Analysis
-
max time kernel
134s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 19:27
Static task
static1
Behavioral task
behavioral1
Sample
47aae1eaff5405ea46c3c72219c66778_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
47aae1eaff5405ea46c3c72219c66778_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
47aae1eaff5405ea46c3c72219c66778_JaffaCakes118.html
-
Size
235KB
-
MD5
47aae1eaff5405ea46c3c72219c66778
-
SHA1
bad851dbf12a4fe1a109f72f8f08e238fac8d864
-
SHA256
3935a9e0c048eb3f07348e9d6b1c0656810b31e6018bfabbf5a899b5174c9c5f
-
SHA512
a022be3300ac0c2d88dc154a6cc7af08c7035d1fe5ac48ee4e16b03e17ac3f0a326530b9d3a4db52f2f816c38a407afd3e1915caf774cc2722540d81c96687bd
-
SSDEEP
3072:a4yfkMY+BES09JXAnyrZalI+Y1dcyfkMY+BES09JXAnyrZalI+YW:GsMYod+X3oI+YLBsMYod+X3oI+YW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421963118" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2BDF1FE1-12F1-11EF-878B-CAFA5A0A62FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2128 iexplore.exe 2128 iexplore.exe 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 1064 2128 iexplore.exe 28 PID 2128 wrote to memory of 1064 2128 iexplore.exe 28 PID 2128 wrote to memory of 1064 2128 iexplore.exe 28 PID 2128 wrote to memory of 1064 2128 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\47aae1eaff5405ea46c3c72219c66778_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58af095ab86c795f7f1a5e1f662aa855c
SHA1a9ec5c3c40384253ef7205351aec68b28f68b4ba
SHA256aec24415f5ff44c55d9dcb7da334d277bc2ff82a97f8a41b4c0f212b5fb5dd75
SHA5127f3e4b5c32486e44ebe7e48d1d40013103c5db14585c9209533ce3e97b9d865af32867a21efcacde6bc5e772edb6918ad226e5a7265500e499f3d048005b7e04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57f42c02305ed3f807c203ce3c7c42265
SHA1d591dd2384b0148f9796add94cf22d4f11ed4811
SHA256ef7c815517ee7c12bccfaad33f30234b3eeea1488587168f3cc63f63ff1532a9
SHA512a60379b22abc8c8533d01904787ef9198b39f3f750b7fd62b19904a0e74aff983d695ecde9514ff300b7b305584f12a1dc60d5291159e4bfa646b6634713553e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5379e44fbe3e37c363c11e5ffdfbd83dd
SHA15828cb55f76dcc0b9cfbf73e3760f7957aa2f15f
SHA256a42e0d020656d33670c3e7c45629b8c01baa4d9783ff6fe593b6e1c7f6e145cc
SHA5121d18c0bae33d6d47c68f7b1f806ccb7316ecd7454138dad83e92374a7d77f76def8ea45e5494bd77443c6d09989bdc294fe7c6f670868672fb661a7978b50c2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58ee338d5b6a8f06f65fb8d9435ec0966
SHA1a038ff8b22a2dd11371ee9ce61b63c2a4fcaf600
SHA2567e6accef597edd85b6b9b7eb5534782b5e5179105f2726172d061f6e57092cde
SHA512b4fa07d874c2f00052485e32ffdd6dd2210434b5c9eaee412d3598b2b11ffa1702bd16c8cd47e99b5fd6f6763bf61d0b263a5ff4add1b53526175878fad3b843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5725d86317e1c975cffbfb17c4f8a3ad8
SHA199716157673b6f66aa97058c3e1cf8bc2dc91a6f
SHA25623a5148a0f2f2a807758407136366d396634a6ed263d7043b9a2df4c1cdeb4d3
SHA512f2a82c15ff42713e0b060591e7e930b5b8c606ae7b83eea11f71195e280f121c223e10ab2aa247e806cf9920973224d3f85e7b78c128179e08f405e5d8f77854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51e8b2b0d3cf8f81fb4ea89227681707e
SHA16f151fa5bd5d48dd3957212648918273f56d3a98
SHA256d3c7d0b81bb12f3696dcaea4da3345fa0f7d3ce198e972072c6e2b2f36efd5ca
SHA512e9639be0b681c0134028b442808ed52936ab818c1ce6d827169d3d4dc8393cc11ea806bf4cde275f30cff9ec85621a198521f8a4047c1410c7f68b44e5030e53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c7d06aaa9b58af163d86e8752ebd4c1b
SHA1a4e54923cc63ac681fa2f0928da2e64214823db7
SHA256cdb5b29a16f5e06e1c0d458c465d4e9e5fa3c1c3e607d7fd57c52caa3cacc435
SHA512107e0461c8cb3da9c537a11171bda62c586b411fd98971f265018158b6d8d7ac9c99b9a6dc87eddee7e542dddb186fe1b98de58328d56cd689f54731da447966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD507fa228ff19664c7d7e2cbdad5869df5
SHA19697bf02df7d68bcd49e1242e99e63a799887fa2
SHA2568dddfcafd5c21d97e777ae3325b415f8b1d54c42f2c69d14fd79ee428f8430f0
SHA5120ad6bb7a8b83a7fb89ce296208875ffd05da6cd475219848a2a162004cc7ec66f2ff4761c814acd70ba5dc19b1802a805b8d4cecca26c420191839049817f761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fcd2f0bc0410011578ca53cba8e3603f
SHA185bb2c73b1eb63e9ed102ff4b1310b21f895ec3d
SHA25654fd8760741453f9c37d26556b5b122efb9772cfd7a15a0998d1c2f66293899c
SHA512210f64e8985630ee54687ff3d751aeea6d38299dc143a2382d838a4e73b95bcadfb8bc0dbad54ff52585fe1c316adc50ac373ec44bbdca0fa29fea997daa4402
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a