Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 15:15
Static task
static1
Behavioral task
behavioral1
Sample
010de659e4738611b8ee1187a1fbae5f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
010de659e4738611b8ee1187a1fbae5f_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
010de659e4738611b8ee1187a1fbae5f_JaffaCakes118.html
-
Size
18KB
-
MD5
010de659e4738611b8ee1187a1fbae5f
-
SHA1
5813ab27dc03851f12cf0fb047ba82bd7bf48534
-
SHA256
54f238771e3bef0de51752707b01e3073de536070b537cf405244fb21f99dd26
-
SHA512
907f9ef146c5114fb80d2fdaf569a74d3dc118f2a9c317648ed86d3496cedffa70b860dc7a5627a71efb76562dc876f8fe89f68a1de21d1377dc73200a51bfb8
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIY4yzUnjBhmo82qDB8:SIMd0I5nvHnsvm7xDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CB2BEA91-03DF-11EF-83FC-5267BFD3BAD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420306386" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2024 iexplore.exe 2024 iexplore.exe 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2592 2024 iexplore.exe 28 PID 2024 wrote to memory of 2592 2024 iexplore.exe 28 PID 2024 wrote to memory of 2592 2024 iexplore.exe 28 PID 2024 wrote to memory of 2592 2024 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\010de659e4738611b8ee1187a1fbae5f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f7310a4cf96124fc8070ccb4e6913b9
SHA1ecabcddc038d85e5bbb033c9b1105856cf169104
SHA256075c5441634796aa0d6b0ccb96c0e79210a0184fae9d18b7906b517372f528af
SHA512884bcaa48b2395ee36bfc3b9895f4b8411743def51a5ae29c6e9e1dac97e7a077f29daa3ce50679dc2f5b6b6fd996ec91b9b560b2d4e97bde18f48b140c9fda9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f523d1d63215cf54c0e283180e9644e
SHA162fd6c1f4a1fac31efff6a8d049aa7196045b1f9
SHA25625972b7b894510b56a2b4bbb5752102414ccf3f073ea02e9c01ca9d58545eaa0
SHA5120061f897363997dbfc316d66762146cae457e8cbd094e4edc3974a6915c31700e5c54b365dd42557afd3328320a9f7f8202e4d869ec6320516e558ed59b242bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5973d18c15d711be77ed89774b4cb12de
SHA15b0abc2dac23e6c1f8aaa7e8dcfb4d8a8a69a605
SHA256a0d1787ac2e3b86ad05284bd95d64b9820f98639adba91b61d26ba98850581ec
SHA512d30e88feb6a0a3c6b73a488a7c51d5d5eea7caecd4ad30bf9882d3a42139cc8254fec6072dd876a295ea722a3d308203900f2e09ed1aee52e96799c9be2071cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5434d9c9103bfaa08dc9da4ede22c3da2
SHA1cb6f01c68a58f97f0a2a8d06cf36f8bbdcb4a927
SHA256dd406b85535d37f043b49e05bed540a5d32e9f3ea42ac7cc59aca4ba48e3c660
SHA51231b17a5eb7856c003cb2a06c6a5766b39d1ef64c0e7acf9567f43affa38d352ed898071ed49e040cb2d330a7652d051f00d944e2dd113dd8152d18af860f60d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf5d4a028943c4d9f4fe3c42b4f9cef4
SHA17a73b0d96168a8d536bde026c990ecebed68dd7c
SHA25609ca274e9f773fb2c44356632c069937ca45bf6d7453e9f8a79be262de2bc51b
SHA512e8bf468029b997e05e25bfff7d3863f399ca84608e731b1511cca4890f699277b99556d40d5df93f8c584d30cdcf6def9bd4775f386b10dfe9f2a456b65b5ceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b298c7d7062c7d59438c6e874555f1b1
SHA1e786f8ae47992d47f139072b5f1ec593bb025e45
SHA256230c0df5ca6b711ec740d056b130c25b4160ccc974fc4c0f4186cbba5e08355d
SHA51226e0da431bd8379a2c42b51d3b0fdbd8f1c48253c6692b3e7003e3a7dc59161be3555cafd0db9c8b498f91fdce3a4a8b5809813b6ce1cc0e2b19af7cb5988306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591a7c8c726dc66a334bcf30320da94f8
SHA1f7679b445b341806d8244eebb0f78dd94c35c344
SHA256e1347f4f16549152ed96282476f86002b338f61caa7f9711cba4e35d42df80e7
SHA512f7c2fc08511dfbfd8386ff633aa132fc100e230b994f9fb9dfb4e75225ab677ec457865be6d7c23156ca78456d043b7ec86c5a782a96c96e5ee0d2563510c51d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5275b3db85f96026340f56ae3d46c53
SHA1ddea47162e061a5b5a24725363e6565eede7b28a
SHA2563c53eaeea31aa8e8d0ab5148761f72dd00369db9f14ccacf71273256fb90226d
SHA5120205b17e5a874bdc691e0de38c6ed8949539fad856a1cb420c87652c094fad64102b9f90bfaf2bc50d00833efa55cb15ad2fd94fd326d12096c0fdf8216e30f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0783c92f5e368275c25f2ce52947235
SHA1ca73ed6d47021433873f86c2c08cc1b0ca21c8e0
SHA25686be16d0000466c32698c3108fc766f82175402715ea469b4d3341eaca9e9142
SHA512acde20216ad861d9a41ffd4bc4577af5792d566cc6f892a0302b40bfe3cde04fb1dee1b4322c3cb726a53edad0644dc134f230a0adaf9bed06ac465bce1254c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53222d0ee099f9002be8f963a850d1b80
SHA15ad54f13210cb24ee84dbecee2f5b6928a09c196
SHA256d2d1dcbb8880719279655114e660fa5ed110ed64e7112900298d2d42c4e18064
SHA51240bca93b5a2c837f37ec1f8fb3881c5ab48d7996ff079b60f973ad3b7bbccbd2f22e71150fed23e07606f5a8b75375f379bc148e58468abe3036eac5c7fd35e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5488fe0fcafcd2393695ff10b0fc8a399
SHA1953f03f161013da7619d8976866c349540dd77c3
SHA256f701d4739cdad594e29142d757b3cee324da94c6ebee31b5a107f305220e0234
SHA5125dfe199eb97b9231ec694c2bfa265ea66c92b2becaeca6d86914e2b3ecc150458c3be41e93e6d3db637d26c9f05207ee4281d934862e8336f0852b122bc03b1c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a