Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 18:10
Static task
static1
Behavioral task
behavioral1
Sample
05c7a37d6c6911de610286d24cc260a1_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
05c7a37d6c6911de610286d24cc260a1_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
05c7a37d6c6911de610286d24cc260a1_JaffaCakes118.html
-
Size
18KB
-
MD5
05c7a37d6c6911de610286d24cc260a1
-
SHA1
1670678d4dba6004693d26036f2f804dc07bcdc4
-
SHA256
2780c6ac1b53bbf6e3b60fa4982127cfc5dfa62e09d07726e8bbb78cd03af8e2
-
SHA512
4550d5d9f46a6470ba7eb3a19726e22f99e2e2bcdd8120d55f5666f1a759872930368d7ced7c0484359044c5c8049de916357811d918e71afa5fd35d48ea039d
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIO4AzUnjBhE+82qDB8:SIMd0I5nO9HzsvEtxDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420489676" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BE948D1-058A-11EF-9BF8-4A0EF18FE26D} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2300 iexplore.exe 2300 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2736 2300 iexplore.exe 28 PID 2300 wrote to memory of 2736 2300 iexplore.exe 28 PID 2300 wrote to memory of 2736 2300 iexplore.exe 28 PID 2300 wrote to memory of 2736 2300 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\05c7a37d6c6911de610286d24cc260a1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dbeca840adea91f9060b5248e580d53
SHA1d423c6af8b5f68d156b3616093d51e86455909ac
SHA256789b5894646d635e964656c2cfdf19e807390567b589c71cd11123297430cb24
SHA51262142d84cfd0d32d5fb82e54e4a9f5e175e097137e79cc66e36005970fa9ce9ed7ab6301d7db7b072c839c0daedca6ee1c9bac6b3574b5fa7ce5b5532628b2ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d96fa915d0c3c5c9f2a1d3602d4f38f5
SHA10330654c27e69ff92d2a2409a3d8362c4d74df5f
SHA25617bb65343eea440766dc9b025a6cefda2957ef6db657db154d303e0a6da48628
SHA51211a65d9367f444e7e600d2226f2502143abcc57cbde8952fc4025f0e1944cf16c8abd7807d0a3d702fdb3eadd4ba81304bc9c37405b2b6d91794e13e01aabedf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3f5796e86149ced6ecf62656eed9e3c
SHA1fff33ab6cc774cec26911fd93962d3e8c8fa2604
SHA2562c17ca4c6ba63784e588e9532bc8160fe8cfede0417a2c4624eb655772da7e29
SHA512883ea0dcffc569bb22cc9d1ad2205ecac96062902951f1ab8d1879fa77c6f0d66f0b5425153f164b05d64ac2322174d2d77e3cb4050ae25b09547abc32a23ff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f24259829d1f921867f153fe501cdbc
SHA154b313b40d088aca5e25b3166a80f838c06fe204
SHA256f720eabc60458140b64ce8fb905838f18c1ada59a00f1bc443b16b92e6e8958e
SHA512d0a23f79552be6fc312ec9226d615ae462d3118ccc62c495b6b828bda0383ec78ed61931d2b8352db360828c733a63387be2fbf80d9d74fba5ce43d656f75d28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9c75272da85a6b8558e0f15dc683c77
SHA1cbb46c2fa9fdf814184ab006acafd7336f4c567f
SHA256981c88af3942ea438526bf50db44d09b34d42a5e687f2ea9c0348c62a966065b
SHA51291fa29bc5d607acd96203f66a238aeb6b6947c3bab60e66fb705354c2cdbe13f3331ebcf3145bcfa877c72024267877fb6d8aa55c008035857f6061b6fc68398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3c9d00a1963188c978613469ecc135e
SHA1e0a3513af0bea67205f25f3be7fe4052012ca1bc
SHA25616a63d89e6286b0a3744c6227f31c22a642116208983364283dc067f2b1e05ae
SHA512860002e61faa620a87a9f8a4f9a232c326e47b588e26c7af28130329603c1b27c2ed2235692ac9c8acabda7a95743af189784e11646bf840b1f927b916dc1429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529a5b14164297a4878901df2783786ab
SHA17a2acd44dafa8a4f1d75d9b27077d7b1648241b8
SHA2565ec0ab250358350d189b6ac2c1f1edb04084f3de067b2f964aabda325e17a955
SHA512042f73e6f8910a82cd216c7377bc7881811744bbddbf78c3d3075a5108a550408183af9ed8f56c3b101370ff36d3402cf3969853c94c08a4a08e71c21c03ddcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538ae9f5f2c33d51e5eb0b835cc3fd2dd
SHA1b0553b064297745afc81a286a1288f6fd99cbacd
SHA256ab0d99e85dedf7a15e2afc6d2ba71ee0289124ea1696ba48c195fa42bfcd6819
SHA5124cacbcf48dc95788b8b0504d14b4956fe2df07e151bd2fe2dbe15bacd33ccb80165bc245831806192111673403655cc02012e41686847d03cff42d5c6030b9ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb0fc5d2113af7e9da314e27d5bd3734
SHA1cca59eaf3a291d45fea284371bcfda2c1ddf9e0a
SHA25682983e897447437722dfa9829df46ecefb0fdc0994447c48c3cdda8d1678118f
SHA512839d1c1c9cf01e1d45039162358da02aee19ef1ea4295e64058264a6bb17567dd3817f850284f3c2c9ce35bb43d0f4b840a397cde44fc75fe3ea15c126049f18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5287f7728733855cbd348a86bcd4d978d
SHA1e712fcd11c29ca38dda6bad9f22c993619db5025
SHA25603c88e45a5143b533bf03af753d2e96fa6219dc2c7b564b0cf2fc41649d42e7c
SHA512d5451b66591f5419c16cea9488764d78c70959bc0ced5f27cdd202f2247456b19e481b96e0c9ef71a2ae8aeef2822263fcc8c249231b6807eee5990bac504ac7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a