Analysis
-
max time kernel
132s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
433e077f2ce66c5cb82fec997cd7d91b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
433e077f2ce66c5cb82fec997cd7d91b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
433e077f2ce66c5cb82fec997cd7d91b_JaffaCakes118.html
-
Size
142KB
-
MD5
433e077f2ce66c5cb82fec997cd7d91b
-
SHA1
a25b13d5ab856287614b94aba502ac482eb463af
-
SHA256
d999f23d5ac9c5b05bfe3308f8cbeeb3d41134f8f42776df089207ea70018193
-
SHA512
304c8c68b47722c3893762670ab96868324b0e166cfebcfaa5381d71c5db8de7c954add8f64c26566569f339ef7e24e32820cc74982a71f679e90739ce1c83dd
-
SSDEEP
3072:S06jnCx7dyfkMY+BES09JXAnyrZalI+YQ:S06jnCx7osMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9A5B2BD1-123D-11EF-A759-F637117826CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421885993" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1252 iexplore.exe 1252 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1252 wrote to memory of 2860 1252 iexplore.exe 28 PID 1252 wrote to memory of 2860 1252 iexplore.exe 28 PID 1252 wrote to memory of 2860 1252 iexplore.exe 28 PID 1252 wrote to memory of 2860 1252 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\433e077f2ce66c5cb82fec997cd7d91b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1252 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b7dd3e0b0aa75e6afcd30487712c959
SHA1ef623d3c27ca08630355f6cba1bc08605c8d2103
SHA256193d5bdf8c22f741d49b5b661e5698ce9ca926fa4a11eefa83ef90e3a449b750
SHA512512099b15f2104264ab4f4c53f32949ce62d92756adcca09cc4ed4b11a7d5d8285e0dc3fcc819c733c9cfca324fe16b4fbdf65153763d31dbf36dd6a02c3f7ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5847b43d14897fd5454bd2012ee76afe9
SHA1ba8e2dd813caad4f4c589f082e93361463ae2ec5
SHA25669bae5e50abdb5d073bc8fde24b277647acb473006df43cb79d8a32732159fb9
SHA5125cbb8645aef9125fda99808587beb07773f502da4ce3ce14065cfd4574846deffee6bfb11ac14be85929560f6e8520b654dab3b391c8fb5bad736210ef23a649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e3591ac75fc8e04f6d7d9d6922ccc7b
SHA146fed5c6b5799c5dc798c11eaffcc96c9fbbd22f
SHA2566bf9025e5e94a42493d4dc9fc1887bd1eae95e94496da4f24b6fc76e306c8519
SHA512925f8a80dc21dbeb960fcea3428502e02cb021c735f6024d9b6cfaa28380c56de7d554e98cb7f9c78f8747f4dc9e85bcdef0fa932eab0d7f54c78f64d903064c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b58b6ebec50b33548e87a9c84794b6a
SHA1053ec9795a0e2a7cf220456a8ddd14a331a9232c
SHA2566d14ff1dcebcbb6d0be6a85ae7b200e10bc69bd8a36b89d2baa7ac2d5bfa41b0
SHA512df9e5898326366cf2374c2cc45e63aae8f838eb643ac7dbf7c7da0a1245c013225aa76af8b15986828bcd3c4c258d35b512eed0a0214a5590fc7538ae413b216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5373c7ac1c086703e988aa0e8ba3d68fb
SHA11bec64cf7669e8a053cf48fe819d1ffa6911bf4b
SHA2560a24f280aab03f5ee8228ad102da3c30875992e8ab668317e8aa110958367216
SHA51290beab5b4c2a28204e468913833fd30053abc9ce8f20d9fdd73e24943f2c2e628bb88354e5fbb705012813306d8315e63ee46e6a845c42215b5b9b6b7cde4584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3db0d16be62637175dd939f11dcb108
SHA11b9611291efcdc6115bee02ca0f82c68dee8d172
SHA2562a57641ea72dfdbf0a558352f4bf3c35c7a29853f289333395d4884aa010bf4b
SHA512289de49c7b1d28ebf4100d42748cc66acb5058b55882647139c6c205d35acff93483d2b09fae2f5cd8aa25fef92670122e6ad81bdaa0d239bb44e0cc56587781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536ef779c27833ebcb60a9c78b8759450
SHA123cf3b758438d6b7c2660b6d1996f0a383100c47
SHA256c0dd2e51b75d649dd628d2bb1ce21527e3f923616d873902bebe809bafe819ce
SHA5126cebbde3032ba9f8b3c48880f183f798c5c72819aaa898dd1793ba3733448c67c40ae65c3a25606473517762a5f6f3a667d9fba4fb930aaec92c82da8035c2b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff7fddbe78d9dd4246ae9c0dd0072e21
SHA1c80e2286b741afa109f4dd836843a8957c8cccb8
SHA25622d1263a778d891094468c0e017247ddb68f8defb16a076ce2c5a5c505b85b23
SHA512002242e0bfaaa5c293858f82fae0cc9f9620829f74a5ef1cd6f6ae83a6bddf068609da89d09e307e88d9d9ad4b176c38118ebf83a0c986dec518b121c27b20bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590cdf5502c8a95d40e45a41be1c44af3
SHA10a3456903be85d3007065d79a8eb49071f6c3a0f
SHA2560de150fb39fe4e21bfcd01be958517882c0792dff68f1e908b5f7c2bb6229e64
SHA512437b4b042a512546d40c7938b279a6b666bcdaa592e015dc180f9f89b0e37f20da323a5098edcf51770d9c24e98d6dfbddef4e11f71af3e91ff9a3e90fb1f447
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a