Analysis
-
max time kernel
136s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/06/2024, 05:26
Static task
static1
Behavioral task
behavioral1
Sample
9a0bbeb94f9caed233b36354f1242af3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9a0bbeb94f9caed233b36354f1242af3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9a0bbeb94f9caed233b36354f1242af3_JaffaCakes118.html
-
Size
28KB
-
MD5
9a0bbeb94f9caed233b36354f1242af3
-
SHA1
f11a9f8d5004cb7401ead9e961299888b9f777a8
-
SHA256
b41a475e56c72842aebf89898686267e085cdeb9d620390abe5f4d161b9f18da
-
SHA512
c280bb425f7e3cb4819188a317863ea6d906edf728f211a73862d3331f958e84ef96f4be4690b74edf91a83dd0299ff56dfdb9df090c088987fe3640c8aba192
-
SSDEEP
192:uwnAb5nTQpUnQjxn5Q/vnQie2NngnQOkEntd1nQTbnpnQ9eIim69VYmNPQl7MBWh:TQ/ANK/YmwS8
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6DF36D71-23C5-11EF-8D50-4A4F109F65B0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423813502" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2392 2240 iexplore.exe 30 PID 2240 wrote to memory of 2392 2240 iexplore.exe 30 PID 2240 wrote to memory of 2392 2240 iexplore.exe 30 PID 2240 wrote to memory of 2392 2240 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9a0bbeb94f9caed233b36354f1242af3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572e1c72f3ef7505280284f07ec5dbacb
SHA1d36fa733f39da88ea2b00e2676ef0bd3d7490751
SHA2565c401ef29824333a8910327666dd7353b8b81022d36b0c3b0a6a39d871dc2204
SHA512a62300d55470ee628b6aad7dfa31c396fda1d599a0eb8a49e86e9e046d6b9ef6ddad3b762da071dc901fb00b5cf6cab88a6d308fe15abe0c5a78b9392ad34a16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9f3a9e597e2d9c44e96704412630025
SHA1f57e635ee62c74228312a467748bfd2b55ad40ab
SHA256071b8ba311dbb7196628ce0252dbbf944d296515c2643743dc70d9c86b8fcbc6
SHA512c6c72d0331a86d1db50eef7e59cacebcbc5d237681afc297a2695209d5d8d07d1095ebf32397c57f0cbe50e726348fec2f89f10c4b69fec77d47c22fdc5f53fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e0cd1295841235a13742587c1cf44d8
SHA13754a119f4f0c9db5b9e2e8849e5b59467d08324
SHA2564f44a8c758a64bb3716136922bdb6f2f22798cd5b21a80a0d521ff6cf8ed0643
SHA5120eecd4b5d76ec129ecab2cc08d76527199cd3c8e42648475947d2a6376f0dd8fc7f5fd41076c98508e845279e40aad89370138c9354bcad00df80fcf8eadf8c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528984b0493ed062b31e6cf4c5b381f6e
SHA15e96882512e28fd20e368134f42757d036fca57a
SHA25634ceff8ca0bf099badedbb5c8769d98b3674128349a1a7a28b9fe9fe7fbfd980
SHA51201925ddff61492dd475e2af15a9f2eff70a358dbbe7eb0c4efc59c9e85ecdcb1cf29486dcdec9f1e7fddf4e20454b8c329a6ee8e0c84c92e13abbbde1d7f6581
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501aa6e0b2a3d65f50e2099412045e5c6
SHA1778313ee740cc010a40919fa3ec8c3b3a697a02b
SHA25639cec48f45213cce895b31f68ad0fc69f7230b693c4e486f44576836cdb077ba
SHA512e280b21cd92cc820858aff26139088e60dc5d77ae56cf940f8b8641fa6744e1dc2f048029fa5bf896dde9fa983dcc071826cce6ac38bb6865c19bfca085e8206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4b88ba474c7daa60f40d2072bcac7a9
SHA1f46c655c5eb7741442b9f1c1d92a1acfa0ac2149
SHA256cd6575cbb8e4046451d3cbdec7fbf3ea8da79ebf16269cced45b29970a74a73b
SHA51284d2fb251ad1463c94806164618e1379790b654a97d0d7ba21efb307fe1eeec8ebc6e93b1e34136290f911483f621c1624f60f016228744cb655d920b629c930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568bed4abd5efbee53669ceab3cf8a52f
SHA1c99a0e939178c909a68a7b976586b1b129ac52bd
SHA2569c224ef2bb9391d4bec2467e062838b828db22b7aa918a1d45a914c564782a0c
SHA512256abf9a522179a3f81baf3093fb83090b03be7a0e3f743fa42db612b554aaefb7307e8c11edc231e2fb71dded09fadac3f6d36575eb8f6c066a0f55e87ca32b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa31c52948b151466de9436cc71929d
SHA12e30e3c3ec7ebe59b01d715563ba233c46dcb2e2
SHA25668e72a64e7ad452319e9069b8b20f45441c46487da13b8594645245302c67455
SHA512629d9cf5aac88a543c75fdf00e2f43a030b882523581e612c9545cbaa35aea6d833c27be896a644e93acc2edbd8c31d4e15f6e6c1073224ec1aa213c00a7032b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52224d8d2dbd57e61f9da8082ebfcb965
SHA13482ed1dac5ab95e84a73e4b93037ccd6c216552
SHA25608e9563e8aaec3317008cd65769499753f1a61a2b5622080195077a51aee4011
SHA51293e55d83790f4a80174ebc48846a63279d9549e3981f52671c232d58a5fe841c03d581996915ffdc5cbc25ee12c18d714659d92ea811295c4746630ddf6e0293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe7eef70eb64cf77f448dd6944326912
SHA1189c973a394798a1c5fdd982e6016d9ddaf92d8e
SHA2569bfa181deb7d2b571cf2edc4f2a17eafcbe00c80ea29bfa4451900771c14a740
SHA5120c15be611e350beefb5c4ffb8ab1fcff272b89300f2fe02e843bc68f198ae398b81c534f3c88ca645f1637e925d92ad19c3cdf9153e3b198460432c3449a9d27
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b