Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 19:36
Static task
static1
Behavioral task
behavioral1
Sample
0181da08b67cd43aefeacaf962d32f06_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0181da08b67cd43aefeacaf962d32f06_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0181da08b67cd43aefeacaf962d32f06_JaffaCakes118.html
-
Size
19KB
-
MD5
0181da08b67cd43aefeacaf962d32f06
-
SHA1
e597a25782e70930dfbbe6bf04086880641c7c47
-
SHA256
e01d6a20ce0e3cd4593e6293aee1d60a9d2d4a45864af119bc38c05beee4b48a
-
SHA512
5c148a90f26f35ba01f55a43f68c41d775b7350e217fa671ca03aa1e9f388af7e2f2b3106d7648850e2a22e6535eb24a18e77974b5e85a660f2a3ce038511fc8
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIr4FzUnjBh/x82qDB8:SIMd0I5nO9HFsv/6xDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{59AC0241-0404-11EF-852B-6265250A2D3F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420322088" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1744 iexplore.exe 1744 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2148 1744 iexplore.exe 28 PID 1744 wrote to memory of 2148 1744 iexplore.exe 28 PID 1744 wrote to memory of 2148 1744 iexplore.exe 28 PID 1744 wrote to memory of 2148 1744 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0181da08b67cd43aefeacaf962d32f06_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd9bc75b81edfc72067a96f65063ac32
SHA19b01582c1730976589b2faa540a39ba36c7e7098
SHA2565aac9e20606ec28a2301e8c071e34b62ac08a4fffa46431b4e1b973d08319376
SHA5120f10d35cc8784a8d3cb03e7c98fd5b5f463fe7087450a3f834805cc70552352b5536b421bb6aefc8727f6145266e4758a0973f0a85fa63e81b6feb7053164e74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c3c37a8825e48ad3e3d0b13712dec97
SHA1e809d92590200c46b38be473d78d2a974beaf2ea
SHA25654c29c5b0da8b53a1f7b41eedaf8396aa4d059259c8e68e37431754342aab450
SHA5120a96e087b541e6a5b3a53b07e36bc2b2ab4e653a2468d694334793a4239801cb253b4e947f0099b5932c6765072e4eb2e92f2ff26fdd555b5a6d27a15cc8d5ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593d224207101ef061a87878d57fa8b95
SHA1c4d8ff527b9a548b4ce3c30148f445acb239e28d
SHA2560200c72bea4a1a2039a8cab3c602ebd099c25fd19b93293f54f1935a5f27e691
SHA5128778fb29b5b5d8dae5e0acdc9ee20e05aad8b4aea792d403eb29e8563216b61388cba7b6f569a21fc62cba838de8c20d19db7c76baaa2ec5e0f24a62b0c4f60a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfd4a9890020535624fe47acd682f30c
SHA1d7fba0fe44f99ce3dc5dd65c4aace2967f5545cb
SHA2562eb3fc2b35056846c0110e53eaa470801ebf72a5da3f78b7d404252b90e9038c
SHA512921d6641763517764c8ccd2594b03226db234f82b435f97136b0c4cb762893d72f87a0d0196f3437ba47532d109880157dbb3d10d17d64e9598d838e22befb1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d50c5db1f48450477e948dfde4c606d
SHA143371ab4b8490b6d7e1ac6d9cbe1a3061426503c
SHA2566fc8849942add1c27f6f8dc58e1580a91f20b4ba50808611c5010233a55d808e
SHA512490d9d3fb2e2923aeed067823648cc02f4e8dc1f8ecf6acc81ce8efb311de9129c95be1adaa54accc413b40a4353d998e02a1e02d62dec4b73a61fa4383e5f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f94fb958d908fa9287df58ac2d3ba62
SHA1f38577c06c1b96d7d5d7588650df8ef12b01130e
SHA2561be61b082154cd8c4e72ce89a8a27d4bbbe166260bf91448b33ab2a2b9f0048d
SHA512fec308328a2c04aee5bff403661301b716697c6aebdefaf4bb31c8ea67d8c78e3626401dd98e958cd6def6d79dc6ae5bca0d0f3829ed20895b527e487f87de20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583c91bfe06315b1d77a27fc2461d51b7
SHA1cee375cd941318a85f6c382ce53f05af7298c7fa
SHA256e0e34be93cdb34f32149f8e810b1f420f6da27874e8c79f9da50ab7f9e7e8bca
SHA5126afee40a6cbb2f9809a986dd2f2d5566b3d51f0b5ad18a8b2dde0b9e0dca7e4654009ba2b82f0c8c9f0c539b66d8a1eed205e2fe5e3482405e69f2f62aac9805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3cfee694226a27841777980e2c2f3bd
SHA1c63a1505bb3685a9e9fa75619156b0096dacf9bc
SHA2560fd230ae924631f73fcb13faffc4ebfa373c65ccc04dad9447aba7927bf787f9
SHA5122a0ebeab376e2a403abdd3e7ddf031b6c45443725f4cc8ab163ca1c5e82ff0e535a7c7061f11a8356a6234e5a87710d5c7d1cccdca03ba0f27ebc2f655fa26b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5faca6a5964ee1d4abfb05d7b1824fbf5
SHA1e4aca53e2234757a82c41e7728e6426054312558
SHA256764edb78076549988d59c7c48d3a1d9f1ed9c45c875254239a73999dc97fe371
SHA512044c1815920a18df8a6a8139ba542fdd0b3fd210e4b09bb37951156e4d3d96a90aeecd723a686f04bef6bf801dc3cc7f06d3254b3e752e943ef2e9f0fdc61ae3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a