Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 01:48
Static task
static1
Behavioral task
behavioral1
Sample
440b25039ebd2530874e8712ab7dd960_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
440b25039ebd2530874e8712ab7dd960_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
440b25039ebd2530874e8712ab7dd960_JaffaCakes118.html
-
Size
13KB
-
MD5
440b25039ebd2530874e8712ab7dd960
-
SHA1
d48d33a025cf9536f165dd3f6aeedc06cfdd6886
-
SHA256
774429c945c14c973944fd1aea74d5ce46aea809a3d0f753292729d84c6c4309
-
SHA512
b9ced8e38144b9b42434a23a358b56215e78d2d6516845474379fc1a2e3cfbbcd22755be4ec57480f90128aa34baf1667155afc7b9a2590fc2476d076362cd3e
-
SSDEEP
384:90QCh40/exCSEzh8KGQsirF3L7bO2j2di2:k402wSOGQsi17bO2j2di2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2A58A631-125D-11EF-8414-4A4F109F65B0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421899551" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 3012 3000 iexplore.exe 28 PID 3000 wrote to memory of 3012 3000 iexplore.exe 28 PID 3000 wrote to memory of 3012 3000 iexplore.exe 28 PID 3000 wrote to memory of 3012 3000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\440b25039ebd2530874e8712ab7dd960_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5ecfe5c15f2d0ba560dd07b4bc19b5e1f
SHA1cdf4fb4d1739dd1df6272f2c0a54b71467047c23
SHA25610e6e467c4d6ee84a48c313d6c0a63b415e7f4a3c97ee9a1a0eef481e49d845a
SHA512ff53f3f183026da81606eb371dd91d6b589fdbbdc8a6df0fc15e8ec82265a5fd8a33223fafc7e3dbca6fcd0f8f4a1fd315ef677ed75072f30b183bd6bc909a30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56eab062b4cd989c73a55c204f4f98aa2
SHA14263f6fbd4f2cf74422ea2943fe5006e7ed05f2a
SHA25670d07494eeace7a14b386de7e8b3d71126d590dce5abd1cdb078f70af2539adc
SHA51215e28f1f248ee89b1db9c0ee15a4a24440e7fe5bfc81b24bbab7b71a4614f64352c2227d1d80a1c03eb300cfc705db78211006748e38476fc6671639f26b6823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506fb511c80d797566178f1dba8caceb9
SHA1cae4d2ed6e4d133c6fd40a5fb73975b63cd26f25
SHA25652b99d87f23cc58b7bdfb58c7a504b733d7cc08b41456e230391699eb390e076
SHA5129b4c0ffded779961e89239e19b27862f0e10fcb448b68f24910bd957a13b74380ac6e3263831033bc7452e505105ec06a8365371dfc7ab16334c07892ceeed8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ac6467b0f8d93bc855e8b40d9e10ff0
SHA1bd7a4c506f673a1b2fb338461f73c990520cb14f
SHA256a9439592c8508162d4344625eb58dd22e02df5900436a46315d5d0f7856d5313
SHA5122ef1862a0e95e743d7a0bf73fb29ad871c097156dbb4ec6b5e5b90c6e7cda80d7335344fc33b8ec07df6972cd21960ecf85bed20e823e0109a06cbafa1889b79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580e92a9340c65667b81121f52dc64b4b
SHA191b5f86963128f81209fd4725f7737cfa8c4ac90
SHA256916c120f3ab4513f8efb94ff3886f8b54f04d7375122cc38a6776c2bd443b26b
SHA512a244ff5b2579117dc3eec5224b898a730592cf2a5ffa8a4e0206b410fac38d78d72d8f6d5b18f33c90df57116a29abc9ec56816defa26e352af15e99a2901717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed1af901aaf4087fc16b450d0653edf4
SHA168ef32103911ead1522cd2101ff7d8a412fa99f8
SHA2563f3fc16e378f1d27d3ebd0a096d83463a699c94cd61fd0ab9377a2e5c54be470
SHA512aa604c90cb2efae738ab9bfa5177f8740f4b2cf65aa5a57930e1b86e4c42069757b5d5d17107e83b2ab7a11d8e6b5deca4760d45b97770731c37b671b93fff51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d0132464a0f1e1bd6dd1d7975bf05fd
SHA153fcc5a09fd41c7c2897a76197c909b4ded35711
SHA256a5a623c840bd51dcc5291d349be6b9057c52f2eaea20d0a5f516edffeb0ac78e
SHA5125bc277212754dc5f2fc05212749e2192126086df195bbd7350c67efec1a2c899c95e603533e387f616e2a866f6c928b4068f17e52d0f97e037decb304bc47508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5792afce5ebec4b6cc2daffb4e7da0e3d
SHA1974e30fa14a593a9ffe4febefa19ab2ae9141939
SHA2569a500a82342001f7bd39a30013a1ca785f1aafd4332a0a7fad04ac3339f8fddd
SHA512a97f324b703c6af13d8f37c8302e927cdd3a63bc883cac2d55da175a1125fb879742eed8a5f5f800d1e06f2dd8a9e4307ab2a3d06c37a89284d93dd99da18cba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c317aed5b6dfc1330d428d4d7bba58f
SHA1da9ec1fb9213016d64108d197fe432907f33fea7
SHA2566c4be9f4a2159de73239e8d7d0d10df6685e01bbf22a9aa4bf80fa5313ee9c9f
SHA512d4f270897eb5b638c3942751d0ba152b7b94f1e48b7ae2f02102c891a387da78f1ee7e99db8fa6c9de2048927b9509adf7e9794ad3b50f5e7c0dfd307c18717a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5431716039a648375a7142db764b63380
SHA1d0048991fc8c12b1fb96a45a8724a14f0312ea0f
SHA256dfb06dd39ae6da73d025f82592099911ebbcf42ada37c97bec32431c4fffe983
SHA512e399d01f68c4ca71e50172c09d9709cf22d4c1f105b26424dea247d6039b005c109fb90a885be2da86ea1681ece1301c59e5d9a281eb0575ae901c8427a41c6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508e9c441e98ef167f813f383f8ac55b7
SHA14b36b011481f9ffa91ef4585dbc6190e1685da9c
SHA2563932ef5721dce3f370dd84db2e6d8c355112226ea96d1dbc535a7acc72721489
SHA5122fa751a4b3d3a3e7e77100323b824ea8ae2d8f3541ca9282261651233443d3d776e19afeae76db0df32d677d37f040c376316f274d2d5b8bf686cd2b1eb4646a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58adb0fb5363851cf7b30caae72fe3930
SHA1c883cc6407af7f7cffe8a6d343c83eb49fa587eb
SHA256a894a41880cc92e9226412a7a1d60575fc57bb2cf1964c2f9b7f79b557f65dfd
SHA51261c259959455e246322f57d9683ad49bac339a519a67a17481a1efd4f7701babec104899b9df8e9df0a0c41dad929bce75177f9bd220693c670505b2068982a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d30c77046a9590a292be24b40deb072c
SHA1324c06a4236b37d1605a4f10282ab71217827a52
SHA256a7d1a8b67c47a9525a1c0fad6867c22d703d93979dfdeb0d0f4e332f1fd1b0ac
SHA5125f6b669282aaaf5863a24a2cc375be507d6cfeb10f7b13b1ff047bd0b1eaff6d259c59fc6a42f864d2186642cd3377584485eba058fa5ae8099a5c9cdbdb9bda
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a