Analysis
-
max time kernel
119s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 03:29
Static task
static1
Behavioral task
behavioral1
Sample
fe521f576225a9cd04ae82502c37caa6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fe521f576225a9cd04ae82502c37caa6_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
fe521f576225a9cd04ae82502c37caa6_JaffaCakes118.html
-
Size
2KB
-
MD5
fe521f576225a9cd04ae82502c37caa6
-
SHA1
11ad28221e5bcf8d9463529452c3ea1c91e63604
-
SHA256
9765845ad6ba8dc37972d25d6bae583996069591612e86e681824de4ac299e2a
-
SHA512
8dccee3c3b2c0d03792f9a60e2095fc75adee9780c4def720b143129fb42be6387d04174fc7b0d0878cc71f3728a2b1e5525951ee8e539894ab537dd46db72b1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000004218afcbc31587855c3efd36c175f6284f7261c48f0c4c9590185a76944472ff000000000e8000000002000020000000f46124259613451f96ec9101d87d5a26d76680273e241390d3245760ce1936632000000055abc25745d4c701a7ba00cee131369909c903e6de15bcd579df15ff7857f58a400000008571685b0b68208d1bdf6c886b3956e34e5986d111178b9683bc76b4d57824cb86b65a4a2f71b83577996114f6f023e784fa6066d540a376f920102443a91e90 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 100a00349c93da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000e3992677f4f47412b58fc3c6b36bb8f4e44fa03c019c93908b5646a4c0d80b87000000000e8000000002000020000000f8e961bc46b5b960b468925c3bc511b96796568fe1885a87962812ed3aadc4a090000000ebc35171976aa54587d5fc83b77e3f962fda3f17a09bf91267d9e9dde7e6a11821138050a4fc4710add6a3b9b1c39fd7353a85066bf515ef6ae3881f8c666969154db8dd7e25d3f8ffdfe6aaeab8837cc7b5f1ce1a023312a661e6c96abac7231c11677fc58ceca273bbcb1744d6f11c6dd566da864241d2edc5b39113c3ddbefcf582a84a6223f0660648060b084494400000002d747a014e04ae511c8a00a1cb06ccb4af45fcd790859f108687ed3304c69dda4ee38642e06bc37572d1e80b36fcda2175b98a3e114aee4f53e2d93988f318bc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5EF9CEE1-FF8F-11EE-8859-DE62917EBCA6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419832057" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2508 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2508 iexplore.exe 2508 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2892 2508 iexplore.exe 28 PID 2508 wrote to memory of 2892 2508 iexplore.exe 28 PID 2508 wrote to memory of 2892 2508 iexplore.exe 28 PID 2508 wrote to memory of 2892 2508 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe521f576225a9cd04ae82502c37caa6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2508 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed82d96d765d4b206cccb118e08017c1
SHA1afb8fdd4fa9c4663e48f8d7f0c418c8f120950a3
SHA256de8772d7ef7c870ea54df756a01fe939b17230e64e666cd0fb1533dc9fbaf015
SHA51295db30ac183d1aa82671d9ad263a09da03c0fd97bc1725fbfaa6620f380c2a08f0e1812f4f654271b7d199c55f1e0f9ae53872bdd52876de01704ee467a71617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509364b4437724336d2b5ddf4872c3981
SHA1d374714b7a377f9b9d9c5cc34cddb2464d87d90f
SHA256d58837b37468983690fb968116421484382a1803800add57f42cc0af0d072ccc
SHA5123acd057427e69d27834689a4a1555e9c10b1fcb392a9f2cf667744ee91924b58d52bd456fb667174cdf87719d5aeeac0dc15edaa36d0bda4f76cae42cd8af9f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c95c3fed7489729aa6375331fb1c0aa3
SHA1a6f8ebad33146cd6cc696f3ae4b211a58e26556c
SHA25625982197f2378d50738fcee1dbd7dc53e63e909e66ff66cefa7285a0e7de7dec
SHA5125835113399ec872e309995f08e1446f8181de8aa91d5b13028bc497cf765bc2e0b98737b6ed4eba43e644b785a24aba9cd9c00643a2674c317b86cb34371324e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518f5d6542039a795876f9ee599499387
SHA1c8a69acbe852d2de549ec3a818cbaea7fff1adbc
SHA256eedf3d18083cee8faa963bb625f7406a9da9c75468f6e5b163c8e555cf54531d
SHA512f0a56b9cbec0322cd56bca70a15d337ff1c0966710b0c6ed803fe70b9770c98bcbdcb0b7e6799eef2147281e40330bbfe3652061e7c996d2f08c867c5241e9e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d013028cadb62a8f6139cbaa66802468
SHA10297826dd70596a1847552ba22835f9c1f391d06
SHA2565c8fcf889e4c76cf950d01c13bf24792765fe5ec4d1131cf60f90edeba570e3e
SHA5127d3d25a16a8284ff12c9d4b12159df9f2123f3fbdc7a27a4b455ba268d1df187af5b200817cfc7bd4c416416567d943c3a00d825fda3ec16bc3150bd3c2b80b0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a