Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 03:46
Static task
static1
Behavioral task
behavioral1
Sample
5d055130ebf85c6e5f512d73582a0ccb_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5d055130ebf85c6e5f512d73582a0ccb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5d055130ebf85c6e5f512d73582a0ccb_JaffaCakes118.html
-
Size
255KB
-
MD5
5d055130ebf85c6e5f512d73582a0ccb
-
SHA1
a10783a7cedebf422fac55d8da1bc8c90bc70bfa
-
SHA256
79f6c3e2b5fb6db4bae081042668705434f4c8a5e3ffe41fa0d62d373469c471
-
SHA512
95f91e1e3c22de7d3bacf548a18c75c6827bf2d7f0e7d6c24cd2503e5429136bba06ad33b56b4412b7c3a8b1e8d18e8a21faeacc1e2810390797e737609472b2
-
SSDEEP
3072:SIgRNyfkMY+BES09JXAnyrZalI+YPyfkMY+BES09JXAnyrZalI+YQ:SYsMYod+X3oI+YasMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422338640" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{80F9BC21-165B-11EF-8B04-EAF6CDD7B231} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2248 2104 iexplore.exe 28 PID 2104 wrote to memory of 2248 2104 iexplore.exe 28 PID 2104 wrote to memory of 2248 2104 iexplore.exe 28 PID 2104 wrote to memory of 2248 2104 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5d055130ebf85c6e5f512d73582a0ccb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54839b64e366d58e8f46edbcd6ec50e46
SHA1deed04781550974f0a1a51ad16c169113ae74bdc
SHA256f75116949185a5ffdc9df72f9586c5fe41374d1d627e464465b7ebf1befd94f1
SHA512aaddd005f1a39b2970c2865e179dbc854b9c8b10faacf6a3065447194e4bfc349ccbfc197c3c62ceb61c76bdb8e92bef8821b8a462b3b6e30b92349fac4746ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5778dc618572c962e7fd05f792890bc42
SHA1a0ddcca675b5c7a7c300faf313192e6d0d8a11b7
SHA2568f8e1fdb30677773e66b5a50083fbab70de39529025c5ff7dab36692ef115746
SHA512fd9b827ae856492a1c5d8a37c329d5d7a1d7b2a0e7b1d6d5fcf05fd7f242d8ef812773c79aa602a58751aefe6e07e814191837efec189be7ee080a5bf9a2d2f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bef7969467b62fdcdbde1f4f63c1625b
SHA1f2757f34d21399f6d69710b34c376f51e03bdcba
SHA2560ea5b6f6735c2dd97686fb0f6293ff371093069226ef310d2c0c89caa7e61134
SHA512076d1027afac813db60073a640caf4a0cf848c7490f5c95acb5e228b6666a8840b66d7ed90856f7e835d2b614931dfb6ce44c37b817dee4b7bf0e81a36e507d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5836725782816850e421d149834f85127
SHA1495feb34356abdc3a6d503eb6e8df4247b4011b9
SHA2561770af3834dbd2085e32bf0bbea13dac4130efc6fe9d3dfdda9c9fc96f14084b
SHA5121eb65160e95d0f2b46f93db5eea81f3adf14f57a33542062444434e8a277a009e4fe2156ba72f8bae1a7cd093c8794c49190b91ccb2ebb8faa8ff356afeba0b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5843340c7826e6830de569c6cf49a5f1a
SHA1ed400dad3d29a75af6183a775ede43cebc05ac77
SHA25670f6d97a796753eb72712e8345237e82069825afc99820245ff372d81c8f3ba2
SHA512533f56d16b6108b5a51e16b68cab0da9606b6c558fe454950701190137c6c050770600bb82e57ca4979afcd0335a0392dc7737704e45cfc13e74981eedf3585a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591176f383af941f65a38cd73982d5a5a
SHA1c488b53c483d8f53a132a11b3286baac70060dfe
SHA25649a571756d855b2b28ddb0591d18276ec25aaf9b5b87301ffc4988fe0f069097
SHA51246d2404c763392406617180067d4afc09e0d7a5dfb35e90ecbb05aac230777f65ec1f220649c0324860b2ceac0c60c14037c814cd4a8d9d8bc7c4e95c0473fbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551967e507bd9d308a9aeca7eee820ef1
SHA1cbcd4540f159a608582546775ec80d6d64777ec5
SHA2563edf6afab647b654b77470f8dfc485d0a863de34d5cd55d214902f70a43da5b8
SHA5126679866ef73daf33434347057c1e5db568955f29119a1b3a3d8358f2e469c8ca595d94a26f468a6f71ac6c7ae0080aa23a50fdab542de7e410ee3c7ae7d5419f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8ab5d93098a972c826995d208ff9fd7
SHA195ed82672f9d415dae10fb92d80fbf6bd3951477
SHA256e755e07ba70b4544215187111b56b4148b4a7ae5dd65d8e640d3c03433a69524
SHA512e7051fc766d7ad93188da9716c17d84d66d0ca1c6c5b56c2aa4b1845c98c6cd23ff480e40456bf5059810ff72719998b4e61d3752c4f0a2de7f770745306f6a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524dfd01474b7e2e6bcfa7b6987dd1fe7
SHA119f92f361015c2fa5e8bf63223f0c675c9a686ec
SHA256536baef7af9ce70fb09cfec7535c0311f5a9400ae70402d011677724b2ea7d96
SHA512f0769751d57cae102bb32f3a770c784bfdc9c72bc7c52832accef47bcc2794d5d14ce0e77b7e9d7282ac551f2b731a4e1ca74fc957c3c038dce8319e211af288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6e19a5c5aeb0c2ce02bbd6162e6f8b9
SHA1632be2a6671399e8cb1348d6fd0e7c24ccb138f1
SHA25633d2a356fce5d1b4115ca298110113ed0e4c491183cf7b3c36a8c0794deea670
SHA51270907e8eaf80fd4501a42b1048837e9fb335d4a4fc16c2b271303badc2bc293f78444c14517933bab3dc501920275af05defb7849c1990058f51bced1036c920
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a