Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 00:35
Static task
static1
Behavioral task
behavioral1
Sample
066c904e6b733a987aa38fa89279e309_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
066c904e6b733a987aa38fa89279e309_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
066c904e6b733a987aa38fa89279e309_JaffaCakes118.html
-
Size
18KB
-
MD5
066c904e6b733a987aa38fa89279e309
-
SHA1
d3cb79baf76c83dc4c79ed4cbcfaef1aaa63439e
-
SHA256
7548148da72e3b4f71c811dec5a5fc9f875c9d76a5ad277f9771f4abd8e07df0
-
SHA512
96e9f6de95318b3978edc6167233a06626bf6d9066ba3cfad9bb13fbd496f76c0fcb88afc0cfb7b3a78ed14f958eb5da805333a091608da572e3c18fa735ecaf
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIV41zUnjBhLN82qDB8:SIMd0I5nvHxsvL2xDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420512777" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{55C09981-05C0-11EF-B826-EA483E0BCDAF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2956 iexplore.exe 2956 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2800 2956 iexplore.exe 28 PID 2956 wrote to memory of 2800 2956 iexplore.exe 28 PID 2956 wrote to memory of 2800 2956 iexplore.exe 28 PID 2956 wrote to memory of 2800 2956 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\066c904e6b733a987aa38fa89279e309_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f824f31240b6d23153b18099285675fb
SHA18397c314f188820bb120eb8457bc0d2f6712a399
SHA256f20ab72bcd3aa8cd1b4d680084ee8ba918c98b6b900ee6f9d87ae66a3a9bcb82
SHA512c22ad62f3928619277a63f19572a748d7fd43face05167e450b124f6bfb455eb56e3e2fb3af43017bd2d80276e69004371d0219bbd056d0bd0871d8619626bb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58556414a5ce9f2fde48a86ce982a5443
SHA157453e3bc4ff32e18b32a41c3276155ca1bd65a1
SHA256e9929d09e825d488a152524da33faf0dba11e9c523386a2ffc96c408c30db6f0
SHA512a9338271cba76eec0e9ec9535fec9ba5fae814cf295ae87871c32d4b37c497400559bec8866af3f47ea24275e014ec5016350abd6ecac9b22d62d58c24a7e139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eae58a86412e19f2ee5d9cc5e06461e3
SHA1b9d89523159c8ed248d55bef3da5c84816be63dc
SHA2561a5f7596cf80e44976972f1e27bee37bc600c864b3ff7a34adee6d7557348416
SHA5121a96735891939f9e8ed099640532c053e28ae1e7f24cd7ddc5e4d21ef7b458e3edf5f08fdbe394324373df1871b5a82b17aead71bd0fab54d3242a887e35f37c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5143a9419669b191db898d18f7353cc0a
SHA11d75a7395e4e0f7477f5313f3cb8590f9c3eb7af
SHA256bbf9ec1e1afed7d56a75fbe879fe36e1ddc990bb16730277968f7b4f461616fc
SHA51225b031cc3dbb9914b886589c78e50d7c976a8d8198362e2b666ce3d70d4ee7c69b83a284f0c292cb7e3385578b1b69e6283704a670075b9f7ce1bc50ab5613b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be32a75d16816031ce75aea556d233f0
SHA198d83836ad103b6ae7d567b15d69c4c04c245090
SHA2566264d2b25b26ad1994f9db5fda4eff2b83e71bb5cf902018dc19a84a59974463
SHA51216dfb80fbec93dd628253a26c4712afcf8a8261f42a7391b7bbf21816957d5639ea0347b49f55847aa50b8c7b18e771e434b731913f012569d8b48ec8cc6a4f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9cca5625b7d1b2d78552d264c2aa169
SHA1fbd45684cabd55d7340e4c325ed49d17cd1346db
SHA25610a1c91ff5fa587fe5d1996c98da5ffcb9587d296d165ebda711423116aac9a3
SHA5128b401046e96e2be2d390884ae8335e0f6de8a51a12ed37afa07a5fc89108743136e9376a4caa5d2f74560009ab8bc16340e3aa623e63794025e53dabea408bdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d542161999c6ad06bf8cbe31870d727
SHA1d9953b4f1a692804756725bfa2356740f6606203
SHA25622670b924f5436d0fd9812af7548d15a6510163274ef21bee24a6b56a4c8098c
SHA512ea11a833059c23683a86a114c199ea4a9a7f6daf333bf87f020fcd60fdb4216d72ffa5325317e860115425d1c44db8b24227163b0c296a78e1d46f2080869b4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54693f5e5196ac54c5b3ac4badf74fb95
SHA1993dcc551c4fa87b565db5a2f477672c68737dd9
SHA256504e51261a5784cf6976a5969f416f6c7bda957fcbdc75b293cd5e8adb033320
SHA51279c572d96ad938fccc3f5a95e26ed6159ecc44d5b56028743bb0802a913d11d7bc9abcd6ea77fac07abaace98adb6d162acd68b55a6715a86da3b8975f65b274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5697797af5fd330f8f81ee224e0b93f3c
SHA1ca5731becbb95bc78a2b066aa8e04443a273c298
SHA256d80d26993d7266e359af0b39a41b755927c54c28a2c2701efe1fb15f26f6808e
SHA512359a2a5854105f779c40645876e0db3bb07030b9e098e159b3bc371f8465cdbb75aeb0d056c033ecf30bb76e5c9e473a0b82a16069fc518db0d88f7172eba528
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a