Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 10:24
Static task
static1
Behavioral task
behavioral1
Sample
204f32aee6a8e2e938877535548ebf74_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
204f32aee6a8e2e938877535548ebf74_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
204f32aee6a8e2e938877535548ebf74_JaffaCakes118.html
-
Size
25KB
-
MD5
204f32aee6a8e2e938877535548ebf74
-
SHA1
d077f58ec0902d14970935ee7226849a6264bbae
-
SHA256
0e2f4960b0fa8473fb4d4e48eeae0b2e6de82c700daaba70c853a04d83e28ef7
-
SHA512
f4bc85e878bb98c18ea1cd7c020a1d4d9f19202f46cbeaf35cf5767d645dbe670718e3fdc51c27b472d4abb8eaaf9f014edfc85c65eae76288b908d15c88e684
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIB4pzUnjBhPx82qDB8:SIMd0I5nvHRsvP6xDB8
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2002DF1-0C5B-11EF-83C2-E25BC60B6402} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421239319" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2308 2524 iexplore.exe 28 PID 2524 wrote to memory of 2308 2524 iexplore.exe 28 PID 2524 wrote to memory of 2308 2524 iexplore.exe 28 PID 2524 wrote to memory of 2308 2524 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\204f32aee6a8e2e938877535548ebf74_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553f4cd926645b51cbe69f3f79e1e86f7
SHA1fd8c5d6f72d0252a042a22634fa7bc1f3993b85c
SHA256a5005935513016021657366dfe39ea7cc1c63eb60cafea8fdd10231f2cf3ff93
SHA512ec38430fefd96c9341154e98783760ef2d4eb6c39d8c73180e6736ca0087b19b9e41a6397dfe306e4c380d9d93f955363abca6b777589b5362f0515b5c570143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586b357f5aa7e88abc42dcbb21af841c8
SHA1c4e3316dcf0e514f979b1c6f82372622f77c1bf7
SHA2568a6f35c82c9f0a256abfedc728924b86057a2eecf6ed1c649eb9541c7d262379
SHA5123ccc792ca1a4dc553e8ece23662d3151cd08a3d50d38b2e4b243b1787cbeac6ad78807c2d69d8a5ee7193a0f37281c416dd0f9141e25c29a1b526a9ed0cde8b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57202ca5bd036754ad2395e6795c4a386
SHA1fa041c4c86d5401b2a7dbfa69d144f5dc62c8f6e
SHA256fa92edc50f9e4cf9fd11c924ff7704486290f83166fd8f56ca39fafaae2d1c70
SHA512b4fb233780796b428e3c9e62a945e132ed0c62a65b04653d2dbf2063acd81ecb93b76466f35f8c9ffd7fd397feadc4634bd6c8b82fa6ce61a7cdb40d45ebfe19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4e5d467d20a5ac90404220f600b2ab1
SHA15b8c72c87ee48860b879590566931619e52f69d6
SHA25657f07383fb865dd966e7c0e5ede5523b859416585a60907f99401adbc680cbc5
SHA512ffc9d1c5fb48a8bfda3d586e0503c3cc2974562d841ebf9dd2eec112e8cc0830c20399aeb9f83865479816e5206e4131da4084d475b9b009dd8a85c21de9e847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584a8dd86d626ea7195977a855d512c2b
SHA19d78bea44cf053fa5f0e6744463a3859d361481e
SHA25657246de111100c2a4475f7f179eb0d99c499f0fbd0a5916f92c810338ecd7513
SHA5126cdbf90b35659939e7154bf37c1c749a8e010220e62deec1eed45fcbe402954c74a13c4b248542117c4beb60e5c28b08532beab7d6d12ae5bfec20ec04d9fe73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5186e34d5bd460457fa603b1251200f3c
SHA112db3e20f2891cb023e8a5ff0df96a1bf8ec2d88
SHA256d7317af6a67de055e935a0188bd50013b5028e9456119659e492de4d19d94268
SHA512a90b6b13ab198209c748146d33d248c0a2317e22d3d1df1357ebc5d3289ebb33e5ce869dfa66bd4574dbb9778c014e5a8f33f59538b261f979851900b571a70f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5717b7463ef017fd61ce05d526d726351
SHA1f424cf9b052ae7d848816965c26f7d297382defa
SHA25622f4c546d3d398ab888e840ce10b4699438596332efce89261eef2e15ebcfa01
SHA5125d2c18e25fb3137cd0a20c58dc68bcd44154619e881586298e47d3763c0935eb3bbc3740e7a9207fcd61a3e9132c27868ca57a58a3c17f952f6b4fdca507e975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5725842b18371e14f8a6339e822a8d2
SHA14378bb1a189baa38ee9464c0f3165de474c737b9
SHA2563690394d8d25c8790a92ee37224ba7dc6fe9aa3bcd466727c8269011b4117b48
SHA51200d89bc9f5d72b2516b4a53c1c5705d9f4c139946495c20591923778304fdac0fb896f38f2df95b553e5c9bb0ef6afa1a97eb0cab674e7b620cf45a77e7d932c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532770837ef0aa69faefe410fbe1b719d
SHA17119e59bec06855b4919e24fe6f9560b0eeb5be5
SHA25693edfaea80cd5f1b2274bfc446db2be5721b0b1477490f6d4be9d088ad2dcd0e
SHA512cf4182b3d40f880b2edfd9fa53da5076c94f503227680b71be3c7e737bb3a7646f28d7677539c2ab2f46bbae600208d77627743f207a8d5d5645237d67c38c61
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a