Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:16
Static task
static1
Behavioral task
behavioral1
Sample
63ed3d17a6a8298b2eb303fd4c97b51e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63ed3d17a6a8298b2eb303fd4c97b51e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63ed3d17a6a8298b2eb303fd4c97b51e_JaffaCakes118.html
-
Size
70KB
-
MD5
63ed3d17a6a8298b2eb303fd4c97b51e
-
SHA1
90783f08de8f64bc9a5457b97de4fe23ba07f6e4
-
SHA256
fde8dbf908e5874eb42f1ef85d1d7bb14da82c06bd8d8e998eaa3d54f6ea85d8
-
SHA512
03610c704f1cafcc864050e62b6a836ea7ef004a04c3cfbc40ada05a628aacc5595dbceedf5ed99f51ae055cf3e21f04a6c985615bcc8118d203c159109e6a7c
-
SSDEEP
1536:5zfoMRQa5MMb75Tj+HRmBWoyh2+IGZ7myh:5zfoMRQa5MMb75mmBWD2+Tz
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7A6AC561-178D-11EF-B195-DEECE6B0C1A4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422470055" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1916 iexplore.exe 1916 iexplore.exe 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1916 wrote to memory of 2604 1916 iexplore.exe IEXPLORE.EXE PID 1916 wrote to memory of 2604 1916 iexplore.exe IEXPLORE.EXE PID 1916 wrote to memory of 2604 1916 iexplore.exe IEXPLORE.EXE PID 1916 wrote to memory of 2604 1916 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63ed3d17a6a8298b2eb303fd4c97b51e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f43ce5666b15f6e817456deabafdab7
SHA15ab62b9ceceeee887e3a97a3524d2e1406919a85
SHA256b064224077562fc733de5b19c819a0ccb2ab37a18857e24f57db299e0a251cb3
SHA5125930efa61e5f155c67e7dca0c93255375646d4b889a5f5ae300b4307b73f24eb6ce5c87a7cda0d88ac415777ec069aaba0f3c4df633ed835def4c3c7714bdb84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5063675b8278f895cae0e6d60312b646a
SHA194443ffa07e0f9d68188bf00b3d6bb77c112ca5b
SHA2566036ee1800323a35b18cf87a0b769ed9cdf2464ae4106915df17ef255ba777ed
SHA5129765fa13624a762e609022abc32243a1803b17f5f94567f34b6e10a1ae8731565f01c51992cfa31257acb20b4e0dd0e5d32fc0f4c893ee3c698c258c2387dd1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5bfb5a2d6db02c4cc2517800d7192fb
SHA13726fc023770188754ff78a8c5bd6db6c3f997c8
SHA256443227bbe0a03494dfb633bbf81d0dd6e8257d642a47817200b609e64296bc6c
SHA512f78874519bd4c38f7091d97a0ad44ae780358d142041e7975eeafdb043ef2da9cd16267492875fe6ffec7d3c77a114133c74dda5a84c77d27f9eb7934eec525d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a171a9c09cf90918326c077268614f22
SHA1286480a468a4b1bf00cb70c68eb99ab168399145
SHA256f6d8497dea561d9c14f8e28e787622d5026ab1aa6690b94c59066a0b4d982bb7
SHA512e25462caaaeb24b2c47b96136d05ed186c94c1dc1b4feacc6ed57496c6a55b4919ddafd19d6c90b7ec846fc3a54ef9259bf3b971710e4278c3f3bed307208bbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f11e3a840477852fa29285498bdda530
SHA1222f0419015a533f4c9df0bf3cf023522ad20e97
SHA25603a148a10b0cb33d9c2e4fd34a2ff701bf79378fdd77991a8a15962e16a9921c
SHA5121c0ccd4268ffe345a19df0ed7df29c0978e870450ce6bfd70d1b95ac246c44d739b15bf41769b1798dd7a649fdd9d08108041a8455632d38dcdcd29eb56ae026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515f1bef03f7323570195e6efc27d7608
SHA13da2cc1b28f3568a2007ebb1613e919b81d05711
SHA256e0cf5b750e6d52f349e7bf28379039af4f92de16d72e9c11149e7490c7a848a7
SHA5121fbb1f3b36efe743159428a55c657c835d6414731b524ee62f1099e33631c1603c35a863f383399a6684fba07bbfb7087cb65edaaff06781eb913af7f3e52fb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c99a7336e7c5088abd1eeb71bf88829
SHA12e9de7fe151403523520d3d2976dd243a4ec1fd3
SHA256b486b46e78a6469835c6e1f4cd5a116a44328dd5d6c77cbadd39d50666ac44ef
SHA512ddfe2fb64dc3e4534f810721bdacedb9449f030d2b59bc5325704ebfde0cbd8bef1701a7593d27efeeaab07ebbc39af0c21a9efbc3da57129ead6313f8baed73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5974fc9f32e5670a51ee6360376f4fac0
SHA132a336074ec7c0862626a92883ea2859a429a569
SHA256806401eb8c729329480453b59acf7cc66bdc2abc95e5bd43e0b63607f8d63f79
SHA5129d5c7ae275101f75ccf5c862212871d149d741c6d7cf925155b3d3c6de5dd6bbe3592bd06201bfca000fb5d296329402004269c39cf46bff5b81ba65c4b341e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c391afb489a7796566f62e2e0f4ccf96
SHA19ca734c1910b255acc75785508eaef9afb7b6132
SHA2565317623510628010ed6a22e09752d2e465f2a7f5aa5aa6d7873116c687d65dbc
SHA512cc141a65dc4600f7bae707d51c25e26bee62c1701a56f76deaf35eb6973433d48ac846cc0d11745c6361f16f4e3ccf7213dee0914db981e008c09b154d4184f8
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a