Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 18:35
Static task
static1
Behavioral task
behavioral1
Sample
477d078f4ea91ddac119f355249e3af8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
477d078f4ea91ddac119f355249e3af8_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
477d078f4ea91ddac119f355249e3af8_JaffaCakes118.html
-
Size
138KB
-
MD5
477d078f4ea91ddac119f355249e3af8
-
SHA1
8fbf795ace9a1796caf2a3c51a431dcb86a9f118
-
SHA256
0fb4432db0d3ce8d3d6d703048374e18a76eed3f88fef47004062161172b1dd4
-
SHA512
68cb786c89e90a1a6bb4addb12dd8cdd52010549992f690be69e883e9567d25d589d739ea300974fb7901bace24810b99f23606786366368d7e1001087c94c2c
-
SSDEEP
1536:Sc2mn4D+h6hzyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:Ssnto1yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F1ADB5E1-12E9-11EF-BB21-6AD47596CE83} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421960014" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1700 iexplore.exe 1700 iexplore.exe 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2028 1700 iexplore.exe 28 PID 1700 wrote to memory of 2028 1700 iexplore.exe 28 PID 1700 wrote to memory of 2028 1700 iexplore.exe 28 PID 1700 wrote to memory of 2028 1700 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\477d078f4ea91ddac119f355249e3af8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ed099fb074ecb7321337e39d654cefb
SHA16bb03c986f7d37c542eb04a80345c73970454862
SHA2564b3ada2e708186ba4df734b85e7d114efcf860845bb0dae4ebca117008a43ce0
SHA5127cab7174a81a91efa85a0c9ed61e9b45f07095aeff820ab7d781d00453b424579b145e0966c4044c704cf48c6335f6b7c64b43cbe3554a087ce02441aedf54f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e1d949b8dd3bef5abc9e29734032792
SHA1f7fce0bba7178e765e291aee109f3bad443a4fad
SHA2562b713e66ae0c60449a8354658daddfe59083ec436095a7c62adeaaa3e75a5db0
SHA5126651b86399f471874c44a08b87586e5c8ec98719840c240e2a0eb977202f58729a9c437cdb64d167beedd12ad1f8be471b45d6b776b58db7e848cf5b5fb76578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad350cb75acb6b79f83f5a0579b20636
SHA18bdd3faee58683bb0c95a2a62ed5beee680d5fd7
SHA2561d4fd4440b2750bc45554602da270db9e000aff5406913fd8943b2238c59f317
SHA512dbfb9ebf6ba87f373450a1150720d9113109ee3f28f1ed3406ccb7cfeb32b76c9484e210fd95a1544503e1e0b7a937e399f05e6b5bec93cfc94726014255d66e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5309c80414f357b36b6a63f9ba98efe2b
SHA1f4d6f1b6d2150a5a649bbf001bfff8977651a9f1
SHA256fd7e967b7a68836dcf4b6faa8acde8b53514f25c1c4e5e1d452fb41bc68f2b14
SHA5125845391fefe957c557fbffe94ca9abe3300c596a919d4c2a5fe30130fc38637f15c124af2464d3eef38309a7ce71567039e01905b2b433e7b12eeb9532cf3bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f55efc2ecf801528a436d4660806ca2
SHA1d72c2c3992fe1d7d8dc6e7ab2920d44b798c8f3b
SHA256074ec9a2ce5916f7bdd63b552aabca0ecb56da5c300003607bf15e374672ab32
SHA512f4eaf515f5695cecc023d445a10c5336c4494aba25fbf9cbba32ed73a9e48c02568cfc41d258cc87618e53df6a68dcd386ac11b7a07646a311b977c73032d3cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55391069592dd57bcd7fba331ca476116
SHA13cb8b93270fb1b724c2f3fe3aeebce2d801bf3c5
SHA2560341b09c3b14982d2026e05238356e44d601e634c133e3dab39e3993695f4244
SHA512a527556fa4db599939229cb1b0c71f67e4ac5bcd77700773977f4fa93f5ad6ee7fe2fd24b227ed5cfd0943951aeb28b2a5a21c503c37a318451b0f32bd11c687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d6465536f5090b48b504cb955aa9e92
SHA18c8fdebbf81a0d77e896931367d420ed03c91cec
SHA256ad93d9e501b29a2cd0dacc479d4e8bc04157ef9295ea2089139328cd3eba4e48
SHA512aa2cf0a0699d62cfc5675c25f16803e003c2bfee8b13b63138b097b3821f283dfe2909ad983692ae194722407bfeb3e7fa38be895f8e2ac381ff78a34e49e37a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cfd078da2d3b6082bcc0543fc41bc44
SHA1928a69eb1c084440f018b04ef4afb245a0627d3c
SHA25652779fb1c08970411e1eb4ec717b4eb5ce49aae39aaf76c4263f531bf0f6a2f1
SHA512b213f4821a4e1849fc4e0a21eb7a476585d2e1aedff4bd69f154451b6e752a75f64b67f80f46e7cc2d8bc751ff336b899ce4139b8ae8f5411e3d599156bc3a3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bd80984b09ad6225b4b3ec78e1eb828
SHA1ab4dcefae7c209016159408af6395b0a89b0ba9b
SHA2567338c8177b88abed280f42c6ad2541b2c80f77f3dd9cae67ab3b5229d95404ca
SHA512cbc33ff3f52e49de0a43a4c73137a1ba389b434d7037f7f81eb7438e70c51892401c340ca3d022b7b4cacb6adc2ebacc327ccd677598eb5c21e881fcd90802f5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a