Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 10:15
Static task
static1
Behavioral task
behavioral1
Sample
adf25ed7cf76eb1e6d05c4a3f131aa14_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
adf25ed7cf76eb1e6d05c4a3f131aa14_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
adf25ed7cf76eb1e6d05c4a3f131aa14_JaffaCakes118.html
-
Size
27KB
-
MD5
adf25ed7cf76eb1e6d05c4a3f131aa14
-
SHA1
dc3afbfa19f193246da00af0cb74e586175e8a02
-
SHA256
140b604f11f38ceefe710ab9aa46cd04f7a0ab58ca71c82e245cc6015f5a6fa3
-
SHA512
9b6f45ddaffe07f231dce9a1e09186bb56064004d1a1fe744adc2b39686ef6b3b4cd07482e61e1883b1861492cffe1554296cf96cdbfe4b811260eba6253d89b
-
SSDEEP
192:uwP0b5nT2nQjxn5Q/O5nQie5Nn6nQOkEntUlsnQTbn5nQ9edpm66f3JQl7MBZqnU:WQ/OYU8jO3gS7Up+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424608425" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{419F6C01-2B00-11EF-B012-52ADCDCA366E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1288 iexplore.exe 1288 iexplore.exe 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2716 1288 iexplore.exe 28 PID 1288 wrote to memory of 2716 1288 iexplore.exe 28 PID 1288 wrote to memory of 2716 1288 iexplore.exe 28 PID 1288 wrote to memory of 2716 1288 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\adf25ed7cf76eb1e6d05c4a3f131aa14_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1288 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b054c0db1a73fc89dc3deff39d81afd8
SHA1a259f91fe1389a653811fdc45441ed028fe4fa87
SHA25686181a188e46db21f4c02feafda52eb5d76ef8a241090a460556620909b2ae8e
SHA512abece06f4f8086bee1399caccd4f507e8ec845f7528b89d30874c686496057056bd61f04f6873a61ad240fd148865f0161a636398ec7a8ef79c6dff9ddbf735e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5097893b4ef1bc987ee5b7a0246f0e069
SHA11624e4e01f14041795f2564eaded258a86f42474
SHA2568ba80b1b54f1531f9c09210c362980527a4e9a6ca939db7cc2b02ed0d0ce0f29
SHA512c6787a51c79863c97c9f7bb4f4290f3188bc9957008ed5ba7d99713d74c15ae456d6d82387f9a31df70cafaf273f3d2adae08a6cdc8c3d5a20c78480f835ccb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a51e871d3ce7f767d6d13653b87c8934
SHA1ff178999d7c362b0f5ce16932f673bf5ee6ee7cb
SHA2563e9d72c8329849c4ea29d63214b4d1ce4da9d7545384319ef69da82e036f701c
SHA512690c179538565acfac06cb619a93b558f081a60f16878991f192005445bc9c88d96cc91ce2395462d32fbe0e5238534d1e7c00564a2f475bdff665f71a851fa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50662e9ffe5340dc5058abf9aa5775c04
SHA199469c112b854c8999e7d0f7cb54028ffb778998
SHA256fb13d2402c6f5ae93e680f61ba40093e18572f2a04c55dbd8c2ceea47831b6bb
SHA51228ce5e2bebabadf429a284b9eac6581d1784033378c4330893cd108569f4541ca262219111ba6b5f80f215690f36563a62b3b6ac32e82a175d82b7cab3215c79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1787f543e4249c8265459d41a4b391e
SHA1d9897762538868650b2559d70d6ebcb31a76d544
SHA256ae2dfbaed4d15193f2d468ec798684234e919a4894194de6f6b75863849b2bcd
SHA512e301e8518ce6b5ccad0aec6317f25255e77b01fc564387c0a510bd3f3747c6c5e8bd22d51fe0c94ff806e1abbd9867301242cbe8ff909da25084f90c6991521d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7952ee814c95c22b4d7584ccf1d3756
SHA1c9a556b0ae49349338397d654c6fd37a319b2a2a
SHA2562b0bbf314fe899ddd86b9b23f421503884e97832ec3e77a271313b98060c107c
SHA512d21f97c608c015ab68624d7fc7486481fb33d045d380ba6e27ad0a566589cf9429931082ff6d82a9c135dd8bcf272017fd62439efe0b8ae5fb2528908007fe5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5949beb51b9a75d45a43e51d830ac1320
SHA1b032d719a52de9082b9d45199d872dd306099f23
SHA2566a213ff5a1b88f5c673a034b7152d34503f79e21758f040546722831d696ddfd
SHA5129fecf461c0b3705b5c67d355549ebf211464d7cdab404e21a39f64fc1807cbc0294d9e354012c902ea783c2c3a6222c8062443311c10e733e37d38e89e330546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543037df5640da3c090cd5fdb6f9dd5d9
SHA114ddd457446979b2e7be89fdb001a6a0482759c5
SHA256ec407547123d5414319d135052da9cce1f1da8265705dc8623fa14f8877e7ab1
SHA5127c8dba18de56f06c3cef10acd196dcee327380f6e5fa8e746ce1dc6f9bd328e8254e31896cb00434da91431b3fa4e2b358d24528511c38830ad554d4316d28dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54981d69fa76e028a0dee60d91d24ae04
SHA1c0cff1c85ab347c9b1207c0c8b11fb304bb980b0
SHA256024de3011e8b872cf63ee1c129543ae11d3bcca150dfd6e39da1acc61ae87308
SHA5129f220b3fc1bc6037a583abc7337ae1e229711bc46ff598ea3023e8451f381952142bfdf9b3d173567b2c8266149801d119ac91c4a36fae91655b9009b9eac7ec
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b