Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
05f5362bb6867fff2cb2446d3e02a6f2_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
05f5362bb6867fff2cb2446d3e02a6f2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
05f5362bb6867fff2cb2446d3e02a6f2_JaffaCakes118.html
-
Size
18KB
-
MD5
05f5362bb6867fff2cb2446d3e02a6f2
-
SHA1
fbbb334b8d7a66f818f397e74c7b3c7bb7046260
-
SHA256
974ce625de45ba8b2f672b4a1affb1b106c61a409d593ce1af6cd52898db71f0
-
SHA512
b6dfdf1a34b6311ffc02eb606ade818115c4fb3437f70130feff2bf2cab3d7c12f79e6ec494d06151bfe01282835aeabacb1e7b914aa9d578df94346726fc000
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAI94pzUnjBhbt82qDB8:SIMd0I5nvH1svbWxDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420496276" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E9D43361-0599-11EF-8B6F-CA05972DBE1D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1956 iexplore.exe 1956 iexplore.exe 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2716 1956 iexplore.exe 28 PID 1956 wrote to memory of 2716 1956 iexplore.exe 28 PID 1956 wrote to memory of 2716 1956 iexplore.exe 28 PID 1956 wrote to memory of 2716 1956 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\05f5362bb6867fff2cb2446d3e02a6f2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cfd85abcdfdc2190820d51cf73336c6
SHA1ff1b8111a3b8e8ce4b9b33f3b3f356a15b4b7d5b
SHA256794de28278840c2a0bc3934ba014cffa92432f8e61e6a546b0ba5e378db1f212
SHA5122c056050e586dfe4826104bb42b6ea465f20b7949947db940faaba9c56b78c6e4db1ceac9970cb75cd6221339bb0ac833329157c98af452a8381ffc84326a715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567c3d0af5147f77bfcd9bcf296e14d44
SHA124d042142248de21d152f3bd0e21f9a0469eae80
SHA256372048908855c5f981f0c581bc5800fdb1ee425d8078a9e911aef4c87abb7624
SHA51267d5241cf921483a46990ee293a18b60f93e907a2424f25a529328a7e738c0c9695396c39d6ca7594c339260a8be56a12221d51b72a6dffb69859e8df2229912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ac70fc73762c4ef912e18c968de0272
SHA1ee97bac5d0b88bb447167b15bf029ecdf548c938
SHA2565ede48fece0c5936fa47ee5c5528898b8d283b3f037cb838b17dbb3542087016
SHA5125a695403cf33a3a2e7c5a44557c563c46cbfa2b020a02753b8697f391c4fe3481accec4602ca9efc331f64f3e6d9e56858c502f641351fc92b03c564e0a4037f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb1e10593a3b4c7a60d3c5be3a30c9ee
SHA1bc4ec39592761a3ca67b2ada941496a62441972c
SHA256f6a066c8093f73cc4964801a184621c88651be267e31bd42f60ad067e7864b9d
SHA51252db4ef9cf9c38e94e587a74c5d71cb3eb9bab694d5b3621bf4eb8c45c433000cd6a99f7e0858191e5e125b8f07e0b424cdaba9be33570aa593e9e08915cacb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547362280929b7fcc2c59e17f3a762ce1
SHA177fab02eb6a05e65a6849e1bf37e6c2a445961a0
SHA2569e2a334b6e59ff7ab5f1356be0417582799139232adf2a1889920f056a74c1c0
SHA5125bd341e611662055bb67aea9321083df73dfc7a58ea35561a03f46a2ff6ab16c9fefb70903495baf131dfa3fb2d917c4b6c3e26ca5ec417152b8b60d66f0de28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58242fad2019ebdc2452ff6835c4f6ef3
SHA1bfa9c813c934255c8b7334076689da467acc1366
SHA2561e6a56752707e0179a180c75f4afb6b890efef040dc89e69587e9fe6cbfbe4c3
SHA51221007c9bc18c4f2a5db873171b76d72b4c661266de108434492012b50167d81bc3c15e173d48771494ae47cc4655459909660b1c7721c2bad5051cc05615f682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7fef3c91690e6a56063130965ef4ef0
SHA10ce83504273ec47a4e9422929fce6ec886a41fb1
SHA256155f56e5cd8a5927a1a73be9f030d1608c92cc44326dc54c28d260a06e195933
SHA512349265200377487225fb766ea72aa9c4bf872794e4b23fc916d5b531262bedc87e5d342a7fb12fab8054cf169744fdc86fe9dfdebad4f7236b848c1914ba160c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d6084bbbcb9515cda5136ee7015fdc0
SHA10cf693ad7dcc4bce45cde35e5ba9aea43decef78
SHA256862cf4077c061645c6b7b2da646b2b31af0eb5f2edc0e86c694de51e0d0cab4f
SHA512ef5b114949289ea4f78e6647646ff71baa1905f80bd44642d5085ea243ea76e84e1a0a29f1d53054d63280394ef85837eed2090945835b1fbf1581b234386c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51661cbdc59fe5898967d7efa26a78d07
SHA14c1d56ec74c4fe7cd0f36fba47bf9cf180940f96
SHA25616fbd2b777c52685bfe396f7439c62e1ced7091a138761e7be02e0d068328999
SHA5126fa4a27046d6881d9d3fb37d94d3ddfe325f353616c5c3b2448e3c665d143a3b402f33df29a35206ff017795e040f9cc9ff853fd1f6823b838f1ea0b6d2f7380
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a