Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 15:01
Static task
static1
Behavioral task
behavioral1
Sample
aa4f88b52da8e07ce41425cba98d892c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aa4f88b52da8e07ce41425cba98d892c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
aa4f88b52da8e07ce41425cba98d892c_JaffaCakes118.html
-
Size
106KB
-
MD5
aa4f88b52da8e07ce41425cba98d892c
-
SHA1
c99a90cfceda969b4b9c314f1035a13831e0caa3
-
SHA256
614ff64688df3a0ee2dba2f0ddb43709d69eeabde851d923c15c75f56821710d
-
SHA512
052004bee8f1ebc01390c36e8de26dc909ea59e76d8fd1ac59dbbee370d40f4ded7bec45ab627a0c90eedb0c97ec4b7d3e5022ad106ff4c722874c87b52a7687
-
SSDEEP
1536:FJ0gTN1Hoyr9B0fNiX9pRExkvmXmjrKiC7pS8r4j4unVUkEpwdZ:JTN4vi8kawdZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EDA67401-2A5E-11EF-B85E-52C7B7C5B073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424539136" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2012 iexplore.exe 2012 iexplore.exe 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2328 2012 iexplore.exe 28 PID 2012 wrote to memory of 2328 2012 iexplore.exe 28 PID 2012 wrote to memory of 2328 2012 iexplore.exe 28 PID 2012 wrote to memory of 2328 2012 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aa4f88b52da8e07ce41425cba98d892c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c975b62a528e81cb715723233aa51e5
SHA17c49fc8078a32479585a839d5c9e8f711fb503d0
SHA256be434cf4e593eab3d7f02317d83eff657a87402de9d8ebefb0c530d1c899533b
SHA5126a9a6ad2a72e85eb34d315e147162eed7719d91a7e5530094cd93fe44d3917b129848ceaf46199e9f694fcb775f137c86154ce785afb3e891c6d020627dc5a4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf38a898cb5858acf71297053bb9d295
SHA178c1de32186834786565d70f12e9f69ed29e61e0
SHA256ad184c72aba2773390965754d3ca1b17de7ce3571caa8539e2411a31870606ed
SHA51277ec0d8051f46110eeb74be2152e5a2d7135ea0423cc8b4a2e5691788494aea3e65aaed0b8f42e7534d0bbd91f060c0c4a68419cae26a360a1c9254c134ac858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a5ebfe093c4d5eef807e62991fd0de1
SHA173db97f989f2f3e0848ddec9462966fc9404d888
SHA256d420a5f48d13f1ca0a6cf8cb856c6a58b5df3be16c1cfd4106a28474b725c557
SHA5128ea41f049c5d4d2e1b2b9bad9cf1c4715f3ae618993b650d075ef5b38364997d11169bce5922803b127c630e76036d26a12297faeea7847c85abeaa3fddbeedd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc4dad8d8d474284d51788423b51c02e
SHA1d049a56146f22804b4a523289060fc01bfc8618c
SHA256d41d2b41b7df73f8c263ddf4774ab0fda4cb0bb80ad39b78d2a2d0c00e4c2730
SHA512bd7fd89e774e74a46bb84ba18596d8c639bae74c14e7b0ffad6f2c471482c7d29b7cbf0c5e4aedc5ed7f293a15dc8954b6c3c87a585b2b9fbb607a0d9d08b0c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545edbb426302d20f5aa0256d8ee96e30
SHA1f4a45089497f926754a67d76e905c4070c9ae867
SHA2565e84ef41b6e0b4866721978d86b32ddc3f6d254a8e4ac6dfe22dd26e56ce6039
SHA51202c97bedae79cebaaeeaf97c0709813f0209bbde24277d2c9667f02f0419ae147a2f23e1a6110790ee6e79db2d9cd279727936bee426f2c270920d49c4570bcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5485ea8a22353de6ea18e54c584a413d0
SHA14d7460bc35909b4de44a21f136ebf9586892151d
SHA256a1f13aefa384955ec6736198b0cfc48578bf0dc56f6d14dc34faf57c52d91217
SHA5123fd88cbcd7dd6d1be15c02bc519aae4d83a8c40e2705940d4a1dd206029d71009c0c8b668898d9b23494ebcd1d9bcbbe934db18e7316a925c7735f34baa06306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5691ab464d115ed731b2a9d3750a7b4
SHA1847bf3b4b1f971a036936a0dca1666af01242eba
SHA256e908fa4ed688ad68c6cfd67a7d2c496ca31f7653b0e87390ff91141130df0c82
SHA51297f0a8005880a3c16930250fcb3cc0429f9dad001f58c275ce87ef8371e68537c4dab12f20e8c599b1e3204ea1ba890e329f7e3c67d7eef7ffb4b7fc8537bc89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554912f4b2a8124c1f1e1686522c4bb4a
SHA109dd8f4bd9791cd4ca91c339fe59ab3b7ac74b35
SHA256de1bf472e765abc96a5e0a6da0ac07da921c2786727dc7d44a7d9986f2c5b804
SHA5129940ea511dde11ec18ea6f690465fffc01da56a35aad25db561f0047e06aed1fcbdc9bca16072a0e51a1adcb87d5b9a6840295ab1b5e4e8113e5209e2597bfbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d780ae28ce5b0ef774b50896d548cb7e
SHA18fb148a7c94a0a0a44433ee184ab7e50fac760e9
SHA256760813d2a7b594c95230e0c5ba4ec4df49aaca81763fa29b961ca29d121cecf8
SHA5126fe51e1cd77d5004d7c05fbb74dd9c35fe0bda830dfa74b2db43191028ca1bd6fadbe6ceb66ffc5ad205f1456d6f8c0464bb63f2cc4a0c363fb40d07acd7c53b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b