Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 07:11
Static task
static1
Behavioral task
behavioral1
Sample
48bfc0452f5c7ccf701513fdf67edf7c_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
48bfc0452f5c7ccf701513fdf67edf7c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
48bfc0452f5c7ccf701513fdf67edf7c_JaffaCakes118.html
-
Size
22KB
-
MD5
48bfc0452f5c7ccf701513fdf67edf7c
-
SHA1
802c0a80a535db0d1b6f028e42d441f3f6f38a70
-
SHA256
5b649c300820e2314438a962fd83ef7cf19957a5b30f5b94a17e6cf4e014dc67
-
SHA512
52d5802eccc790fac0a77882d6e122b510dc2f8e39e8242409bbb78fdd03a68b080bb45df4b73b5e3020b0f1958f21f7738916d0c0630e900ac709d7064b841c
-
SSDEEP
384:YhSHlIcKt143EGTHzhxohT89QUhxoR5yn6Z8f/gbbAguLZ:Y0dZu8XgnAxLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{79267C01-4279-11EF-A037-6A4552514C55} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427189364" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2492 1656 iexplore.exe 30 PID 1656 wrote to memory of 2492 1656 iexplore.exe 30 PID 1656 wrote to memory of 2492 1656 iexplore.exe 30 PID 1656 wrote to memory of 2492 1656 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\48bfc0452f5c7ccf701513fdf67edf7c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5475f9f86cf4ed2c61d086d0761e2bd9c
SHA1cd2494c4730e56a24282a0bf4f0c652ce4570bb2
SHA25630c06109f99bf6339be0b826c78364e0216d18554a6f30404b41e3cbb33f5994
SHA512866d743f88d2fbd1480c597b67b2271124a66085118923c3c6e3c0b97c8b02f29e43ead5f466dda6c53988233d794ae9d615ed3cc49d063dd78bc874367b6ca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b8e5781d9f183384b71945598b5c69c
SHA1cb8fa49d758f19343288018d2dc66ad214373be8
SHA256b259d90549c42822d488a323af2335a010d9d6937f31e0fb38dc9ab2f51dc652
SHA512f642810de5dfe7b5abdf346ac0784343f75db5737041d9b7f1fb5f2ff13802bb784def884041c0fa904b6c1ca041e0ee29a3e559fb2e0100eee1a3999a10e5ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547024b79d59abea0705eb0742082b090
SHA1a36879aabb76ab39615d9070e52875843b2689b8
SHA256dbd14fef2bff074f7606be8497bb77588527b4984a2aba144738b4c59d17b526
SHA512ba89a9e920e79a9232bc7f5da613fdccaa2a3161bb3cd23927492899f2fffce15164ddf07d33a3645bc715138cc8a5c8bfd2c9c7da0fc33416ca95e17bba31b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a009fe5b9d4f126da400c37f5b5e28a
SHA188a981544f1f41b302be685ebe4a25e93c3b351c
SHA2563c5ff4516369282082c327006fa0a799efd05ce94a4dc22d0b3f94c705e5e152
SHA512ae5a6c49d38548b5c89e343709915eba383b87cffa4df80cfaa2c6b92ec3a444a864bf624edc1703b5c00b5892bb7900650799ca3e804d3c0d182f0abb1ac79b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517c2e8da160e6c97dc8a72746aa227cf
SHA18e5a9d3c2a43b294f8362514bd15b113ba56d924
SHA256ceb5f7a5e43459bca7d5df13aca0fd2e0de2914ca914bccf23b03780cc4b12d4
SHA512f7baa9069f737c0d66fd6260502876f797d62f1d98c5e49729d18d6c02d735de63d865ee82525f60dcb669d796fff11c6a3cfd155be2387d2b61aec739a1da95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d671478436db738973937deeda2b3a0
SHA1c18045387302e5d6b907d5bac1e422e8b3b4460b
SHA256a5fa731f440c5ac9cb190cddf03919a315490bbbc71b319579542d197633e1b9
SHA512bc680bafd6cbcf7687782e9c4837c1418dd25ad286a9d13cff92e2fb8f71b46bdf61000a54aa87516afdda13b9d98c3ae807eb6b14c76c1d19f99b6a6edf0d03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fc3bd1711dc72821da18b8c445bc6c8
SHA1b867a4b22b4bcd3f51babc2e68dbc06b330c8ae0
SHA25668dbcec5ba4e2db1c1be2c9b4fd1e9ce25adfa3e4999861089977c914669bdbf
SHA5125d122b42093e3bb764bdc95cbfee724a9a6c8940864cdf7585d49d25b12dc862a251aa6df02f5856c69da8b3e8d14cc0ff64286b19f3ba14461230e20d4d606c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536c907246adfb254fac809a55dfc355b
SHA185a44b4db8f47db483657feb8beec5cb5449c682
SHA2560c3ea863c8d268f43a86357a21490f6c70dde78ef7fad55ebaa6a255b529d873
SHA512ed5c43c26ccfb4a6aa4438ea598bedbfa27a5e87a1897b13da7aecd3ea8cbd62d880295161e9eda67906be18ea5ca55228ee4c08652d4055a1fd785e7e0bdc65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0d13c318d2ebd545326217768eda34d
SHA1653f3c00ceea48a139cc6056361f6a9b96340c74
SHA256d97ceffeb2f46f7079a0c4b8eb015a9fe3190b64f9471cd2f06bd38220c25dbd
SHA512adaa8027b99b20551ed076f54d30d04adc6f7f2f02124ff69ae2a020fc9b2514271849df728a25d5b5ed3d53b5c41d64587e0f8c86a9b48f46fe9afac8d593b7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b