Analysis
-
max time kernel
137s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 19:23
Static task
static1
Behavioral task
behavioral1
Sample
aff78ccb573d0aae17809eece84a74de_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
aff78ccb573d0aae17809eece84a74de_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
aff78ccb573d0aae17809eece84a74de_JaffaCakes118.html
-
Size
194KB
-
MD5
aff78ccb573d0aae17809eece84a74de
-
SHA1
3947eedf0e37c305264009be3593f2e1d612bc3c
-
SHA256
f5c353550eac0acfd78e3b4518fc1e5f432d149dc55d01569979ab8b54687779
-
SHA512
803bd6d51bf075c93bb811d2adb1186450cda3e4d036cbac2038a82e80363f512cadccb87716e178d968b0d86b89038216cc3fcbd6425e5c48e9551afae623c9
-
SSDEEP
3072:qKKLCyfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:qKKLHsMYod+X3oI+YS1tA8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000a1b9ea2c5f38b0e1908b1e9ca0fbc322ce603fb0dc6a1db38b235159ac2f8d8c000000000e800000000200002000000037565926d7f8d4de15bad8eee9280401007b9f4e3eb9e320d550fbd5d2bdc516200000006295c0570214b5d639862409c4ed13be902e046f6fb004f89603b9a8814aea6a4000000098187c2da6c805add65411af525e130bbf67ef7742c2606fc2e542b36154c769a02c01cad9b831770c11d99e02707226dabc0da84d79aedaae05b4cf6ffad8b5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424641279" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BF7501C1-2B4C-11EF-B98D-FE0070C7CB2B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50b3359559bfda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2216 iexplore.exe 2216 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2908 2216 iexplore.exe 28 PID 2216 wrote to memory of 2908 2216 iexplore.exe 28 PID 2216 wrote to memory of 2908 2216 iexplore.exe 28 PID 2216 wrote to memory of 2908 2216 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aff78ccb573d0aae17809eece84a74de_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bd4d3051484fba7c7896a17d1daa706
SHA1a5653fa32a54af6fb8d4f6ad607fc6e62577b726
SHA256c185dbe18a88840b161b225a6924fa3a9757f34653e66abb81bdc4bae9916151
SHA512f453d4facf71a683ac4902ca09928622e55df3c7322a9c524607b3836bff1bedda7e23143ecc9f25ad68e1495a7e82efa563694ca367ea8c9f4115238178b78f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564d0a71be60d7b48dd688d10247bb0ab
SHA1a8d1ce4dba5507150dc3fbf442daad7dc776d904
SHA2561bb91252c0ee6eceb0364d90709d108f9707b507ebae604e8e33e4d829ee2611
SHA512f0252940c4b3cc7cb07af430c33e5fd824e9bac738f878d28d4d4ef35ae1a34437ee2f4503e6e11229e766fce3a613d2567b93b9b11a25f6fb5f28b5a581edd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e872fb21a24aa9fc638c062596958e2e
SHA15e4ac601c7bc4b34742e352fc610f4242556bd92
SHA25653aef8af0eb36b8b6c8ae9bea025599b30adcdf50145c26effe7ef972eaa41d2
SHA512376a82fa6a2505b2481868410295f9e344a7dc8632905d164165af85cef847ed0ec3219879cd9a29bd21ec5170f046c6f9450f7e6cf682eb76d45cdbf17bfa0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535e060e1a292cdd92e4d2149d2041895
SHA17e22967959148661ffe96d71e9d98d1dab5676dd
SHA256bff6fdd05142be99d2f320d24d8affba96ab8dea740f5e99a566ac355a976481
SHA512781c7ee051d4c278ba4eb6e3b2ff1fbde3d94dfd5c9c653d5d9294ef9864eeefc8fcf18c5bdafaf9466c4d608935d03cd090f806f46a389e1b8b2b9da4dbbeaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6b75e43102013b27f5331390f9b66da
SHA136753420ee438bd60ff6e5d16aa6cfdfe8d1cbfa
SHA256ea1aa30e8a8c65e5f02168d095a3f037b35d528791d94e420c0390c7233275c5
SHA5121c547bea450a8e6a04f2b60d84b109b504424778efd44f1fa5732928b567fddb455143f1d5a1e9595d099d5c9540e8b83fc6de350ff9126568a8959847763480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1a68b454f506d88d4b5480ca90d61c2
SHA12fe04a14fc0cd7666c611546f2e14e8e042a30f3
SHA256a8f0320512b847451cd725c03c61eb5c92d2969c64abad0c678f884c6a930673
SHA5128b318e340d2359dbc94580c174ba52908a47a1dfa7a6cad05aaf2d7bb2139afd0e46d05b4784329fe9c96154d1e65aff4ccd4d775632df481d3764e911b0925b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5346d9ec9b0883c4472e17f0a04e108a0
SHA1ff5a548ab6030c61c02c53429d83fbb4bb288da1
SHA256611bcf5ff4c2d4502664b757086af7c4b21fc1d559581f20e0d0f1b7948f752c
SHA5129a2dd7e35b5e01bb1ab3dbfa39cb92678bb0a6cf7f05bf5fa9c19ae9a8da076e9d8c0d85d6b7351b8a5884ef7d8c2228b0cbe439d61eb7bb929118bd0c99b42e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a0683924f2730eefabf2574dadf1059
SHA12c673a0469439eedf6eeae2e2d535f175ec79eea
SHA2569a42d6f91bcea0da4b0fca2623d193b76e2851dd2deec7c383b05e4d004838f4
SHA5128d0a181ef28e9d266a70ce736323d9fb40a7a0397806d5d46efab4f9d77bd7264701ba271b5ecd9d31dd4c4ec0d0ef9ff3f236f16ad0de2fcb8f9e23e23cfe81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c66e86c52c09fa39c09394081993e1cb
SHA175d6d3f693b7a4bbca9ccbc275eb8d7121824ecc
SHA256c8eebfb757d61cd9497232b6b9904dab8f35f3c3c89fa7283082e92e3da1909a
SHA512262965267a88f9b27650346217d984c8fd755959b9ef23b0f4a1c1375cba85258d8b72a2e9dfcd65531f396063df5c00de142518a42c1b8f4107a89d05f56fa8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b