Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-05-2024 09:36
Static task
static1
Behavioral task
behavioral1
Sample
1220e4215accead56ada30b6682336c0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1220e4215accead56ada30b6682336c0_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1220e4215accead56ada30b6682336c0_JaffaCakes118.html
-
Size
161KB
-
MD5
1220e4215accead56ada30b6682336c0
-
SHA1
fbb5d0a4cfdc8c115508a77c2a7082cf03687c56
-
SHA256
39a54a71569089bc72a1bf2e7d16f35a89ab979583607813a1f4a41b78439549
-
SHA512
7ce0a18bc266eb6db330f688b33b9acfa5059b35b4e3dec9d829af390a839dc80dd78a4537ade58eb69c5b6a2108d7e2a042aefb9cb796e7e1e830173d5b5bdf
-
SSDEEP
1536:biLB8V64Q1GE1/kj9z10i1Rm2cyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1O:bZcyfkMY+BES09JXAnyrZalI+YW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B9F91431-09F9-11EF-A30C-E60682B688C9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420977233" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2548 1728 iexplore.exe 28 PID 1728 wrote to memory of 2548 1728 iexplore.exe 28 PID 1728 wrote to memory of 2548 1728 iexplore.exe 28 PID 1728 wrote to memory of 2548 1728 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1220e4215accead56ada30b6682336c0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD52e1fc76db2218d050cacc01abc822f5c
SHA1e77aed1eed55c8d4a572a682bdc1c8b59bdb6f79
SHA2562fba7134e33b7ca2eecae90c61279c88663b4318028693c17de239f537dfee93
SHA5120a73c2cc92c554c1464a13bf903f358c0c337dfe595cf2a545261c23658379ac18f5eb3dbfc514660628c576d25fab9e6a7d98564ae5845b36c1a471a333e21e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5299006e25e56477b7f7568882a3ba28d
SHA189800a70e42fe51c471ddc058452bfe585eac366
SHA256d5e5e8d08187712d92c6aa9a0fe15945f60f9ac815dac911d97d6e5df2dbc834
SHA512382df2d9a66c588de77018d66a10e1b333687f2c9ac601746a63092011896e3e71b11c8456f382eb8b2251ed49df1934025429dc567b7065153c6fe2430dbcc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac0c5f6633ba021b91a2c647add526f0
SHA11f7298acfcef1067b8fdfd4c6503a54da520c57e
SHA2561597b5633dec7fe26d47fdb73e95cd5140c54e3a12a0120a1bc84d87042439fa
SHA512a719d247351b5d8ceee721041f2cb19df495bb791e88166ce70f0b261ec7a594a5955235f71977681ee4ac401b5e69883c150d9ed8a3477b73764d3c9f7b1d12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52849d56d469bb37c82cbfa6ef0cac211
SHA1d7109e8c925b09850947b1006a8ae4a831861a22
SHA2563a81bdd09dc968046655c2946867b27b2bc171dae06c298ef269c16bbb03c6a6
SHA512b7f3d246120d011595643cec805ee8dd454a280e8d632d3ca90753afda5353ba63f5fedf77a7a86a39e22b9e1eab115d875ed224e3a990f6a9fde994fcd0a347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e42853929de9c8b929d07b340f35005d
SHA1904e14559bfdd5089b7e152b71079f238784f1cd
SHA2568a806c417a11db964d040ded16df66c5dc1c7701f650b7ac1bb5a1455ed604b1
SHA51249148bc9a53e01498f2e951d77e68b9413d08e7c1abe64959dc517376b3d41d1985c1213a48f22f37f5b856301a11dd387987c155fff2e15cf0e4d9257f81842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53291f23d54c292e62f5bc7b17e8b88c4
SHA18faf13b1a0c6dc7b71dab8aaafa21f8fd9236a1b
SHA25657ec942ada29844f9b01dd43207510611f8d8ef6066dbd3b32cfa3765688ebeb
SHA512fa8acc36dfb97cb8f2c24d50fd0c4b48c6dfb91f0d16ac7b4f2af1021ed07ada8ad0526d407ee51008103c553d70716eace67510ffb358284ece429d49308a80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee7faadb4c45cc1cc9c3e43270bfdff9
SHA150313d029c3482b6acbefb9c850465fe199cda22
SHA256faed24fd2ce9b3584527fa15dc165b40c7a54f021e6c3137876125187a47e5c5
SHA512724a3d9d3f539c5ee0ddf07ff5a02dac162f5c31dde87358687b389d336f5692b6c3ed82b27d7b0a7fcdaf11e9668a348bf0d126621f875b3443c7a7bcd760a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7943d9b389d37e7415dfabe7ba4eb78
SHA126ece9e298e01594f63fc5d26f45e7bd76a337ae
SHA256fbe75fcb15465a7a10df346d28553a061a4ad5c51bf03fdb34ea4dce75e998f2
SHA512f99dd2ff3394274a238cdeb95983da68997dbb4db6c7d502b3f0240d2deeeae7579fe493260b29f30fe8862a351f70e9d8e570d0e36c13160885b0651d6bdfab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b42994e0a5a778cef77bf6382eb71aee
SHA1969c37deba41c717e54a6f1578c8705143f208a3
SHA256237ef322becdb59650664cc658364fdea7b4c69cf220e3fc0e0cc77d44d028ed
SHA51265e014c7d779998f7179ee271cc362a5546ce720f241e67b8a6856586651e2531362c26cd487507a9e884dff539a61e2bf1db98f36d03d7553c88fd290edb099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f03e5b943d226de1367a9c2c4b4509f
SHA1887d5e58a987f3ec6a28ca9d63dd06fd223968ab
SHA25607c1ef25746b8768b6dc6be693a71dc307177fe663925377381c9f503fcd3a99
SHA51218029a4d5b0fdd5ede94b932128a88e9bde7e716c3cdb1b335dfc6291ba4563d58b7667adfb136df7602a5012d9d0ea098b1b37c0dd0031406bf9c00b82f855d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD532ac655e54cbf85251854638ff49fe6a
SHA147948aecaac47c5fe8b54f92c4d42c2749b7153e
SHA256941739c7d46f0de827fa7ece2972c88a41e92d5ff29fe3847679d8810c9ead7a
SHA5127f01cb370bd2103ef907840944da365a9923f517463a9e065b88fc4337dfe3d1af8dc132e602bc41df6c68d3ded42ff280b6a69f3bc540727bda12be1b331887
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a