Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
434414f4d160d64518bf642761adcb63_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
434414f4d160d64518bf642761adcb63_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
434414f4d160d64518bf642761adcb63_JaffaCakes118.html
-
Size
20KB
-
MD5
434414f4d160d64518bf642761adcb63
-
SHA1
d4ff76e7ee2432a7943d022eb1d0ac7dd4f11561
-
SHA256
2fb82aa5e402073f3db0dfd1b84d0cbed353fe71c7c17eacaf0b402230bbb845
-
SHA512
a3ddae62f0eed828768c47204400d0e51166d097f0bceaced07a7c0cf4ed4814b43407217b02730513412501f4fcd1c43ca43e3bcaf4022938ed720657cb8dbe
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAI64MzUnjBhIC82qDB8:SIMd0I5nO9HnsvIRxDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7BABDDA1-123E-11EF-A585-5A451966104F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421886372" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2392 iexplore.exe 2392 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2568 2392 iexplore.exe 28 PID 2392 wrote to memory of 2568 2392 iexplore.exe 28 PID 2392 wrote to memory of 2568 2392 iexplore.exe 28 PID 2392 wrote to memory of 2568 2392 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\434414f4d160d64518bf642761adcb63_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5192bef271e78033652863dce08e2e4cc
SHA19035851719732f1c112198de7e1f4fffbf46659a
SHA25615ada7ecc7a7b1e0695b8c9136afd1cf5e65f76e00c44234b47506f1a4152e38
SHA512cf896743ab805abfbf61aa72b7826ce9f0b555ed4df9a776ac7c7bae7f33f09635d470b652cc67e65b16e64463eade1862d9daa245532969c15bf2706ed78e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50304ebb921793548b8477e75932db92b
SHA1755eff38d3c171fceebe01b6852874d6a0fb4f1b
SHA256ce7e02594fa99f1423bfc17f50aa31d98fd8c209a7030ae5a4f77f490f144582
SHA512ff3ee824173f9104d216fc7fbbd83c7aa2a2bfbe35b4fbab12e246a5163ad103b59ebd1ba6745037b28c1fb02881b8286a84cb40d0e11b057b56ed4239111043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bd418843185d2759bcf549fad05831f
SHA10c2e63ac7a6ef45edf4db139b122f02a62709659
SHA256cd0f8489751eb891ef643619795c2ec530cb019509823ff184609573f7654c6d
SHA512637e35bb9b2fa658bfe5bfa75870550cc946cb876fa4475fa2ba05fdf5475197746512df454e36122bb98e5745b3d287d91a9d07a19c6d42494151657df8ac19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a941c2cf2e5d2a1cbd685a161e2b155a
SHA1110a5d22d570cf4d78673a19ca922156411b070f
SHA25661966145dca691c58492aa5d1e1c130dac48685ea306ab9ddfc3ffb00e310d17
SHA512f356d1ad9f92e543c5941bebeb68340e597c93a458425283c7a6f82853c48a5173f870a5b12bd9f3669c3472037a5101a76c5542869156cff1df809d3bf24aed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e25cf873a321e5d28aa5b337b5583126
SHA1496a9f701bebc383fe43883d2cde7a9af8b874d5
SHA256bcdbf225709436f015518da8e00797aca6d6faa5df9eea19bfbc6b9fc187729f
SHA512f43849c76492750070e15e92a3ad5ed7638a262daa883f9459f6c3079c466ef74595650b107664ee6f176564f9bd7bc147db71a7052bc5afa903713755969d51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d88235dbc160758e2c8f67a356bfd2e
SHA112221cf0cda090b6d9daa2cfb948392365497796
SHA256f4a0b6af5c4a90b90bda30b57428d8b54c53346a12a6ecdcde054d14492ba82a
SHA51299a132f01d153b6add54c8c16b607d6c3b6e4915dd1c174d586da1ac42c2217b552a6e258b9642de44aa81183ae5712899a14a563c67f2232182b90381402fb5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a