Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
2ce9aa1641f44f307a23c7848fc7edaa_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2ce9aa1641f44f307a23c7848fc7edaa_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2ce9aa1641f44f307a23c7848fc7edaa_JaffaCakes118.html
-
Size
19KB
-
MD5
2ce9aa1641f44f307a23c7848fc7edaa
-
SHA1
b208acdf04324a4fc3a247cada2a2c59dc57e620
-
SHA256
042cae6b0f2b0c294c6f9000d983948b32a0cbb5b0c5ad65bf5492dd3c2e7205
-
SHA512
38e1e337eb53434b3cccb36db4bd84697a52b8d3cca9155751d0ccb72462a71c4d96e9a900a354889fa452c6dfa2e31b3dc96335763ed8bbb703b7aa2f42f190
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIe4gzUnjBhku82qDB8:SIMd0I5nvHLsvkdxDB8
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421470200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{826BAD41-0E75-11EF-BA8B-4EB079F7C2BA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2240 2236 iexplore.exe 28 PID 2236 wrote to memory of 2240 2236 iexplore.exe 28 PID 2236 wrote to memory of 2240 2236 iexplore.exe 28 PID 2236 wrote to memory of 2240 2236 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2ce9aa1641f44f307a23c7848fc7edaa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1b2a4b879d83a496897e7c83a4bd5d0
SHA1cbf8d64b3db8203d8082d7e084c607697ab844c0
SHA2563337e8f2217823e17a94722cb7f26e2fad38515acf74995cb240949cdfb942ab
SHA512bee15ecb8836737044e11bce3823040aa89422244a550bb4dfbf349dd612fcd678cc6cfe965059e1858c04cb418993d9161aff8c74db0b2e9a75ee543322fa28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e86b3c77fb00b9ff6f92031aac6b1191
SHA132365fa17c49e9bcf5fd3dcd65aa1e3dfde7bebd
SHA2569cfe524c9ebedec6f75b6ce24addc4b9c8c58dfde214c6fe430f6db411ee9ab9
SHA5127a7d48b1151a52ead887e7890c53dae472dddcd9a55421f812d7da2d835d05d6f7405de7c4cc670c15b84adb7dd1e858eab19dc2f22897832fa0afe77e757a8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574468804d24b1b97130dd104118619e6
SHA1f563f3840455fb37a906620f7257ce99a724fc4a
SHA25692b1c199f27754b002b790a6d156d8f7be84b5587f4dc557edadccf2978d1cb8
SHA5128406087958cb8f88454c57607fc28bdffad53c81fdf5b37024e2128763f332cd26e2130965e1b74c67c01652a48652ea15780b18577d7ce55f00075801528868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579ffab4886051b0fbba03c1505da9cf5
SHA1db131c782b5ea4f91828c18f6d2124ba4b5fdcf6
SHA2566c4e03adf94ea76deb9b3326991075f80a1fc31edc4c58308300b3a4fdd0bba7
SHA51237de86a293bbeced0ac2ea44b50c63381c0544c108e8a6d63066090b72f70d3baffa1dd6f01697f7a67d554d8080b3ee4be6abb769c9a1bf6cc27439a5a90ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f88559dd57f2bac57240ddcc302d88b
SHA131964d711de4be800c78578838d11113d99eeda7
SHA2567af2693240abb9049776437b7a82b900db5617999debdeea057120b31661c274
SHA512fde41c79f8e2900c37279e9b0d9e2176d378ed49503d90ee16f7a193153a0880133a4f41e5f1e5d73e0ad47ac6673a4c31149acdc810d25453e2c44cd2793898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b905fad5a3c9b41aaf24e6b9ddc37106
SHA1fbbd601e95e1a9cb7c807fe21d34f30b77709f0b
SHA256b747a2b26c823a9fae08f389d40e2c403d42e94eed80285c5230ed161a7f5c6a
SHA51286e648125c7ef499ecda95f5907440287dacb30e0e9724935ad2ec134fa3cb8c7507bf970043936312c13425f91e6094419ac2367fa0d8aea24a623b2ecb9fb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5060b3b4adda84c128d234cf9e560ba44
SHA1c6326c332af5701871d4d10e120f1a930e854a6a
SHA256b946fb998b391d301bd88364797d8300963bf8fbfe1a130188a348d0c884bb9e
SHA512b2f42ae8d20cec357c2cf7fc315e537b75283d15c23807319dabb4db6d9ff0530e76eeb28987eba3b75aea14cadfadc65e22529c311aabd091df602d32d49580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6c467993436418602f953912da8737b
SHA1f6756885183495d16ebb95af65a8a3b88e50a88d
SHA256e40167f88fd20f25d8fd8da4507e9c52981c144a9b0800f7c1afa8d4c1860144
SHA512e622de1caf7ceb9d754f1be239463c7ca1e5415c38fe3af4fc2f7af7f7e7997ca7a500f54634243f967203ec261fbdef4a5c5799aeffa105537e91a3beac4d41
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a