Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 02:53
Static task
static1
Behavioral task
behavioral1
Sample
b16d3c0a6d53343d2c4f248bdb741fb0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b16d3c0a6d53343d2c4f248bdb741fb0_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b16d3c0a6d53343d2c4f248bdb741fb0_JaffaCakes118.html
-
Size
28KB
-
MD5
b16d3c0a6d53343d2c4f248bdb741fb0
-
SHA1
99bebc18ea8d280e8dd15c32222f3692195e9683
-
SHA256
f16c97d7e98965080180d266e41ff82c95692be71ad42c9ff041629c9a89a852
-
SHA512
eeeee649976622e457d5c0af3fd245d76daa41f4e05c498b236c3835c0a92f7e99363e5bd7dec9a4caf00cf0575719173e39795762bc9a4483127589c22450eb
-
SSDEEP
192:uwcLdU5OH46tb5nB/ZsCvdywFDgIFFJFnQjxn5Q/fRnQieToNn23lnQOkEntN96P:xQ/0TEQaKqS/A
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{98AC1E41-2B8B-11EF-B5E8-DE62917EBCA6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424668271" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2288 2068 iexplore.exe 28 PID 2068 wrote to memory of 2288 2068 iexplore.exe 28 PID 2068 wrote to memory of 2288 2068 iexplore.exe 28 PID 2068 wrote to memory of 2288 2068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b16d3c0a6d53343d2c4f248bdb741fb0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596e6fbd4e3d61bbeb31fe396fdcd3341
SHA1736bda736e65f8889c58436d77c65e43ad4ffc5d
SHA256b1670c2581661dbcc4c65092c94fc4b14c99dabeee980dd1c822c74f4604e1aa
SHA51243453c306cf6c4a6b43a5732866e212a9174e30aea2ca6e38c9191080937baf51a5e731ddb642a9bddf2c31c8c8149821663e60547541c372fa151b7cd7031cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52119bebc6a1931e2c5d0a3f830d1cea5
SHA10a490c420e5706dce9e654b9d9ebda42309014d2
SHA256d96addf8c5a55415c3260ef0ac973f6a2da16444671128e926419eaf478c827e
SHA512c93fbd8c1b761e4ef8dbd040339f6190494a28a8bae50342b4ea52bbdf34f77504388f8205cffc9a57bf371d5a0455ccb36f244a494bb1f40833c5faefc5b586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57af081e61dbb595325faf15d3e88b544
SHA12411409e94cad7cad0e8995be25cc05e021e4044
SHA2563ea0fad228bbe580cf2a795e4927cce6c7606d946197e1210604057aa5e3db27
SHA5124fd6bf912bd2ac7f20de54c76382bc8e6f0374420d60827d097889a5199ddfb0ad49df34ebe8f8fbdcd6def5f62d3d9b44ec505619eab477e059b08ac18b64c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548a1aec3cae478cb02af40f87bdbf6c2
SHA158057711204ffc1ee759365abfa4322ff2add407
SHA25657f50126a8d1bb66de41f41dee50c189bf0f67b189674fd8b033e53a85c07fe9
SHA512db1294cd5454f29a2ffd529040cc82ce055e2342497126df451decfef27fb47f6a9a17c5f89582d9387bdbd87639c0e38902ae2176d3481b812bda99640f8c8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5828962f2637e17c4159101615bd5fae6
SHA17dbd70d7d53f3d7a8f642dc839ef32431a4cbbef
SHA2565cc9684fb8bf7368933091492714f019e6e1aa5f9b8b6e813262b45067cc3643
SHA512aed45105596da7104c313b4a09f20725cf371c9cabdd87464079ce1c4c7814a3c8b25219f06e24f9f3581bf2361729fa302daacbee2c664beab58aecc1fb8ee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52517fc128e6aff7da98719104bc53611
SHA14c804a70737026b207988f8cd70ba469bc971452
SHA2560bbe2feabb16318f5db11d68c2c318c46cd946c1c92569499ddc35c52f5bde95
SHA512e8999f0ac919bb48114976b73cd2e62df085316fbf2fce998545ec448210612b329fdf9bde7af2963b5c6e1e7e243aba19a19046d0bae10d6f9137fe8f283a73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f66407f0333da7a94dcfe726ab973c1
SHA1170fa4ee35cb4e307d41f659c3d3d891cec02400
SHA2561390baddc5c36bd0993cc64ce12ba31da5bfd2be7163298d856fbdc87fcc3a41
SHA5124f88167b18e8e031dd3a7c21d7aaf17f5b3ab8558d5b26e0c867e0ee2c74e2368624842d21a3483134634d14eb54c545a1a944b9fc5399046e989385e06e542d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8f25667189091b264096dd534212992
SHA144f4fc67c6cf2bb2b616bfb7525ee14bc48435b5
SHA2567a3ca007acdf19b10d6390c96b5038f8f191c0f862546e07bbe550a43814c319
SHA5127e72dc529e421a7822a07a6e0c7a3d5dc9a8991280ca4ee6f5fd90ac524f371e87d00f3252219efd22f3b97f75e8418e69ba01288ac64707b7c2b32fa614387f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5498967c90ebf2591888cfb0f20c81d30
SHA182e141e8bb20ba6450941074343fcfd4e66a8b71
SHA2562a41ab2fd4983b57d024d74a19af9463c116f1880d06a698584bea8e430fd7dc
SHA512c117437771e09e165c444dc3aebba1e37759b28ea1b1418fefce8131cc6384bfdf6a91718b749b194d9c4909ea42443f1ecfc65c36070318383a0eb8634b9315
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b