Analysis
-
max time kernel
137s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 10:43
Static task
static1
Behavioral task
behavioral1
Sample
38c995f90ff798770ea3ff518352d69c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
38c995f90ff798770ea3ff518352d69c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
38c995f90ff798770ea3ff518352d69c_JaffaCakes118.html
-
Size
44KB
-
MD5
38c995f90ff798770ea3ff518352d69c
-
SHA1
9e96e2367cd2254ff5323d39a2aede36caf82368
-
SHA256
45620c4b14e5e5220e2f33713e6adaec29db8b4709c538b1265312262950af44
-
SHA512
d3d9c458d5740d99f2beb27bfddc35621cc47dff2dbe4392117a2bc0da1e75fe57ec6408f6bfe1558100c766e9558cac27edc578c2aecb596e82a5604233d6f7
-
SSDEEP
768:6GWE2AiHMP0Csi9hJ1lJo8lBJLv8+MaBEQdlZqe4Taz1MYEXR11LTMgw8xLZ:vWE3ioz1MYEXR11LTsq
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{71FE8531-3F72-11EF-84E7-C278C12D1CB0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426856492" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 696 iexplore.exe 696 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 696 wrote to memory of 3064 696 iexplore.exe 31 PID 696 wrote to memory of 3064 696 iexplore.exe 31 PID 696 wrote to memory of 3064 696 iexplore.exe 31 PID 696 wrote to memory of 3064 696 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\38c995f90ff798770ea3ff518352d69c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:696 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d0c1aa7d29e94598b59f51a7b47e63b
SHA135ef6340840b29ee6ccc8c563d6600fa993ab7f5
SHA2566882be28ba6e9b88164849d9c4affce91dbdb971a975f22aaadc5ffe64d686cd
SHA51222e35238c2e62ae4a53c782562b579782b517315f8fa4a9742b591e17576d086a61446e31cd35fdbc334396080f1bd4fee5225263382866d322e5759468f8918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d9614feba0acfc560ce0c20c5b6bb72
SHA1977284b0a1e2647e832827df632003a11aceeab0
SHA25614c5b1e412280ee03ce74b64c2068c7a5a881a91e1875f092a817385501b1138
SHA51283d36e74a0947beb4bce54eaef9b02c4c051293e7b3497aabfc17467ce454cd494dc9b0d60455b579d321cd70b914e41e965c3157b474a2537c5bcbc1df99a24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e743ad03bef87b6628f2481c117eaef
SHA16210ae69d433ca7a1c76f9e819caeb6b4c353522
SHA2563d091d047a1150f69d59e0d2bb2c0aa37fbeb8d3f4c770814351e0872b65f8ec
SHA512b0a4ffdd73b482badfbc45a189d3f6f90cebd17950979d79f2bba47fae8fa034603262116a37e990dd0f6ed594fbb034f5409f45f9ee4279a42f4194ec97b05c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52956ce72f1c62db33cb3656fd4f21864
SHA1180e736748eca9ed397eacf8881cac791002bd19
SHA2566f2b1c1a2778a074a1bd5e5b39257c04a1902c07e85f0f14e047c3a35de26497
SHA51299150c81f528898fadbd5e2e51cecca84d7d73d0e28476dc30eb110fc4bb3d6ca794c9692bc316fc01f8d6b02009fd1bb7c890606c1edfbbdd42fdbbc8205112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e66b89e4aeb52e286f9ffa8267bc72f9
SHA1319c01ed1f1addd8c146d6082f1a1f060688cd8a
SHA2560406388ed7c084ac03ea00511d1108ab7ddd62df7bd27fbe74745ab57d32fe7a
SHA512a6a2f0524796b119ecc96e1dedf7276b47aca2192fae67c3fecc48494b37f6581beb91624a05ea8ee7edb1392ae1b57b4eab83525e3a6075472908aa7fe86d3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b164520e0638e8a2b8540854ad3dca59
SHA1cb85a57f894ab55c3fc868010bb3102282e63336
SHA256ebde232c48270318d0bbdd8508982e52528de3b758cc4a2fead015024ba81f61
SHA512577b969961bf3fe39147656a3204559bebb41faa3492370b7cb4218c061ac754247d9f87d864cb20458cd46ce0c804a1b8b13837fe21f0f7b17cea90607f3867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571258551e58fa6ab2929cb8ca1cb726f
SHA14945f40a6f0498cd5e463942d71184df24908e14
SHA256f9d0ca821f75a3bbef745e59eb36bd6b70e7e947a9a5e019217fe4051ef3213c
SHA512bb427ca028df2bc1f2986778266ef2cb1740cbfffe4878995aabfd982d121a5d2321684886a1c207253a6c5a39fb3f99c24e927e74d4978a8d4fec376b1cc6d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebeccad269c3e33eb59c68ce241ca710
SHA174d2d371095adf293a48f556111c197d6527daec
SHA25611589f4a6d75956371cda7ec3f1e07fef89291e474946aaf5758c9d4ad97686e
SHA512dc73353ddd1e6cdf7b29f7c6c6a7f2248172c455ba0d0e606c89ec0af5121ba4247ce8acf7d469daa864976705a7c9557d11171aafe7f2d15bc3a60364bffe7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e745678e14ba502bc16aafc2177d9f27
SHA11565e48738d0f4fd47c917ac11ca93ab2b685084
SHA256dc6e52cc60ac7911e5ac2e713372f405eeaaf6021378ed42b4337503e1c12c16
SHA512953455fe76b62b70749f553f6ca48dfdb3404662fea89c8f20ded74382476119d2f982d00d54741924b0f2390267af020eab96c7fbd8000800dc981674e263af
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b