Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 14:15
Static task
static1
Behavioral task
behavioral1
Sample
9e79b48a91dfd5f3a9ad7d26ebd4a7b7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9e79b48a91dfd5f3a9ad7d26ebd4a7b7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9e79b48a91dfd5f3a9ad7d26ebd4a7b7_JaffaCakes118.html
-
Size
22KB
-
MD5
9e79b48a91dfd5f3a9ad7d26ebd4a7b7
-
SHA1
690a0fa332f6af10b0bbedafbfcb3bda3054e6a6
-
SHA256
b2199b4a385a5383848861fb330af8a5db76e13527982a0eaf1a3475fa78b268
-
SHA512
b6199ef9cdb95828e0a92ea848b2dbc000e39b8fbd081b5fc2181b7941c3588137a925e8074b4c8162e73c8f7bd2185001fce67b4f6aca5aa18cb7372be8168b
-
SSDEEP
192:77xwHPi7YSi/MU9jku8S3ZZyDCCI/kBwnAlgRNEzd+VELWrLbfpBVwLXBJB5ipj9:Jwq7YS2M6CwnAlcWKLv2Lzipj0hff2B
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{204124A1-27FD-11EF-B937-729E5AF85804} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424277227" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1720 iexplore.exe 1720 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2780 1720 iexplore.exe 28 PID 1720 wrote to memory of 2780 1720 iexplore.exe 28 PID 1720 wrote to memory of 2780 1720 iexplore.exe 28 PID 1720 wrote to memory of 2780 1720 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9e79b48a91dfd5f3a9ad7d26ebd4a7b7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594d7266537ca644ce75a71320db72572
SHA1bf5fd0d3b545e64a755f11ca9269fede233bc427
SHA25677defcc2c925207d727e7b8acffe0a6d41f6b3188dd3995d0d6b41b730c81f60
SHA512e595e8c1ad4a284375e3bf8db352c805c9c786fc727a9c29f8ef2b2d0868367a590000ae6cedc2952faac4a3a872275b76886c5c65b33e06b773047441e0350a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1c1bfb0369a3f61c14e57d1c86e3df0
SHA159ea26ab0fcee65fddedeba5f73fcc49a86502c5
SHA25631df628b419c18c5f4ed68cb8f3164b66650d0b5e91ab6ac005f2ab38e9ad31f
SHA5123de4f99f52a290dea6104ebfb14329215351b62642ef6a014c7d5f6fef49f5f681df6222585c22b2c4ad10c7f5d3c17f7230daa89dcab8b2e07876d09cac19ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55085c622b594454dd95717ae735e86b3
SHA1e1ed485ff3877d6817391b7de0cee4b66c6d58c6
SHA25632f1a877f4adddcc8ff019b3428196dff2f61423f0520e7d5fcb6eb78324c0e2
SHA5122a18a47e27d1b61f95bc205f257c3155203cd5d6540399ab2af69591aee5bc22e06afa7f980e5b87266105bf9b6a30a6c9543d2295380e0340caa680ff30d69f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547bc2400512b4c3a0efd02a9df228bf7
SHA115ad213068dd6f2f83411286ee8380a1e63b8653
SHA25620f0a6082a703892064fd1a7aec376404149dc6b5125da21946631b07de63bba
SHA512e85b9b50e64b7ee88d560986475a2a3be056623b556e4ec6b68a847e14c9b2a96dc7c12e156eb98ce88e0a7ca1872b035bdd10ab8754b507eb7a7b1b6fd0e0be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580ed2698c13127edaf2b756c9da9d653
SHA1ea1058f015b0bb3ac2ddc390ec64eaff3885be0b
SHA25619d2aecdd3be1b8a455dea0cc5a777828ca168fd1075318d24ff626efda8f15a
SHA5126356371327e29a28a7c95bce4c7103dc9244dd06e31865690e64e692c69edbc13f59b0fff920ac89e8042dc8ee0cbeffbcb18c039b565bbb18f979325c3a7a30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f148128afbc99d05e3329daf9c43ff3b
SHA1b1226ef6595056f2e8a78b532b399fcebfbc2f4e
SHA25625670c6e5165d4c28ff206e6d2d10d9fb2425b5586be99ccb2037d6015caad82
SHA5129914b09841f04df8508cc39a47b4322c66ecb88ab2662f5b67cad8ea3917fc0289cc662f6846cd69799f45e93e817777a286131d0b6be583b8194eb004b849df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac8166293e45a902daad733a1a99332f
SHA19bde01e2d0bbe0f5fca069358102e6b70541e473
SHA2567343ce1619caec263c574f9cfd378e17ba7437eaaa65da9d10af13bfd7dd89fa
SHA5128ab0fa96e3be8bfd580ade31b6db9f08419b8b98fe595905943b40aa54080ed0359bff39efb3758cbd1bdfc7eaddcf31ae33e8da2cbea8dab306c78aae921c8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a1c01c37e46da2731b4ca4fecece882
SHA1350bd2da9b4652ba897507457b8879b35345aa07
SHA256629b038e081c6ab80eb09ad2f0d4e9aeda720605cc81a87f9ff45a4b7c146fce
SHA512b1d048e90ab268887e199bdec6db66ab8d4a3b51b19b75c5e00f661be46262e7a0f384e257f9157400aecdd871dd0dc1149bcad72349c89e63041ac6f0f9225c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b870d7cdb572c2915757575bb85504f
SHA1857fd2635039a785654bbe6e54078159efdf3743
SHA2562e404769aba85f4c50a1b0eb7ef1550eb970d1cea16d0c49eea57c6a43d1c4ab
SHA512362ee181d3b9d400c7a61f7818cd7b368e14cf20088a987ba7a127f63cdb0695763666a835e80b91911150feeba05ea7fd41e7fbe52695f00e285c6dc4f76909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3b4ab4b43e2daac5c81555307aead10
SHA1875e61ea6a9c8bb61820328e7effc9ffbf534378
SHA256c683798bd215b2cec9157acd0ecdc4bb8c0923aa03851fd33fba94af378ce45e
SHA51299de3f4dbf8c5ecfb5f0de77da7b47b8bf7f83b7e85338b3fcd6f8831d9fcab17886f756271183fbbed7cd807862df5e03e3d589d550addca89c6c29ae75aedd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b