Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 06:00
Static task
static1
Behavioral task
behavioral1
Sample
b206f1fea54071dc0a0f69193f7d7cf8_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b206f1fea54071dc0a0f69193f7d7cf8_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b206f1fea54071dc0a0f69193f7d7cf8_JaffaCakes118.html
-
Size
214KB
-
MD5
b206f1fea54071dc0a0f69193f7d7cf8
-
SHA1
d241ce451bef5022ddd7d59ba2c7fc4f0446053e
-
SHA256
3c44f3fe1973a15ba1ebea95b275b548e33898d50865337d5f7304df265f127f
-
SHA512
65a3a153e4c6ff28cbcb2679717ae33e3afc268a198a5621e14e5c961907992ff2763183260ece9477b2d98d0e1cba2dd1e947a0a3f7b1d46a9f89a759567ae8
-
SSDEEP
3072:FrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJf3:Zz9VxLY7iAVLTBQJlP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B8A07381-2BA5-11EF-8F1B-D62A3499FE36} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424679492" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2960 iexplore.exe 2960 iexplore.exe 1892 IEXPLORE.EXE 1892 IEXPLORE.EXE 1892 IEXPLORE.EXE 1892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 1892 2960 iexplore.exe 28 PID 2960 wrote to memory of 1892 2960 iexplore.exe 28 PID 2960 wrote to memory of 1892 2960 iexplore.exe 28 PID 2960 wrote to memory of 1892 2960 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b206f1fea54071dc0a0f69193f7d7cf8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2960 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52222e87b8aed0292a4077f253814ffcf
SHA192e76eea9ff376307101d5841ccd4484949368d4
SHA25624b4d3dfa70505bdcf06cbbda9fc6b24cd27f2f3372284610e9e44039e63b5fa
SHA51233bcceba15993c7bcbb4af58f3a903989796816958c61d2cbda984613a6ae2ad3ef3e8d7f66a74ab2c57535b82711755ca2e7d7bd0d9f74423bbb8453be64422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594ffd21bf660393146743979f841c554
SHA10735e4e4e4000c40d6630a4c0610ff37e101e203
SHA2563fe20e9952f2702553cdeb335db403a893e7e96060715a6b9f31c560c1c25e63
SHA51225f5a817445d2b224024ce32d3dcdf22935687f056b3fcaa32ea7b81d114ede5a7acbee523eb7fac9795e5aaeff4a9a3b88025fc4c3920528649729da9d1f4f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5944d502ed536dae910dc95f7a465149a
SHA13bd0c60442d417cea86e1b0efa9e3ef32c0c7dd2
SHA256ee6802490402b0b15c07cea0dfd34cbe092cce3f6fb05e5d173a24c31fec98f0
SHA51285da0e8ba922fb0f229b10b01e6f9963a02c338c0a8e281843bc0999cd5bb7d19912bff382026985887f3eb559571e20937492a4a2b8688129592dc923ebcd77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec77f2b68644636e53737a35fe4b9327
SHA1eac2f3ff4330787edfd9995924c11c7b3ce210ba
SHA2569fce41d1ebd15ef4e01a19c5705109a30c1e52854f97d0768900864eb27b4b0e
SHA51215ba69931474cd96d2e226919696f10a777549d6caa41e5533c6c5c5ad7d3790b8926d255463567f8efcbf8b07e58fdfcae41a1b7a68895c2e00722611535a38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d41e177ccae69f97eab4d16542136ca
SHA109c93ead88768bb5347ec41e4c508a5b6c6f4cde
SHA256771c4631c1d938c6288a5531dc940b247aca5e53a305243d9823e5e89e6f6cb1
SHA512f5c20d7f327544d39d97ec63fe7bee3250125564f3900a721fe737c1367974ef63e841077bce9280627576a2c15d91e01ed0eb083c3a6ba02adcc252b537de72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab586c49925beeb10843c6d9e63d16d6
SHA1c0da91092732e532110c4577a2f41e77379836d8
SHA2568b99ecdba51d7a1d4279b59f4b30cb61836bb4471f167698e42735245411c7da
SHA51255fadcfb0fab66d9633821ac67bc1e2d767294a76554b20c2f0b522eb1feb6bab63d63d77cf365c1b1e40401ef093b4a1842e9038c85b42b29607158a413c769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592b10159510008a9239f96d731c0eb09
SHA1a6c2b4409d694506d62f46d8b75eb4e315e53f94
SHA256167f67095b36c9a6ee4ebe0be6c19f75df8d96cd10d0af61e8b2c35337fd7891
SHA51294d5189bf77b4da7979c30ba5412685acfa3c6dc3b0b5ef87a82c597081f6c1d7db4152f1ea3663eed1115e3ceac9a877b492a93483524a466c1ac905c99a1a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585b9fbc2ced086f7cbe9870b00359bf7
SHA1020d3013f7cd8938c658479b904c5e123d386e81
SHA25640a0e36bfc326cd54c684a8f7c4e47587b35c7fed65ed2a279690526b0ad39ea
SHA5126514e0ae6d94aa1a5ff057eed9385abdb4a3a054555aded68a6782f8c7fe590ca688bdbfcf33ed80b23f785118fd117c4570585c7ae306df8357aa944d386b20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f53409f318bcbfc0b66091722ac4b6b
SHA1a9ec1ad7be2ac82679b8de38507021bfb0ca4152
SHA2567178d941ed7ddd4422502c0bb642cdfb1bc8b0a90fd1414b61f8ef862d08a2bf
SHA512dbf54b90f2a8c772c10a31e201382c234879bbd7abef88e6e611084937d5ee20a81db1397b0dc191528a04e90e184b9391876c22510a69aa4ac09e5a27511b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59745c234240352daae728780d8f43ff3
SHA1e658b4c4ceb0e8fbf11e5deaf9c87af373247d09
SHA256af4842d6cba013cdca786537b53beccf4535480cfa9b2654b3391325491a3b7b
SHA5121d05866c08f6776ae6290e701e13dfcd12cbd894263033a42afe949e70b07bb862d9adfad6bc653ca2d32bfd4d66df66e15aca9c966f2187d8fa4da65682c6d8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b