Analysis
-
max time kernel
146s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 05:47
Static task
static1
Behavioral task
behavioral1
Sample
163f4662fbd8060bbb17f87803b6f581_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
163f4662fbd8060bbb17f87803b6f581_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
163f4662fbd8060bbb17f87803b6f581_JaffaCakes118.html
-
Size
142KB
-
MD5
163f4662fbd8060bbb17f87803b6f581
-
SHA1
fcf1a394e2677f99b01ababc23d02297d712f922
-
SHA256
6ba02b00065756aa2f9e9ccfbb2df6665ad35deb84786030fda42e6a00a2c127
-
SHA512
2e03bbc0c9981152156b363614651ddc126ad87fb8062ae1601cc397250ee403ce4f3d51cb889cb74842cf6be936372241428acc977d8a3fdd8a08e623cb9b11
-
SSDEEP
3072:SE07Z0x7dyfkMY+BES09JXAnyrZalI+YQ:SE0V0x7osMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421049948" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0754CE01-0AA3-11EF-8D50-4A4F109F65B0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 1328 IEXPLORE.EXE 1328 IEXPLORE.EXE 1328 IEXPLORE.EXE 1328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 1328 2208 iexplore.exe 30 PID 2208 wrote to memory of 1328 2208 iexplore.exe 30 PID 2208 wrote to memory of 1328 2208 iexplore.exe 30 PID 2208 wrote to memory of 1328 2208 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\163f4662fbd8060bbb17f87803b6f581_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4fbf559c89c45acc3d49f998cd6b58d
SHA16453bea29b7011c9d95eb466db4e70441585b1a9
SHA256ba61443d619e464286f24585b7031e8f0bb176994ca18600f060213844a858c8
SHA512ea6d4773d883be96b848694add5d1619f22e284a1a80caa1fbe3ad72d4d596f60c10ea775becdb80404029e809c329b25a909f9631c0d212648518e58a687fae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f57d0431bc6cb7b314ec5c9b90f5a8d7
SHA153967bf19a550fce440b6ac7f42dcbaf63ac3ae1
SHA25613d6ea538befbac407354d274c009db0d66cbfbfdf1df5986426bf1115b05bbf
SHA512d21b163c6017b543b8614b96f139c9162bdf9a624a19f0cb420001e45de24dfbea56ef51181174d690ed5c24cfe1cb7250780e57b92ec9d141909b35fa5fe8bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce3bb1d437a4f28ba2cea850eebd59c0
SHA1ec0a6635c7352746352b332e12c0c62ad5af942e
SHA2562b12c2315d7979844ade918901c84331a5363cbfd182bf861a9d681154efd5ab
SHA512a68b32ec1762a1016174300d3f368db7750a137b5f2ae9f079e8baea90b90e42d3f24e3f5a54133a0da371c99f355e0dc1f23d494ff5f9f004cb1903059b7cd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7832d7d3c32b3bceddf793cc17e0f92
SHA1d2200a2d8817dbbc332c52c216141df398813e8b
SHA2564b5eb339671923c61036533d7b1337751f9438b3c28a10d8ff5685c0bd305ac0
SHA512be7ceeacfb12a7f044c459754c9ab92d42cbc235160e5dad791fb2aaf5ab55aa8973e439d4a72d58afb25537ebba70a5664f6863feaa4a4f3ce834e6e92f167b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e562cf9a4ef22dd7f1f0c1c42b2cbf8
SHA137e12ded53146387128ef1b2938105c6f63bd6ae
SHA256a727963af37e665aa244553e3f05550c7eaf9f1c92ba9d2b460a04ffbe3630f2
SHA512ccd36d6e294e28f045c03c27833d05a3da73faf7fe1e534faadd4691c33a4617ac54e1e634c7b98b85b0c2487d9c3fca4ccebe3799c8404d1a0c3b6ea50fb7f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54832aa833208f999337064b8a405a671
SHA1a2c15f0857607efd62660246759af4eb7b802fdb
SHA25616f4d683fa53f654f124f84e39dc424c8fbd30dbbed20a7bb4fa2431b8f5c7e0
SHA512cde1eb7b190e269c75061193748cca61f6180cbc84f9c346c4ce0e15e38c32bb6d32fbe43b6efd3b3bb837e3d7bb6173c7da8c1d553008db456368b0a1dc94d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5373fdfd936a46eb9ab836a9261a56bf3
SHA12d520a952fe8d879afdf73b409cfc15a0cfdeace
SHA25626eb1a2de308a53cd22752c69dff76db73e7e3c515ff83744b876e5958f6b174
SHA512c89d85874fdcfbe1cebaed818a270657b7258a66fe76e920c4f21dc1443f3ad9968d9ef39e6bc5efc197b74ea09e7317cd8a9886b913b67fdad388dc2e148f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8d6cb32bd5c817f28880eb46d9f026b
SHA10440ead74d384067af0358920287b1890cb7ef07
SHA25678d38b9055b0b714fc556aff5cc4ccbbcdcdb8b0e47bb070895d70e3aabf6a4a
SHA51203f5c45623091770b3d24412838d9414c3134c33bfc9bb25a131b2ed2c2e2fec82ae10800a71737acf60168b70bf9fea95f6ca0353dc70d0aa3b58bbda43555b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5802593738a4069ce1fdb5d674d5b24e4
SHA1c987af9c0b75609e08875e0752b4b8e5ea04f705
SHA256a7d9caac3a2388135c7b46ab0867543d19c9ef521061f77964402afc31e003b1
SHA5129d17ae31103464527d05f449976d7fd93659dee1321631e2cd0834cabd4fc781d59368da69199ac0bf975cd40c95a02c7ab95d99d9c4ab210abce8e95d3f4164
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a