Analysis
-
max time kernel
130s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 21:13
Static task
static1
Behavioral task
behavioral1
Sample
4b6c9c1218d9d60d1e270875d85486f3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4b6c9c1218d9d60d1e270875d85486f3_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4b6c9c1218d9d60d1e270875d85486f3_JaffaCakes118.html
-
Size
23KB
-
MD5
4b6c9c1218d9d60d1e270875d85486f3
-
SHA1
2c33b01594253e93c15db224c97cd2d958f0914f
-
SHA256
3179eb249555c31293690f44cc90f01b167c32c9bf2ffb34f11c71dc15b93ea7
-
SHA512
5fc4221ff23b0ae519aa5d3a1346f315579c7f1215e998defc7f80ba38dc2750b1dab6ed441b2cd44440d37df5ff84cc9d3bed89c467e8893ed9a8e57498dc18
-
SSDEEP
192:uwl3HuyrRpyOmb5nGKOWO8b/OL1SIn6ZY6nQjxn5Q/nnQieU1Nnv5EnQOkEntdH0:7J6KQ/oG5gg
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0BC03EA1-42EF-11EF-9BD3-424588269AE0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427239860" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2580 3028 iexplore.exe 30 PID 3028 wrote to memory of 2580 3028 iexplore.exe 30 PID 3028 wrote to memory of 2580 3028 iexplore.exe 30 PID 3028 wrote to memory of 2580 3028 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4b6c9c1218d9d60d1e270875d85486f3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e83c38d5e13c48c97edb9c8c264d1e5c
SHA1004a0c549784a7d65728ba6aaa2b2fac05e67b0b
SHA256f36d58ad7204705f2c3cf57c5b82b7c547dcefe2e95bda0b1cb71a4bf3df9555
SHA51215da331baa5948f6dc075b8c0c4f70ac16de07eb17e583882b4094b9dd8f613126b98c39798ee8e897b4aac6bda4625f4b15c4199b2418b0c0bccd3654c33b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584dfcd612d7529d87ceefc22bb90755a
SHA15af7ff270dfa602bf32b3e85700a4dba0f6c3e6c
SHA2568dc0c6e34e868220772bc225843a77a33f3d982da730be47e7f6749ef399bffd
SHA51286f2dbd158462654446fb55d28ac3e362346728a985c5074e8ae470698b6742813e62396b8d2790455167e2e9acd8c3b5e0ca2321c15142258eb9b2a99cd56d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b18f0439f28ebd99e820d8b5258bcaa4
SHA19382952fd30a66ef35ded9f39de29df2ead53723
SHA2569702e02d210d59fd9f4dc09c4f13b559f100116966b5c4862a6741bde58b0303
SHA512dee9a1b354d2f5106177ee5c8840043b1c52aba39d11cb059629efae151e16ee8fdfa418cb28cb46d55cafe8bcec0bdd87b32bf5920c20b15bc39019873cae1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511dddb00cf9a343cfdc71a1b7ce4be36
SHA1ce5b8252b891dcfcde76098742f4c3c62c418fc1
SHA256358735426a6dad9097c7149308956524367c1965dfd83a8b2840106987efd2e8
SHA5123c4927057bf85cd81d4361ff46026d31ee91af07d2f8a535956f7b633110432b4aa9a2f34d8459368a03214427b3745b0b00281404c57c62d128aced31e8886b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2693b566abc3060650cf3291a302e87
SHA190c2c610564120f5ca7fd6e133431a664f575582
SHA2560857a637e0073ecca00cbcdd8daa6484e32402d7c53efabb2c222fec18fd9f11
SHA5122a357bf47255667876ef22009a5b80f589151106e8a8898ae58a97f55fc105c78e0964bd537f1dffb8939cf25fa6ae243b83928dc4659822d1a3b5fd59f19fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584c6b8c459a899f7f2fe60900d95e9ad
SHA130bce4ced571914efcba7188a28a96cc1a15485e
SHA2567eb5c5d8f61dc0f261facdd932feb719a6adb929bbcb2f60f7c23cf6a2760bd2
SHA5120b20883e87b48f5e9c0386f7d97dffc9583371faa3e046e7b65eb5aa09a82b9e231f646630f66a46fef94b9b94359e59d8fb2a17c55030c6abfcd152ed150e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5375a68b860ba2df10cffa3547e038f1a
SHA134d9b57088a5db5b121991eeefdb704432d43758
SHA2567fc413bdb827760b8ed284bd4ba8bf086d2ed785915492a51262a0993875e2b2
SHA512fbae33cbbbba21a809a3276e6718b37d383fc201ec533e7e9a5ffbdb51fbcb6e5f077de7d22eb3239ffdd4dbb84028705d4b1e13f1940cb35b7bf6c7545d204a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557c0ce66cb828b656bf35939b96f2261
SHA1546d5b150fdedf6e864c520ed2f8b7226120f7cd
SHA256c5041863f2e82d812ada1674c5ca1decf18316a2e939bcc0dc826e39a5cfa8ae
SHA51261307c1ece1a100e5a954443f9c276f4b340f0e419b5b6f620eee77512f01bc14a0e84e18e2cb3fa14e99a0e39a68e73d82774acd140b2c5d48be9077dc8aa3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5569ba65994b3ac78584114efa9c28e65
SHA17894a8fac7853e8ba0971647c3d7de662ab45b9e
SHA25694885e68a544b59471392d747ad34acab0748aab137f38265e3c12f7cee5fddd
SHA512d679fe0d77d91cc5c1d4a4235206570463dabacd7a146b3c427d868ed9f818d5c351517884b863cca09556a68deb56e78c7e1499fcbcf02f54a951f085b215fa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b