Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 18:19
Static task
static1
Behavioral task
behavioral1
Sample
42776c87ea6e582e7d9b61763804aace_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
42776c87ea6e582e7d9b61763804aace_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
42776c87ea6e582e7d9b61763804aace_JaffaCakes118.html
-
Size
18KB
-
MD5
42776c87ea6e582e7d9b61763804aace
-
SHA1
c30c3d1e4096f870d4c74c033d2ee952fecb6ba1
-
SHA256
7df1e19fe7904ab377f609be447d5228546463be1580dc3b5b3ce6aa198b0f69
-
SHA512
d1324a9bea4afb0c870509a26f77fe067644311d5a601a45dd5c354ea9cc800c08d711d022068b34652ef6a38af716c15bb35560dc57f1b0522546bb73f1ae11
-
SSDEEP
384:SIMd0I5nvHa3THnLFVVNnCrc4svAgoBxDB8:SEJ3THnLFVVNnCrc4j5BA
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8EACC971-121E-11EF-8A46-EA263619F6CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421872660" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2172 3020 iexplore.exe 28 PID 3020 wrote to memory of 2172 3020 iexplore.exe 28 PID 3020 wrote to memory of 2172 3020 iexplore.exe 28 PID 3020 wrote to memory of 2172 3020 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\42776c87ea6e582e7d9b61763804aace_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c90fcde729aa81ea94d7e49724d69671
SHA1f4e4a0ce3828e1554a2b2af89e94bade6fab761b
SHA2560105b4af7fce675a8c7b55c6fc32ebb647e67bbc07db3ea32bb93ce74de306c0
SHA512302b6ebf1ee6cb122f4aa601170e8c34f41f2f0292d45876c79db7552ed3aa397ad86c31cd41dcaccd1d874fa887e26ecbe5277d510b13b26ceb37865869136f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5782b6e3780263f3e1694445671ff6f16
SHA14335c923768999ddf01e9941178785ce258d1869
SHA25607631b9c1344fd4af776aba56ddb1670481298144344e3c285056d7166fa26be
SHA512e70bdbc21ed62591836778cde8ac2c0daf3837c39647ce4244ea7cb832a4fa2cc6a9a8b21dd396d93f3909a02a0943c530345c2c0f40c1e3be4761f3f95f0f64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d6ff85c06ab6782e81bb0bcbc61513d
SHA1dc83968f55fb89b959003fd1e1186072be2a829d
SHA2561da1fa5b10efac3247f1b7dcea55f354dec3484f21f652bc697ba29e50701933
SHA51212ae9a169e6b7c5f9e84410d65a01ac1ed42e67938c47d1e7c8517a89d566a815cc8a7ce2460c81c5ceebd2f23700e2e3d91068ac1ce3c05ea599804c7896cca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e698e3dc3a18d35747efde715c27fc9
SHA1d40894446fa66fc9fb6cc1bd6144261fddeef5c4
SHA256f9dd5515535833eb421bc7dc1f0e44912bc6729a2eb63f14099070579510d655
SHA512190ca9c4f4898775d07bad0e282e5ab8b58125311f1767ef465e41bc3d5f2d1bec76cc08271c721b4430a078d1743d239f24e095df4d46d4c8fa53d47c423825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de7ff6f23d41c46a4480c6aefc255ded
SHA18254d1dc47a7940060dd612228aa21cf959f1633
SHA25636fdcaea24f3d0086a710590b95367341797dd609cc13125a083f26bc72c7e8c
SHA512c06c6655fedc41a100d4dd24d5973910e318f73cbd220eab5ba994ae6932d1c0a2bd3a6f118a130453cc19dc0e6fa8b1197b17167fc2f7a678fdb60a60f4a7ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5797247246de207122a410ac272e621d1
SHA183e82ca38a14d590dea99be501187e533f7a2cfc
SHA2568cea736a3a5a7232098c4ff4f44854df19980f78e1fe075873fc7407eeee1d66
SHA5129e58a3fa8c34be94c3cbc6908249b6322c8100269397577799e456415bd87fb411af2604f82fba773aed3b9658a972740d27eb1da77b7b63111abebdab2e48b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e5bc17723ef996078a7ec6f2ac763e5
SHA1772772d5366f6151b5c5b299b5c15b4104cd227c
SHA25658258f595de1cf7ce62402243d5cf68aa1e95360b2d2ffca4f8b012133c20862
SHA512a5fec254261bd1685e4ebec1afebf35bb46e283cbb60fdaeccd337770f098d9aa98f4a96b865d5196b233bd1f77392a080a7a233c5cb2486b730d53ffb06b86e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e4e6898b417768cb931f3c0b55836e0
SHA18c981a681dd22fa269b7073b69e841181f8fd757
SHA256f6e3dd6c1fccf76cfca780167e159bfa403f1818b9f0d0e78d752f3b19d9d81b
SHA5128ecb63b77fe33132106c95ffceb287e1c94625cf4f8208af5a3a5a8186f6507b310447d3022899bc35d9caba19f792b727115ffb1a1a027cfbf642b72aa1ca96
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a