Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 07:33
Static task
static1
Behavioral task
behavioral1
Sample
4a0440b3ef644881c5173566cafe6386_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4a0440b3ef644881c5173566cafe6386_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4a0440b3ef644881c5173566cafe6386_JaffaCakes118.html
-
Size
13KB
-
MD5
4a0440b3ef644881c5173566cafe6386
-
SHA1
dd8a65c66dfd0840c012ce2bf11a0d314642a58c
-
SHA256
6ef46094cfecf0aadaaecabb0ff9dc5f25566a54eee3483b2b3443d16eb294c0
-
SHA512
968638b113ff4652bc5141827b9037fe7b907d4de0f72aad5413e13c47f72df7ca0f7ee3278a02b0b5412651c181f578dd2e23718d32b67138c542ee6b0258c4
-
SSDEEP
192:MVI0GiGQGEGImZwErFkIdfHGXGEiEGE0GLGeGYM2mGh1kJlyIEJGov7GjGxWeG+F:KncCiGVzCEW1mqmE4d+84tLo+axWY
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A37CF7B1-1356-11EF-8FD2-F6A6C85E5F4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422006698" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 1032 2924 iexplore.exe 28 PID 2924 wrote to memory of 1032 2924 iexplore.exe 28 PID 2924 wrote to memory of 1032 2924 iexplore.exe 28 PID 2924 wrote to memory of 1032 2924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4a0440b3ef644881c5173566cafe6386_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5998b55aafbf4dfc4ed8b6e6da4c8cc2f
SHA1a578b4eae078b027b3098c7b1c78b63168be63d6
SHA256055acced1a73a845a8dd2566a8741987631ae767d92afd11eae6e9bca9d7c94e
SHA5125c7036e9dc515b97356779f8fffa6c33771d2dfd5d237316c2b43bc2c986318828f105d9d45a48eb8262411769ff64935359b9caee0bced0d8c354addccf9634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e2cd4423319fc50845be80526bb0827
SHA1414f487b0f62aed6e3919ded3cbb707223a7d897
SHA256058d1a3867003923bdb4b9172ba801fa2bee0d0ef0304af0876a05a78c789d2a
SHA5123ae02226cd7f3010af62a4b0f6547f259519fc5e92ef4c00efc81405e71aa6c2e8cb0ed3d9dfd40b3fa15917fb7ac6a985003479bec0bf0fc358f8f13edf3d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56453066ecde84b41aca665bbd3a18008
SHA1ab650033ddf8b4ef8ca8e50b40c5ee09648e5c8c
SHA25667c6ae3893753684d7bd00dcec3f7d251b7867c1842edbac98d9ad099c6c8ca2
SHA5126317df1cbc39f836371c78da68048fa7dc86cef6f8e7c7c5dbe69293febbb9844a85f3a7705c5e73ac6b0e9b2b7f0b0cbfb9b7254384a23bc780360ddd08dc1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5365b7542cf0dc7192796800a479d3c50
SHA1411282c5a22217c00df13b51c349e93fcfd4de9a
SHA25673ba842737007d745a5b7117a170a75e28540de8763712353350fa25d8096755
SHA512329ca0c83bd85d4ee9e084f7f4f119671e1494d692d9b1d6bec55efdbcadf2bec0605a8b5b64b14cb469b9cfd95ecb2b2cb1a582fd5352592290a8420acebe70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5183fa8493466b97c2fcfdf500c14341b
SHA1e42226906395580a4a9198865b226aa8a044db9c
SHA256dab542d8fb6ed628d1b5b6a49bd3b9ad520d4095bdc6954728f465aa4e52f2b8
SHA512c4eac398226533d630009ef164267f35d52d8a50d20a707dc0ae36f9d8784869510e19e27da2ddfa6ab3306d5051ace169fdfaea16b6612e9ababcad20369902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad0362632da6d8ba647e2e11736235b9
SHA1398ab7baaf4fd7e62b2f0e7232b2ed13f5ea3d1c
SHA2565078beaebbc8ca346bc7643a079bf73d16714c8a2314b3766ec54edf55277eeb
SHA512fdf1da6dbd5ff67700bb137349d387275f0d40a23d3a373fca6a9a7a7772b34e6ac2d470c4d32b8b9116c8ca53dc41c7ee093ed8ab753c728fc564da2b37a5a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bead1d666f167bcc32c35d821a20a5dc
SHA1efb63b70f35fd309b4306daba6bbfeb1f7352abf
SHA256dcab0f7472260a69e08c2235c003d85ba2498cd2ec74dd02a8fe2993d5b8d55c
SHA512bde301740496d45ad992f36b01ae9f98172499fab423fed83ac0c7a357cff5d78c5b4585167fc8173461db4f21dd6309c12df24cf622f77feabb1a2454fdd405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2fedcd772ca7e9f19eb639464aecd40
SHA1ccff278f7dcb3df67724f8d8958cce6f3a65711c
SHA256076c8704641165948a9a8e96d881c148c45993d9fc87397b048b8066be6fbe49
SHA5122907eb0416a5c134a9efa04e976390ac00a612b7d1d349163eab5b5031c6fcb206a1f4dd63a9487c268ab8dff51ac51c9f37f0b226730c07f1dbd7580d8a2cbc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a