Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 09:24
Static task
static1
Behavioral task
behavioral1
Sample
294f5d5f5ee9714371af3963499cbd34_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
294f5d5f5ee9714371af3963499cbd34_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
294f5d5f5ee9714371af3963499cbd34_JaffaCakes118.html
-
Size
246KB
-
MD5
294f5d5f5ee9714371af3963499cbd34
-
SHA1
74868ffa10d8b70edcc3ad504a4075384035b2d6
-
SHA256
e087bbcaf4bfffc8fccabce3e145d1ff29b38116ba93a24c1dca4ec2d7d9cd56
-
SHA512
986f897232436f07d237e8f1816399b5cf8c7ae1f50287c6ca7ce7adeaf05f84b63a380345c19c1a0eb5354eb29e820ab6e80732f5ba4f22ccd096c8ca8a96db
-
SSDEEP
3072:2uF9Qk2uoJOG+QiwPH9ovmoyfkMY+BES09JXAnyrZalI+YQ:5IuoJOGHiSHdlsMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421408517" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0d54eb9f2a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E46F1621-0DE5-11EF-86DB-FA8378BF1C4A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000001c01d78f185e6b3d82fa89d25a6c35e180cca0e0fe809681b1e545f3674e0145000000000e8000000002000020000000a84870bf3146f18d6e6dc035f28bfe6d6a3aa743a1b716b0107796c729047e0990000000309d2481943dc038664d4aed415da9fd064e6177feff887db736b35f1477036983aefdef962854be40e59696f495e0573004e3387c92d3d0257ff55eb3f1de756c0640c7576af262c955056ba96303bc533250d6ad4adccf85944e0df23a91d11ccd26cf4dd0d56bb8fb765953ed988010bda305f56b675ebc3040712db1bedb6a4aea83d37ae7ccc17b863b9d847b89400000006e349d6aee088c40c6a5bfdb50cd50332e94308bf027d496648afc2d9bbd64b09ec0b909e343516c71f26cc699fcc38a26c6a2e9e17a68c32ff24921153aa6eb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000000edf75b900f1f998267e7f2a5406f92bb380eab8b48ef70f1cd9d814186242bf000000000e8000000002000020000000f50feb4c4ad9daf10201fe125122a135f2e54302c756fff43c82b69e5279e80e20000000a4e13be37ef1d322bbe516bb289d9d564d0d9eb9cee54415fcce54d4bab4f43e40000000325d24bc6037e0492f4d2e18d9067d9118655ef09c00221cf5d6f5c2af9db70bc9d1b575605db4b17a7fad3aefd674364a1c5d1ce03c62b7112cd709c90af98e iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1584 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1584 iexplore.exe 1584 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1584 wrote to memory of 2560 1584 iexplore.exe 28 PID 1584 wrote to memory of 2560 1584 iexplore.exe 28 PID 1584 wrote to memory of 2560 1584 iexplore.exe 28 PID 1584 wrote to memory of 2560 1584 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\294f5d5f5ee9714371af3963499cbd34_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1584 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3e1f6fad0efe7b23feb83e4788ea694
SHA1c87b35a2a63eab908c0aa79ae3b137b38f57b471
SHA2564246b68b05355ffd5fc0257b715eeca41d2a88e28e3689daf2cb74101210f9e1
SHA5126afd69aa18310e0eed7623a626c081ad16c9e6f9094638808350b79af804ace56333693bdc83c85caefb8ca1080f05a03433cfe2868f60bb2b56f0b7595f275b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d112798073d40b8be6f77b21f6a7800c
SHA1eaf94d871fe277b94544d06b3d7d4f043c284072
SHA256d11a6896eb8eb7648c3162b57065e575f81621bd6f351092e2f65a8d12243bfb
SHA5124a65a85c7c314b56785cdbbfe59f7d36023aa38d3ab6fa46e0f828d2772a7a4851b72281188eaec51a4ad5e1ffa8b59027b26301c6abb3a1c770c9a8fbe45f2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3fbef658754cddaf48f835f71374bf4
SHA18d5a4daa2a557d46256b09cb50308266ffad4a0f
SHA2564605857f538755a5378a6c761d81e2d20f0e0a0234a179264c75f134a90b7e48
SHA512471de6b2a1d33b755bc6314311de442169a4777b5b7d9ec35642c10befb983025ba45d8b8e2338fa3a248c74b171bb54af6d1bac90a21ccb1697bbb05d9f3086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d6a8c002b56b01449c488fb13554f38
SHA122a64905dfa456872a941c431089e350a35c5d71
SHA256dbd3ebebc9cd9ec3e6a5bd048e295e6dec50ce61ab397b2e444d3ee58f36edbd
SHA512e8403b1bafd279f5ed33004698073e1c96755470f3600934d93e3f9277ea28e031bb697659d7c411250ad4840f58ebda7f16701983275a14b39d5f83f201a0dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b05c5b8e438f55a7928ea0c9a0ebee7
SHA1e25c6cd542459c375eb897ea813be9e761e70774
SHA2565a28534af44d11492d9d28d2f51efd4ba70224dab490a79958fdea9492133b6d
SHA512144e750e226928e0125b888c7dad494cdc2fb078acd16b7e3dd57dd3a56001c2a662c24820176524b2c3b980a64afbff6fc0efeb8a41707c90b26060b2daf183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e08945f181178b83c7341b0537c724a
SHA17d65361b976d9302e3151728cee41148602c3e82
SHA25670697cfd75f5088fe926b095e90524a8ee635424c26d57847cbdc7588b898efd
SHA51260d1fecf00aa1e525ad000b4e750fdfcaf7e5d684d959a6d97248010307af2bf255bbf73a06c33c531acc7970b797444e3b33c1e46c4786db109816ddd7c248c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5555ee9eaeb677bfa5d9a18df9cc08233
SHA1f66b5508d30513eb952ee5d0bba5445921808e10
SHA256fcf2c0c257152a66871273efc125872cb86dc538401ab46314009a5f4b379365
SHA512a17623cfccfed8b5c2c757856a19f0f69a983b1cc38ff50dd1af3d7e35161ca2854bb7bcd64b30249f02d3861e01a8442a434781e41a21b381211e73d3cb2f20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515dfcb5aee23d90c0cd85d5bf7b40908
SHA1fe7e4bb8c20f1fd206680706fdb9d0a97d97972e
SHA25670b3945c830b1846793fd527a1da207d3377bfbd7d4e2353eba0a8567b542afc
SHA5128afb1b106defccdb84cc66aaba55965062b4afe055ffcbcfc268cdd82cc5268905f29ec19d8f8dcc19fad55c483261559b097311103f76d801cb4df58269561d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bf51c23383bc4596a73c6b08fc56ba1
SHA14d39a3c7ae7db5f24497d86c1531d0618742444d
SHA25641c871041cb50ff916840518d1339cfb086dd622ce0840967e7abb517900481f
SHA5128d74886ee747e774d6fd4f4260dd70ed9e8728dcd80d8ad556aa7ba05b0ca3e96ec6beeab929d7389d6fc86ce8e7ae847e478ba482c2dfe5f68de77370462f1e
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a