Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
0393e2ead8d1ca62177c3f0fcadd5e17_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0393e2ead8d1ca62177c3f0fcadd5e17_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0393e2ead8d1ca62177c3f0fcadd5e17_JaffaCakes118.html
-
Size
18KB
-
MD5
0393e2ead8d1ca62177c3f0fcadd5e17
-
SHA1
0446b42d499a09f2b4f53f96593f842d936ed7a5
-
SHA256
9597869622e187ab50561ea2fb5149f39a07ec7038e75ca5606c5d44c4e6def4
-
SHA512
137a192432eca7710ee743a702196444111f4a89c078b192ebc03937f6a602fad1f70fa1560d12d64e808d680240498cdc09b3340ba34fee9c4eb44a09db691d
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoA5iS4czUnjBhga82qDB8:SIMd0I5nvHvnsvgZxDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420412237" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3EB08921-04D6-11EF-A5A1-E299A69EE862} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2412 iexplore.exe 2412 iexplore.exe 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2204 2412 iexplore.exe 28 PID 2412 wrote to memory of 2204 2412 iexplore.exe 28 PID 2412 wrote to memory of 2204 2412 iexplore.exe 28 PID 2412 wrote to memory of 2204 2412 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0393e2ead8d1ca62177c3f0fcadd5e17_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2f065be9c6cea73764a3eb81ff40eb7
SHA197bd823bbc0ca78981cf5717b2c6f6c517055a94
SHA25661e3a8ff8c745c4eaae80792016a6cf5a38f68cc3c60f9318b8d5755731041a9
SHA5120056369b35a89648eb0b0c257d41a52fd1928e31bcf7b5ccd40413f8511bde0f0fbb4f783f5fcffb462355f7f7abfe1ef843b80de2a3a84ed9c71ce12fe4009e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e7f945729be8a0d3f5f0bb84dbb08e0
SHA131dbcbafa1d8aed0f052560b9c3abc9278b4c36a
SHA25636797f5f2c117e822b0acc2824b4ed3d5e726f814097e5ecf290d8703cfc74fb
SHA5124215dcd6137afa6f3a1ff3e0785abc54b349eea48c7b083118e8dca8a8805eeb409888f7a970d636b8b179a0d66246022968af96a8777ed371479a004df92e20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5463f01ef7babdf63e44db8a5da03a7af
SHA126fe9d64e6bf809b69a0ae0c9a24575077dcbb87
SHA256790787406ec26ea5acaf34a034cc75ec667f1dc9291438c2149328a74942f64f
SHA512f376930182a6b511165c9b3374dae45cc5725870873a730f5a578c86da6f919a4d585c742e330d5524cbfad53151a0114d849de2f07e2501601d1dafe6f6ff6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53828c4286b0c2a16eef31fe6332ee91f
SHA1b45b2dda5189ef2cc0260199ba12efa703b162af
SHA25696dde98ad348556a81fb404ff4cdb19ab802bf94a1d19f5c374a3ebabc928849
SHA512304044017943182ae7e4ede153b0b556a961dfdb8a2bab2647bd29ef7d0ce1b7329064cea50c6d4cd84b4bb6ef0602ed9395f872345fd620bdc6274499d1bc6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564bc95384391bf3f6f835aa093579c62
SHA112aa88484088785e8098b54f49d3834bc81457c4
SHA256c1548c3244e92d23c2a2e3b3a3e7fa0d03788563c87176c5d8a77c2c4a70ba84
SHA51245cbc5a1fe3be8e485f7c4764ae4fe15e8a02a3b4a74d2d1e544ef108bfa2fa5009115de6d4bc95ccffff764306c413e9375e36019f96947f05c738662da5baf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500590ae68547ac5b802eacfd7955abb0
SHA1ee0c208d28dcf5bc6ede39f77879395886b09f5c
SHA2564e26ea9a3aa36d9319622cef9b28623a448c70225db999bd029e9f5f5ebc07a0
SHA5120932535c4efb7f611afc419f81356c197a039cec0f41b3ce9c9c6228533554d42667fb2046b1e7e5ab09c552a26feec7ca447132a5e6d0f24ad1df31ff553c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a6293c556b50ce5684c7a25c37966f2
SHA1ce56252f9cf3d9c697ffed0ecdd33c22f04d2564
SHA256479b5f919fe60026e0d1cf3a08c8c4d4922692dedfa459abfbd3e144011365d3
SHA512bc16b51921381652c00985094b2b0a8447deef8ab09ac6bcd9363987deae6ed5a1ba5ae4cad3da09eba21922df4d19a29f4313a62cfc4d92d6140df16ed5735e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fbb7ed076967ad197cb4ad1dcc8f917
SHA1c8ea4634af899f5e71f582224d66728d9e5eb0cf
SHA25669a301f4fae16fa38cff5a632131312393a288e127a5c32d0f246e1624e25dcf
SHA5122cec86d8ba351c698a08c9f17b6ba5fabd55e37e1d82d43003769f7eb1df66bdce1f6b63a97ae2eda4d4a78b2d0d77d3dff455b394540763fef8cd5e4befbdbf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a