Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 20:26
Static task
static1
Behavioral task
behavioral1
Sample
5157b2174b318d26e5995957ddc1983f_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5157b2174b318d26e5995957ddc1983f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5157b2174b318d26e5995957ddc1983f_JaffaCakes118.html
-
Size
143KB
-
MD5
5157b2174b318d26e5995957ddc1983f
-
SHA1
7474670e751ab1197d39d62233b526ce08f08646
-
SHA256
0d61a6aadd984d4ce3cd927c7c404c80f5c0120b436238b393a0cc4c73aaadce
-
SHA512
d854bc29dd3bfedce7ae8d979cc7bdf0acdf868c042cfac6c46b23f9c0493a72d4be5ac3988bb13d9cde9e84eab375b50e502628b36e86d6989257d0c17dc1d8
-
SSDEEP
1536:SMZNUovF04PLx76vuyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:SWvbzx7dyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422139481" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC584FA1-148B-11EF-A41C-62A1B34EBED1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1996 iexplore.exe 1996 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2540 1996 iexplore.exe 28 PID 1996 wrote to memory of 2540 1996 iexplore.exe 28 PID 1996 wrote to memory of 2540 1996 iexplore.exe 28 PID 1996 wrote to memory of 2540 1996 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5157b2174b318d26e5995957ddc1983f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1996 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb4a48f2136a3816f6afca283ff9d1ab
SHA18590f5cf046f7b5663a2077c4fbeeec0a6d6107f
SHA256f40e53de3afd10056c920fde849cf00f1c89dfce167d008f966fe9805c20bfd9
SHA5126211bfcbb853ef1a869bbf522dd5a4b541f44d6a3056e8ad118184238b5154fafaec1b073ebf2834cedf4b1f1593f4b5109b69424ee94b7fb568de6ff262fa48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5deea564782150253f71b1d454ece71b9
SHA1d66064bdaa76b515c01e657c67776e1f8a664029
SHA2569161ba33df7625c6c455595c68bd7263c690648bf151558536e1cf173a8e275f
SHA5124c9573799c46357d191100b99db501f9bbcec44b77beb2e3ba6d9d3cf6de33980dd4c47d2c7c8a5c81b492613c218324774374e3b01506ee5d9306d0918d11c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e4a2ec76eae2744ffe9301ef7718ea2
SHA1e56fca83dfb9ded6d70d77886b6f0f79633691b2
SHA256b8e6173d1b27cf86ee9d0faa76ca17f349f2ef77c193380bc4015a9c117ea96a
SHA512e0c54473d2beda560297efcdefe2a805f75efc5cd97b53a0c4e77ff6043ab1982dd68268e6b2c359b21712686d0ba331c17b9cb47bd68e0e55cc020d00ce8243
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566f2c53fd9bde28adf4f0c5e886d803c
SHA1b439154c9d17438fd7f98333300e97f08a1f049e
SHA2562605554c5c42a42d8d97e6cbaaa2b69fcdc5ec2ec1daa75b4661338123b917b0
SHA512f9b0af3e81418885057f8ad68438227734ca88d4dbeb9bc3f98e604738fcc5964db3187f4b4e0285bf016989c2c9e50193c8d588c6e0dadd466c59bc507cc130
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537a59bfd2abe23174b04c1be6e2d2e03
SHA1204eec988e17ae35e3f455248237f1515a7fd30a
SHA256e287f76294eb2d3ae701217dd8acf908de2f2ea897b0cea35e3dc518382b5b6d
SHA5120ee97bbcff97b1a5a4928840aae0ac87bee41ed5ecede6e6cba225f26c949ff455308555ba8f4ee292015b9563c6557a706a735ef5fb4d7d411b1eae10d40119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55147ed39141cd4607fde10907bb9a666
SHA10010f98a9bf92ab426b23e6c0c884a3ffc54b736
SHA25681a6ce57640a853f0dfb9e477653e6c393b497d4db4ae26394d42094554127d0
SHA512e83b70ea56990753456fb22efa99e75123f7af9d61acdda13266d48bda982cc4ff01a06c25abbca6375d6f840052d3dbb271552ff687b83295ff8c2ee1d490f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3eea0c7f4ac1b971a47ae97560f49c3
SHA192e6c42c983dc35669ef547571fa7309e6918640
SHA256ad14b14d5b3b24e64d0e7888052baff3db6738d0928ad406867ab4c9fcef6489
SHA512d300d824ba4c304501331513807e53e30ae85e5f9cfa90dbba146c38bcbf9670560a73d6ac9a047a0bc139f8425e90f2453638d46a3b2d2f75f62bb29c945164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c08855a00455d7255e366d7c8985569
SHA172c325be7bfcb6036eb0263ac8acb35d722474c0
SHA256fc4f068ad1cfc400c6ffbf04b3cfbaa7d82fc9685b366192aee4dffbfcc50b30
SHA512de87ae2f79b759740d3b829e60b5d4e72916016442f5ba730da752730e705edd598472a5b9408228088827ce48d91d724124e8ce68c336e8d52f93b74e742047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557f1c5b37ba9b07994927be4749063e4
SHA10081b57b86074f36584ce0b8862e59525db35b08
SHA2561c76813bfb936e1de24932782aeaae8cf918169ffc59deab13eb7244eb415b00
SHA51201928aec6edae2c3bcd1c48d6735926dfecf11839e82dd2f76672fb4eee44088cbe3b5b11629c6bdc30376956deaa4387889a6ca60edcc50e420df552bef6f54
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a