Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 08:36
Static task
static1
Behavioral task
behavioral1
Sample
62ac9586e782afc933379062670a5024_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
62ac9586e782afc933379062670a5024_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
62ac9586e782afc933379062670a5024_JaffaCakes118.html
-
Size
18KB
-
MD5
62ac9586e782afc933379062670a5024
-
SHA1
94c19d6029ae650424521e0cccd9646594e7a3eb
-
SHA256
47eb366b922dabd90e3a00d89be9b217a24e7b7fdc4203c4ecf8cdfc4542af46
-
SHA512
ca6d190996aee4d5837e9e61e437d568415a2f98a66531624c8c9a49ad0f088816e70f88d30ad0f85444133da471386b6c630c7527754ac0207ca90e5dd9be74
-
SSDEEP
384:SIMd0I5nvH93mS22R7LjNHmlclsvPpXQxDB8:SEQjA
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422443736" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{31E37EF1-1750-11EF-BD10-4A4F109F65B0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1624 2084 iexplore.exe 28 PID 2084 wrote to memory of 1624 2084 iexplore.exe 28 PID 2084 wrote to memory of 1624 2084 iexplore.exe 28 PID 2084 wrote to memory of 1624 2084 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\62ac9586e782afc933379062670a5024_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b56ae9cfcdee8bac048d926191976cfa
SHA17ceb53fba4dba2ee0408137179240206ec5b920f
SHA256b6c206ddbe5cfa2446eaf88576923434d7bb0d38d2a2458b8c7eb1eb376b6e8a
SHA5127ac1967befa397ad78f6b7948e10e26b365466efcd79d66182c01f8e0aa81b27402a6c3b88dd0c373b50f5f2ab3c36d99c04c3b859765359741e6cb8c600e19d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ade36534517e9a53705d2122290805c8
SHA1f247db57fc71e1f7a6d3ff3c3b7bc78af5f679e3
SHA256a0cbd9e3df1ce9cd6797e0c1070b101fcd15c3aa5ecaa5a3424494147742dbf2
SHA512f2f4f95bbc9ef80da70f6307d03664eed23bc66fe4a9bec77c12b62c646d4583da70422240d2a1a10b99611b1f60e116ae40750959b2dd161c20c40aa765997d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547a3243b9e7da9e115f73a6563a9e3d3
SHA12d92b8a11c98f675938287d42d3a5f95951ab7c5
SHA2563a0e73c3d9a454d6f13e7806bb7473c1d361ab6041d657e4aaaf7b6e2ad1d8e1
SHA512bf2876d7b7443baabc316ac9de594b38336276feeb16381ea4d7bbf293e122c8b898bfdd9dff8fd97e8636744a0e80a0fade0c6cb36799851623022bbfbaad91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549b152e7bdc4b79d2f9cb49fccc88a1b
SHA1a5b43423bdc0bcd6e2446f588f31a25cccd2b5b2
SHA256bdd44bdd7214aaa1d2457ede0639b4906d70795f765d6931ba0687bb1ef1f125
SHA5127725150c74c9378fd1c69b3ac46e7ed3bc626c4db244848620aac5dae8d3d10c5eb06baaf90c698272baa0b99096603c935e0f4f188da5cfe20c7281634ccc32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a24d85ffce102f33ad3abc26f18bcdb
SHA1630042e110e64955de1c6d521e827613f7b22082
SHA256b9d02a92cac9f1ee1f9e0cb3f81535fbbd29812df34f8477f85c75aef53c0593
SHA512c43eea663a1a3db0da1537da75127f769256710052371e4ca1d479734bf4691d6012444c3e26c3e15d8dedd135520c54fab9a427c4f0ebe09311f769475cb495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566f915ff4e209f49650d7b607a36b7bd
SHA191dc120c692ca57cc59e6cb3decc56cbbaff7cc6
SHA25629c3e43d3c5d10eec2122a81565753587bf5c6b03f3835d3f93a26e2833fe98d
SHA512c128a30cfdf7b60a5af68b8b7a5bc18e5711ff5edb105fb783b9cee21c0a35305b26704197ce3850b13de23422a3951613550209e2e19a7a9495a4a4e94d6840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de85b97d4f7926f79f49b140bb25b0e3
SHA1de14091b6eeaf59a5f659d73af130a54da8b190a
SHA25600099bbecd64c1133b37b23326fcfe593cb15fee4e384491eefe5968f0cca9df
SHA5128e1c5d1c79b29eb597a95dc084ade9b6c6bf64ba74debd54c800f5730b08a205bf0415200b2114d32dbf1adc417bed6f52675c733615cbc0fbe8419d5c4be0c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d03ac95f1dc67cf9e32e04124ae05644
SHA1dc800de154c501d0f97d1de8da8ceeb4f1440d28
SHA256e72733a075ae4ae51f36c42451c54cb631c5dc6ed14311ac3a3894be31fbc842
SHA51239b252b84dc6e7304c5befddf066a9ae210e0fe927047ebf1f7ebfddf38d99bb8c24fb9720a39994b30ae08ad240fc7c2070f88c09e52cefe95b4c8b5e3715fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59afafebc3b6c74c2f7b3f9c89e9dfc65
SHA1cbd6cef6bc2186514ca424c6c1eb0018eec160b8
SHA256fb353b2202500b5efb581e2ba4c56850456255ca7536784e8c04c845419da80b
SHA5124c38fb88b8d8556468bd15562583f0fccf22db70571d696d4985bffca23d50ea3790f2fe22155193deab90cb8f89f3361dac88411d2fa091b7de9e526242bf1c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a