Analysis
-
max time kernel
117s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-04-2024 08:24
Static task
static1
Behavioral task
behavioral1
Sample
005e1d89f7b55a88b015422348691a7c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
005e1d89f7b55a88b015422348691a7c_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
005e1d89f7b55a88b015422348691a7c_JaffaCakes118.html
-
Size
69KB
-
MD5
005e1d89f7b55a88b015422348691a7c
-
SHA1
e9e5920fddf1156731760ecc3cb00009d2b954e2
-
SHA256
7583beee403eaa2899d6010b32cb855fce14ff652562c112d842dc6388b0630c
-
SHA512
ef51d18c3bb83d425e0c8da681866aa22d56f70ae93e771634278397c73b563d058d3c69e4a461f0c8694d28e7158ec24461857a529f80e96c89df3aa3d36d8a
-
SSDEEP
768:JiPgcMWR3sI2PDDnd0g6sh1uQoTyZ1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFVG8o:JV1CTSNen0tbrga90hcJNnspv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420281731" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60cf8d34b397da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000496cf27412c966dfb12ca71703c2dd7ba2cc698914bc725f18a6c7c170e5679e000000000e80000000020000200000004ee0311a14f01803c52696c16f01723fdd11f20465009ddcd0d29bc373cbe89a2000000080101c6efaaf0cb01a8636837493a63dd7f03302d15f94ab36749db15893cd364000000081e5e1d3087fa5d119047a05937c07ae29ef482cc94b7d8b46ea536d0609416fab6de66dd111ee7a623e8db52de8dc42fc366f1f306b91f8a337519f4f11eaa0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5EA98871-03A6-11EF-8C27-FA5112F1BCBF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3048 iexplore.exe 3048 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2560 3048 iexplore.exe 28 PID 3048 wrote to memory of 2560 3048 iexplore.exe 28 PID 3048 wrote to memory of 2560 3048 iexplore.exe 28 PID 3048 wrote to memory of 2560 3048 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\005e1d89f7b55a88b015422348691a7c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501135ccd8720389172c498469a3b8458
SHA15e648b92f1a450b06f41ff4aa793873230e458f2
SHA256f3d18a8a7970dfd9b5ed5f57dcdb96a54a3b0219c3aa5c1a70eb6890861aa29b
SHA5122ab72d1f79a2163362b58ee0bc8297dcf6596d9c43be32f253e5c9ee006815fe111aeaa82e0ef4842053348d78706bf800f6967a176956080620939a4fcd9bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5070709bdc6ef503c15f8e6f8c1e96d60
SHA171e94e0a62e8f68738e2b0ffe00501b6255e307c
SHA25620ac837595bb0965480bfe3733fb24e4a4308c96a8d286e9ef24d01c714266a7
SHA512d1802801416ce36b507d4251ac85e6e339b9fedd22e70ad524b13beaa5af5be586114475ce2d1ed333b5146b3223889ae8617a505b12bac643a04e6bf4905bce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5178c9c03574b278b76f574a947992b5b
SHA1045f4ee2ff641c6663e66a896cacdde7f16af0dc
SHA2569a8c23500e6043d49f7bed105718242f31287077a5b2a171f06be66d616497d2
SHA5129bba4880a4b4c33bbfc90a46f66538fe15400cd4179532e003cd17f44c35bd89b663699c745a195eeaa76dc7255e8883c8bf3d2167039f751157e98e6e6f811b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d26685141fa8b763c1db3e558dee38db
SHA199cb904c73a14e8ee51f8442053e8acab725e6a5
SHA256e76214c70e6bcc51734fe4274a7fc302fca951da276f827a83e3addf056ede81
SHA512ffd42e70f1388ff556c6a671191512f1a47a459f0dd898e17cd3408d6b21f22265e12b8d1200bc1f7c71bc37365b9481f48ee063533ecc484b2a177c058f4e27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5534c44aefff62af4ebc0f0c7f648ac56
SHA11e8d6c1a95754285fd3e951f8c0be9172be98d14
SHA256a017e941c7a8dbd0544be0fb604fc054f68ddfb5906cbc51c1c60e1b518bd0e0
SHA5122fa18a3c23ee7a558f923130b7000bea7519fd178e5ad7c8efaca15bdfffa58b33245ec99215e5a4a21f82923313760e4eef5a1b447f308205e99f98b800215a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5541ca4af399e93fffe5be86a8fa26ef5
SHA1162e81aa8d3fd611a97be6bd95e7471056ee0263
SHA2566d6824651ff459e10c11b6b1677878798756374dcb043098ac98504602299245
SHA512f840f608014d00395495d4dbd67ad6e93955bc0e6cbff23f1c1ff3822f67ae6a8fb1876c18fd3b3432de28fa5062624b47ba7221de51c40824828de621d6f880
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a