Analysis
-
max time kernel
121s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 17:02
Static task
static1
Behavioral task
behavioral1
Sample
46ba3142b1248cef889b99f3bdb0ee39_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
46ba3142b1248cef889b99f3bdb0ee39_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
46ba3142b1248cef889b99f3bdb0ee39_JaffaCakes118.html
-
Size
10KB
-
MD5
46ba3142b1248cef889b99f3bdb0ee39
-
SHA1
f381566abbed0b57776f817bce08fb93b001188f
-
SHA256
d5d541a216d449019705e3c00dd4d73a07afb77de2d6a93bf140d8428a33a7ac
-
SHA512
17fde417e3de757b70b7f84c42accc614ca236e8ec8a858ab75ab2e8444dfd41b73d1f503af2bfd9d5972857702071a2a5944576943c070d9a028b447faf4142
-
SSDEEP
192:2VhlIsr03rpr68k/w1wvqVkZr+BrWrtnr7rMCrUrnrw01PSbauBuLbdU8d:shlIcu12/gYCBKRnfgC47E0YaguLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E3CEAFE1-4202-11EF-AF97-4E18907FF899} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427138436" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2292 iexplore.exe 2292 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 3068 2292 iexplore.exe 30 PID 2292 wrote to memory of 3068 2292 iexplore.exe 30 PID 2292 wrote to memory of 3068 2292 iexplore.exe 30 PID 2292 wrote to memory of 3068 2292 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\46ba3142b1248cef889b99f3bdb0ee39_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb23da1b40f8981b6a3bd581a88d4515
SHA14114ef0286ddb6c3e819aea3519e69deb7da8215
SHA256eab3e3e786b8b8ead50cfb8b6b04f78fcfdbe1bf62324f8fcb01544ba926dc58
SHA512c9c21271affb01507dd77602951ca2dc818186187b76cbb37466965341fa4e9c5428a7acb07fdaa690edcd99db866cd2a1c82333c1f5deda4116a36dc2a5d10f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53640df2ccce0c1af7b6ee0f82083226d
SHA1b56f9bfc6b7ed855cda4caf9ca5c71de124bfb32
SHA256fac948010d039e548512620ada48bd0efcb9d8d3a228713bd9590367cb63dcb2
SHA512faf2ba97636dcb753a71d6812bb2523375a0b5a88fb7e69c2ef226f4cbaa8124bafa08daa5ad3d2ad1e892a86b75122d402dae96e45e29066f3dbb80a548f942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ae7cdef48973da164e3cafdc2f91d7a
SHA1537083570493a033a2546f445698ace43d5d45f2
SHA256015e63a3a5beb5c1e7b6cf819afc6eef86a236f0290ef57c442041dcc62b2fb5
SHA5126822bef5e47f3f639ad5b6a82b0f7d59ae1f3dd96761d9abae7b792b0d227b637ef5ec8a87879ccd224072e060cd6d3df1e2a631e3c73498fc226abe91c1c3b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516e5c8e758b9ac4bab1c486b7075be01
SHA182091e1a9d1902c19951a02bb10a5b79a9f497e1
SHA25646203a989d25a7c99ac9e47d7f34c0c6c19ff19a53a8192196fab32faf5c3e9f
SHA512a19fd173990cb3cd61b79533084a20a2111cd0370ba1bffd2c73f2e901f8de46652fd19d951f24a6c19713bb735ff875f7c9357d2e57f8e825d4c4e12ec99a51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5506777ab269aad1faaeee296bbfca371
SHA1a40ae260218c055fb209015321ebe921c4b41d2b
SHA2563a0e84595dd388c9965a489eca52a3f82ddf9fe78ba62fe1e4a25cefbf257d1e
SHA5125da771836b3f4ec87465af7169305bb03220bf62cfc8d5ed91fd07e3e622456e00cf3f1cc47496981a1a1af9a19e32f2a7efd845604cc900d964711149d6adef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbdcb5b4f3b514ae3c56602e1474c126
SHA11b0b88d65917f3a21ec38f9f68fd69f2f293a9c7
SHA256b184a7da8fb2b46a705e33440b64f30eb4291345dbb8185f4e58d378a44096c8
SHA512a7c14d8903c53eb2097b41124c676537eb275f53079b6e3b456635e248474bc896895b552904d131d29dd85c5b6707acf2573fe270b7e0aafe6d174d59786594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5e63c22519b8777684b3a541e9abb43
SHA1b788d3b619839839aa40c58a82b5e835abf90e42
SHA256ec2176ac588379d2691710766733eaaf0b0786238be0f6fdec092912312be37c
SHA5126f446f75753c1aef9771bf5f841c1c57b06d7b1037068caa1a6f09859546506e78fb4b701144120b641cfb4cf859e538f239fe0b5e244d4dbb736821f43f717c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b