Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 11:22
Static task
static1
Behavioral task
behavioral1
Sample
09ab667ecf5918b029c8eede1431799f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
09ab667ecf5918b029c8eede1431799f_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
09ab667ecf5918b029c8eede1431799f_JaffaCakes118.html
-
Size
20KB
-
MD5
09ab667ecf5918b029c8eede1431799f
-
SHA1
a3ddc8f5db845629918fe1205ee2da3a067b98cf
-
SHA256
d0697e6bdeee55b59720acd1f25a3a70a40c01c731c0feb4aaa28114f2057be0
-
SHA512
a89916b6519a8f79e80659212ee8d9fa3cd62c941dcd8c2aa17556929d9117fb72fb4eb881bfee4f4a791ea2844fdf55399ca37f402011a8de7873d99bb6b664
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIs46zUnjBhW482qDB8:SIMd0I5nvHrsvWLxDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{006536B1-06E4-11EF-BCB4-4AADDC6219DF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420638049" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 3024 1712 iexplore.exe 28 PID 1712 wrote to memory of 3024 1712 iexplore.exe 28 PID 1712 wrote to memory of 3024 1712 iexplore.exe 28 PID 1712 wrote to memory of 3024 1712 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\09ab667ecf5918b029c8eede1431799f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501381d4ce54a5703790ed84ca17039d0
SHA102f025f9ee7d2b65270c5dbe108b070102ceaac1
SHA25689077f920572174fc0a6e7ba4442b619bdabd67aebdb7e7217d6071377a0789f
SHA512de95cb0cf397ab8a14943474138755adcb0e61b6cec4a0c9b39dc765bb3e8475be99099e282a7bc7f904f9d39e72c237277792f7f75ac0b9e9709c666079c564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb1d9d666e44a68eb100de0ea2c80e84
SHA1a4cbd1cd42c8e3fd62bef5dcf50a81e4bd9ee8ec
SHA256dc9e82cc75b9baeacbc7b173786078068e4e1280b453df1b0cb0f7d80d37b1b1
SHA51279b69784fe7c0d0e69416ab0e86cbe2b405084f66d644dd9e2c6b00334cb2406085f925bf1ed39fb9d0f84076194ba5b4147f9405b4b35ce9b33f8c2e917fcb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5944f51dfa71c4044eeeb57df5f82441c
SHA19169739b38b881ee64324ff198e3f880e10d036a
SHA256748c2f156538a4f1205d0832b871633a7c746b0512b86572114fdec4414b80eb
SHA5128a6e86ae306f45c655e93998b134da637ad5db908f612c74683b88f32f055b370a021f2fdd9544e4472f0da9b3ccf1ae18404ecd940064f5889b4e9c9dcd4d50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579b7568256486f6aa880dc264b1f323a
SHA11f79e9cf0b33d7cd94acd02083ba6ecc275e9f50
SHA256b0fccb7a9617f681f21313c920121a931ada96be857e6db7b214d21388565082
SHA512001804fa059eef63c41c669a570fbc21c7923adf97bdb341de81ccf5dc39e75f34a2a10e4123bcbcb880b037716854214bd150254382214697563d080819594c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5528145d88ba8857b487f2c3518c22829
SHA12ae0a3f94773423511ab8159d2824646488a828a
SHA2564121eab1d4d62c68855e6b56f7ed2e0840bd50489fe475120f9de4e0e37f6115
SHA512a6a956286771e22465398cec5984bf5526d8cf0b3d048d15a5e26d0e080e8f2c586f7e8e7de5c61036a4a7a22e8bdd41b1014a2c7d638e2a09e502e71a36df7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d77ed9027eeb0cf0aac2a6d55238810e
SHA10badda4227ed52c2691de853eb012acfb155c682
SHA2563878f277e25004f0b718f6699e541d1fd0320565b01d072800c7c07239ff2169
SHA5124977b9fc95364416f86ffc7fe6f2438c9e5a5e704983c3f0bfb57f13bcbd22277105b24cf408818beb15e523f5d2c5a2c92804367e4af08ffe2a48bc08ca246a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce0ea3e3173c494d204197490a94aa54
SHA1f6da821aafe55c68bc7851b86683c33f4be39d34
SHA2560caacce1bcaaf134391eeff7e49f99a7cf4caaf081421b13a63e3dff76e1affd
SHA512a08620119c5f6d765c3ebec52ded3f62c1d12e0e8b7d4d130900078812841fe92957ed84ed52187550707d86b3ef7cf342455399287eae59dde2b6b8bbaf3718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5544399332c6f80523f84f4775061fe1d
SHA1a9e1593982badcec67947cd1e4c6a042e1b1d751
SHA25696ee58dc88c3663c62a9d9ae31b1d907dcf8e8f1b4fadfe5b5134188e752972a
SHA5128b35df5a3274d61f04a5cc15e13e0bc4dfd050f1a7192c782fd9d14a3ef51fc92cc3cfd0f1212ddb88a1d2f2b4671ec89d7479e31024a4126a023232ad533b7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb8c4b5b48a92230163e663bab230f16
SHA17e489f901ca72bd1e3151509bb2a67c7899ad581
SHA25648896910243c1ec07805e25fb62d3d90cae7374fc984da0c2c668d45e47b85f4
SHA51204992da41281a80101c44666744960d58163b5669b74d94b5e73a476e9e4b3f9e48711d116ff1b0471fe4406cf534bf71987b92f7fef7635e509516d0cd33007
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a