6bd59162662bfc1bf6fa9bfc8302c5d155955073dd
-
SHA512
432a84666aa543ede17edf576f649e66619a7875252cbf1042dd81c15abf2614fdf93c7d51ea727fb04ac89fcc87ac9ea8b2fbd4795716eded2d7f4e7d5647bf
-
SSDEEP
192:uwfAb5nqenQjxn5Q/ZnQiecNnInQOkEntv/nQTbnZnQ9euUm6uBUCQl7MB8qnYnu:DQ/A/sYUVSmp2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2F82AF01-2367-11EF-9F01-52C7B7C5B073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423773025" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2804 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2804 iexplore.exe 2804 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2892 2804 iexplore.exe 28 PID 2804 wrote to memory of 2892 2804 iexplore.exe 28 PID 2804 wrote to memory of 2892 2804 iexplore.exe 28 PID 2804 wrote to memory of 2892 2804 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\98e2158a08d60cd319d1d16595a42da2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2804 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52472d5d61fc3d7e59a2c9bab31430513
SHA1287493cf8dcbaa10496e4478796a6f648dda08dc
SHA256bbb09be92344a2d68da82fba2c6ac6e58afe7166fd8a199d5fb8c7b9a723d0b3
SHA512e26deeef7c6167364bfcdbf1bc1a76068a816dd90a17c5039d30ec3b70b563d3392fc545208f841d35a4e6deb5ef2ee03ea8ce79230957fc8d813d41d8b0fe6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0eb2db3ade1509e7edf00a14c67e78c
SHA1d4432035c553ed8c9bf863ee55542f11f0234abc
SHA25667b64971b6c0be356b07e7983927849d8673d7c97b2514442811648246322698
SHA512eac04ba3607e1536df17f94c196fe7a5e9217f3abf40bd51cca645649157bad6a49570e650014fbad3459be1bcc97b2d1773776e2ecc5b69e0245215a477bbd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f2db1e442c3af559b04ddc30373d165
SHA1fdb91fd8c1cea9ab102443c05852d2b30f7eef3d
SHA2568f4fb70d133067578949df245d730467a7ec9278a583453989195d9f6948907a
SHA5120c75bcf6b0a6cfad7b8443da4485c8bfaa61184e0392115ec463489440d4a7949fd03ae5227e831668646d78b2fee9b61d656d43ee550ea02b8d27316199a552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b37f7537c42ac7f4fcf5f057cd1d3995
SHA10d18ce46e5882e768ec81a8dea308cb8fdfad273
SHA2565e1a25793db64cc9d603a06b62154e71d3e2b857c0724b1920c7be83e0d4dbb4
SHA51200e9f57933d4324855d2277583f8ab06f71431fbabd194d1a2328e841df6ca1b8b49f06691a8ce60c1dde824948bdde987f11400624e183d8b8330e61d925f43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffaaa6a271872c55f100db601b48ee78
SHA1bfc97b478dd36461676b57d3d28b4b5d1712da0b
SHA2561d8a0151a3fef86c88208a9d231e08e8b4eb9339d16cf294b944de69ab4e98a4
SHA5123769db6d357a01ef34913670a6c6a5918b13519a5105c7f55febaf4e8345bf87e3b45e5e5b68f0825a70eb90fbd621ec250aa598117ac2472620ba38e13de38b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5953d044c71a933d39da01ce77714fee0
SHA1cc5e8ea7eec98484e153ccdc2774528c2eb69383
SHA256aed26f8cad96a238e155aafda78704588a60b6a72b5c2d977e903c4a02df2cc0
SHA5126d7370a51c7542f15dfd68e0df011d5faf1a0712049bf6dbeec337f1d4fdc7d8275d0f18afc81c0687149cd8d04a50aa6645df66356407ff4d4865b87c20d5f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c7e0b68cb3ff27d9065a63417b39b94
SHA1f7cbb38e9b7334905bbf59275767fa273789176e
SHA2566399c464232946f8180476567496192523faf33a61e37e5e480070da8c2466fd
SHA5127a12b45a41ebb33c754df2043bf0dea29164064336387e2a788f5908138dcb7003a294ab9b5eb5af09d060983ba698b61626cad99a68fed93453c7cc7637a40d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1014d5958b44f85dc5a230649e11581
SHA1eca4eef82e5d562b438f82c7200161a034833c59
SHA256244233c837b3c1dd1e92c7d06e666a49aa4a9f224065455be4812d92890c1bea
SHA512ad2a006fa44fc13c1b114928ed36595f68d829e2059ac648a493dffbc875382255b12072800819b6763ebe7b558b8240d0d92915230ea403c9bb463cace9bd39
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b