Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 05:18
Static task
static1
Behavioral task
behavioral1
Sample
3370adaf28d6b7908b1d2b1ef10eebd2_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3370adaf28d6b7908b1d2b1ef10eebd2_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3370adaf28d6b7908b1d2b1ef10eebd2_JaffaCakes118.html
-
Size
12KB
-
MD5
3370adaf28d6b7908b1d2b1ef10eebd2
-
SHA1
fc4627eb43000831a40ec90d69c1a5dcb55d353d
-
SHA256
d4230ee099a04118a94ddb1adf122d7d0f518d3c56da5f99f90311096985d21e
-
SHA512
aede9fdb3e52af1b434bedd2320c4e6dcc170d671d3a843e5c717cdc32d53a1da1fa8a968347e12c55f97b09fb744b820a400e72eafa5a6ec6edcf91b186c9a7
-
SSDEEP
192:2VzlIsr0KXyJAlVCUN59e8k/w1wvqyXBYZon0xfMX011AuBuLbdU8d:szlIcrV3j9O/gcXBYZon0xfMX01AguLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426750585" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD1940F1-3E7B-11EF-80FD-52723B22090D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2752 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2752 iexplore.exe 2752 iexplore.exe 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2844 2752 iexplore.exe 30 PID 2752 wrote to memory of 2844 2752 iexplore.exe 30 PID 2752 wrote to memory of 2844 2752 iexplore.exe 30 PID 2752 wrote to memory of 2844 2752 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3370adaf28d6b7908b1d2b1ef10eebd2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2752 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab1507c844db9f230707ac7d7671fc0e
SHA1a8e55261a15a27436eb55a0017312985d78e58a0
SHA256359c736f7351ccf4fdb6fcfb4eb296766527793f9e2882d74a708982ea3ca7d4
SHA512760851789c7bafb7ad7dc2f9a4f79178513b960dea352e57c0c758c910de492c216a2a0d8d8d317c57a73c39b30ad34a520462e54b0959c174308b11c03a55f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e6f3df777382ace122a6fe825ae144b
SHA1be25c4b068ec43becf5833a6955a78e4187f107e
SHA2562029d5747a0bd64fb907c0ff3bd6e3da29712cabeb624f91589ff7e1429afce7
SHA5121d0aee92419a36b01e057914511b9d34c7c21a045fb69a5380846d12f36687a1f5b5f974c2980ffbcc7e74f42de399458b5640ef15da2c81999352b10d52349d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53434ae49684ceb3d7445bed8b05e92aa
SHA1e4ddb4de13575d7bf87041be1fac7b3a0047fd97
SHA25641e56b59b120ba31690520d886b523d50b37d93257667765341bf307eeff5fd0
SHA512fd250ee0f5a6c4dc449e98fdbb791a8d82ad16d189664b20d43a021de3797304f2f6b0fcac1ea2b9abae8038dce8e00f41bbe5d4ef1bd74337c21c398bc0eed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52488e0cc7927641ccbaa0276ae6dc474
SHA1ec050a96a27c03d7016387e1092dd765feb40f7d
SHA256e8cfef8f22ae199557478ed0251cb25bb5567e0de35a0eeedaf0066aa5c502ab
SHA512e6d1e47ac9b87db439daafa35da5680df012988cc49fe2bb31ff16be1afcbf98d657a584c99f76b17528a51d62324c4a38d7cbe89efda69b00e1da5d4de618a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d668ab2cad01e28db9242d9ecba7de76
SHA1e4cb9bdfc9d76d629f8b3bc2f4c92e8f62e0c48f
SHA2569ccc3d0bf32790ed1a9bfc956fa64ab4ea688845755db254817ee56e0759e7b0
SHA51211fd782341c80b9d4513965cdc14feb13f5a27a3d8fe54d36ce86054c44cf72da117b95015a3a90c460c1dd6da6d666444db19e70dbf479a036b31dd98db009c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5063f7f07cc5cae929ac42ebf7abe9cc3
SHA1f7038c88116803ebc8b23a0e2513833e9a50fe57
SHA25634ef38874a7de4536039975516b3b3391035d34ec32caa0c290bdb36efef9f13
SHA51278c61ce148051d6a28cfe69c0bb502eaa4722f47c416c8e2baf321425f387fdbc6960a2d56a25d3a71db5c05201aaf35a446f3195da638701d546478b72900f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5984c92d067e149ca00ffe0090ac427c2
SHA1bfbb79dd52caab73246357e44fa2cffc138339ee
SHA256d95804b6afbfb1ee59cf846bd57add3580dc935ea5dbac6ab369430f6b15c7a2
SHA51290141f5625365e0e8f78603f6362a5c04cf6d46c533934672c5f6f910a1e91d2f5688b739072a380a3376069004216e2b2a23484f45b86a73af9bfaf1f84c0cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58748e7cbb8f9d43fe99116adc3febc9c
SHA14bb65a58778f4a2fcddb0cf7bf6a4af3eaac03e0
SHA2565626e975bfb3aee1605289df14ee2e456d83bd5f32cab23bc9aa1590fcfae56e
SHA5126bce31912e90f14b4d6d3a4894c2bc66d28872da79ed6ab8cb3969c5c1538836a79e701088b93eac8bf670f5506cdd777565e6bd0c972de46844b9e2d9dd027b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff604bbdbfc7ba1064740b814bd18444
SHA15fe3655586c84d9dbe995058a8c7fe44ed392571
SHA256eb3528cee281cabce93e5d9fa0289a8ce0980c233471b95ccc90a296c3ab5b76
SHA5129d8cf44cfa8ba1c0798056fb27531ffb500cee29027830cd196a34b3ee941c5c52998c1fff6e17291ac996606b3439b085fd5ab81fd969d0a380a51a42b1b288
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b